8:19:50 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x4, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100, 0x4, &(0x7f0000000140)) (async) 08:19:50 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000280)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/190, 0xbe) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f852516daec70065373a7f4a433c59a0f3951959bebdd3e9a23d2d37948e2db7e63f86cb984f86d54eb49dfdd5439c38488425dc9c9b310000000000000000"]) [ 2057.211188] FAULT_INJECTION: forcing a failure. [ 2057.211188] name failslab, interval 1, probability 0, space 0, times 0 [ 2057.217212] FAULT_INJECTION: forcing a failure. [ 2057.217212] name failslab, interval 1, probability 0, space 0, times 0 [ 2057.230423] FAULT_INJECTION: forcing a failure. [ 2057.230423] name failslab, interval 1, probability 0, space 0, times 0 [ 2057.241263] CPU: 0 PID: 25373 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2057.252846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2057.262195] Call Trace: [ 2057.264777] dump_stack+0x1b2/0x281 [ 2057.268400] should_fail.cold+0x10a/0x149 [ 2057.272551] should_failslab+0xd6/0x130 [ 2057.276509] __kmalloc+0x2c1/0x400 [ 2057.280046] ? __list_lru_init+0x67/0x710 [ 2057.284179] __list_lru_init+0x67/0x710 [ 2057.288142] sget_userns+0x4e4/0xc10 [ 2057.291855] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.296340] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.300385] sget+0xd1/0x110 [ 2057.303408] ? fuse_get_root_inode+0xc0/0xc0 [ 2057.307858] mount_nodev+0x2c/0xf0 [ 2057.311404] mount_fs+0x92/0x2a0 [ 2057.314775] vfs_kern_mount.part.0+0x5b/0x470 [ 2057.319277] do_mount+0xe65/0x2a30 [ 2057.322811] ? copy_mount_string+0x40/0x40 [ 2057.327033] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2057.332039] ? copy_mnt_ns+0xa30/0xa30 [ 2057.335916] ? copy_mount_options+0x1fa/0x2f0 [ 2057.340401] ? copy_mnt_ns+0xa30/0xa30 [ 2057.344270] SyS_mount+0xa8/0x120 [ 2057.347704] ? copy_mnt_ns+0xa30/0xa30 [ 2057.351585] do_syscall_64+0x1d5/0x640 [ 2057.355476] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2057.360646] RIP: 0033:0x7f80d8a040c9 [ 2057.364360] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2057.372059] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2057.379315] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2057.386587] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2057.393858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2057.401110] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:19:51 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 9) [ 2057.408376] CPU: 1 PID: 25372 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2057.416273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2057.425627] Call Trace: [ 2057.428258] dump_stack+0x1b2/0x281 [ 2057.431890] should_fail.cold+0x10a/0x149 [ 2057.436061] should_failslab+0xd6/0x130 [ 2057.440037] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2057.444708] sget_userns+0x102/0xc10 [ 2057.448430] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.452490] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.456548] sget+0xd1/0x110 [ 2057.459564] ? fuse_get_root_inode+0xc0/0xc0 [ 2057.463968] mount_nodev+0x2c/0xf0 [ 2057.467502] mount_fs+0x92/0x2a0 [ 2057.470866] vfs_kern_mount.part.0+0x5b/0x470 [ 2057.475353] do_mount+0xe65/0x2a30 [ 2057.478891] ? copy_mount_string+0x40/0x40 [ 2057.483124] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2057.488139] ? copy_mnt_ns+0xa30/0xa30 [ 2057.492022] ? copy_mount_options+0x1fa/0x2f0 [ 2057.496506] ? copy_mnt_ns+0xa30/0xa30 [ 2057.500385] SyS_mount+0xa8/0x120 [ 2057.503834] ? copy_mnt_ns+0xa30/0xa30 [ 2057.507729] do_syscall_64+0x1d5/0x640 [ 2057.511610] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2057.516795] RIP: 0033:0x7fa4d53ef0c9 [ 2057.520580] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2057.528285] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2057.535544] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2057.542797] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2057.550058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2057.557317] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2057.564592] CPU: 0 PID: 25374 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2057.572430] FAULT_INJECTION: forcing a failure. [ 2057.572430] name failslab, interval 1, probability 0, space 0, times 0 [ 2057.572503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2057.593313] Call Trace: [ 2057.595887] dump_stack+0x1b2/0x281 [ 2057.599500] should_fail.cold+0x10a/0x149 [ 2057.603636] should_failslab+0xd6/0x130 [ 2057.607590] __kmalloc+0x2c1/0x400 [ 2057.611111] ? register_shrinker+0x1ab/0x220 [ 2057.615503] register_shrinker+0x1ab/0x220 [ 2057.619894] sget_userns+0x9aa/0xc10 [ 2057.623615] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.627839] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.631882] sget+0xd1/0x110 [ 2057.634884] ? fuse_get_root_inode+0xc0/0xc0 [ 2057.639359] mount_nodev+0x2c/0xf0 [ 2057.642943] mount_fs+0x92/0x2a0 [ 2057.646294] vfs_kern_mount.part.0+0x5b/0x470 [ 2057.650770] do_mount+0xe65/0x2a30 [ 2057.654297] ? retint_kernel+0x2d/0x2d [ 2057.658165] ? copy_mount_string+0x40/0x40 [ 2057.662381] ? copy_mount_options+0x150/0x2f0 [ 2057.667118] ? copy_mount_options+0x17b/0x2f0 [ 2057.671599] ? copy_mount_options+0x1fa/0x2f0 [ 2057.676083] ? copy_mnt_ns+0xa30/0xa30 [ 2057.680038] SyS_mount+0xa8/0x120 [ 2057.683474] ? copy_mnt_ns+0xa30/0xa30 [ 2057.687344] do_syscall_64+0x1d5/0x640 [ 2057.691219] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2057.696390] RIP: 0033:0x7f60c6f5e0c9 [ 2057.700081] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2057.707793] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2057.715041] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2057.722295] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2057.729630] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2057.736882] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2057.744159] CPU: 1 PID: 25387 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2057.752046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2057.761394] Call Trace: 08:19:51 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000280)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/190, 0xbe) (async) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f852516daec70065373a7f4a433c59a0f3951959bebdd3e9a23d2d37948e2db7e63f86cb984f86d54eb49dfdd5439c38488425dc9c9b310000000000000000"]) 08:19:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04e32d0925811e12f5aa00aaaaaaaaaabb0000d366b26aa6e63014fbaf700e8582d4474e84fdf2105eddac7990af641f9f81e53536dfa53231c612e3af957c4f43c204ba745323c9101a2edff19c97f8bc606d2f198b3e1102000000f549fe797510c6a28257df32e2e71b83cd5e0314fbf99ae3f06be51a4055ea54d191c8b28ff97ac317b49c88e492fc86dff9"], 0x20}, 0x1, 0x0, 0x0, 0x4085}, 0x10810) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1001, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x4], 0x1, 0x40000, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000340)=0x6, 0x4) [ 2057.763984] dump_stack+0x1b2/0x281 [ 2057.767615] should_fail.cold+0x10a/0x149 [ 2057.771773] should_failslab+0xd6/0x130 [ 2057.775781] __kmalloc+0x2c1/0x400 [ 2057.779317] ? __list_lru_init+0x67/0x710 [ 2057.783468] __list_lru_init+0x67/0x710 [ 2057.787444] sget_userns+0x504/0xc10 [ 2057.791159] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.795219] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.799279] sget+0xd1/0x110 [ 2057.802297] ? fuse_get_root_inode+0xc0/0xc0 [ 2057.806701] mount_nodev+0x2c/0xf0 [ 2057.810237] mount_fs+0x92/0x2a0 08:19:51 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 8) 08:19:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04e32d0925811e12f5aa00aaaaaaaaaabb0000d366b26aa6e63014fbaf700e8582d4474e84fdf2105eddac7990af641f9f81e53536dfa53231c612e3af957c4f43c204ba745323c9101a2edff19c97f8bc606d2f198b3e1102000000f549fe797510c6a28257df32e2e71b83cd5e0314fbf99ae3f06be51a4055ea54d191c8b28ff97ac317b49c88e492fc86dff9"], 0x20}, 0x1, 0x0, 0x0, 0x4085}, 0x10810) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1001, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x4], 0x1, 0x40000, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000340)=0x6, 0x4) [ 2057.813604] vfs_kern_mount.part.0+0x5b/0x470 [ 2057.818098] do_mount+0xe65/0x2a30 [ 2057.821642] ? copy_mount_string+0x40/0x40 [ 2057.825871] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2057.830879] ? copy_mnt_ns+0xa30/0xa30 [ 2057.834792] ? copy_mount_options+0x1fa/0x2f0 [ 2057.839289] ? copy_mnt_ns+0xa30/0xa30 [ 2057.843176] SyS_mount+0xa8/0x120 [ 2057.846628] ? copy_mnt_ns+0xa30/0xa30 [ 2057.850514] do_syscall_64+0x1d5/0x640 [ 2057.854415] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2057.859597] RIP: 0033:0x7f80d8a040c9 [ 2057.863299] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2057.870985] FAULT_INJECTION: forcing a failure. [ 2057.870985] name failslab, interval 1, probability 0, space 0, times 0 [ 2057.871008] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2057.889448] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2057.896713] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2057.903978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2057.911247] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2057.918516] CPU: 0 PID: 25394 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2057.926405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2057.935750] Call Trace: [ 2057.938336] dump_stack+0x1b2/0x281 [ 2057.941967] should_fail.cold+0x10a/0x149 [ 2057.946118] should_failslab+0xd6/0x130 [ 2057.950094] __kmalloc+0x2c1/0x400 [ 2057.953635] ? __list_lru_init+0x67/0x710 [ 2057.957783] __list_lru_init+0x67/0x710 08:19:51 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000002380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_type={'obj_type', 0x3d, '$$,^['}}, {@fowner_lt={'fowner<', r1}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x38, 0x30, 0x33, 0x32, 0x31, 0x35, 0x62], 0x2d, [0x33, 0x32, 0x38, 0x36], 0x2d, [0x35, 0x37, 0x39, 0x66], 0x2d, [0x34, 0x61, 0x33, 0x38], 0x2d, [0x30, 0x30, 0x65, 0x38, 0x61, 0x62, 0x36, 0x32]}}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_role={'obj_role', 0x3d, '.\'!(/+'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fuse\x00'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@obj_type={'obj_type', 0x3d, '$$,^['}}]}}) 08:19:51 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfd9fa, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4850}, 0x0) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x4, 0x5], 0x2, 0x81000, 0x0, 0xffffffffffffffff}) read$FUSE(r3, &(0x7f0000000a80)={0x2020}, 0x2020) [ 2057.961757] sget_userns+0x4e4/0xc10 [ 2057.965469] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.969525] ? get_anon_bdev+0x1c0/0x1c0 [ 2057.973578] sget+0xd1/0x110 [ 2057.976594] ? fuse_get_root_inode+0xc0/0xc0 [ 2057.980995] mount_nodev+0x2c/0xf0 [ 2057.984533] mount_fs+0x92/0x2a0 [ 2057.987905] vfs_kern_mount.part.0+0x5b/0x470 [ 2057.992401] do_mount+0xe65/0x2a30 [ 2057.995944] ? copy_mount_string+0x40/0x40 [ 2058.000179] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2058.005201] ? copy_mnt_ns+0xa30/0xa30 [ 2058.009098] ? copy_mount_options+0x1fa/0x2f0 08:19:51 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfd9fa, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4850}, 0x0) (async) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x4, 0x5], 0x2, 0x81000, 0x0, 0xffffffffffffffff}) read$FUSE(r3, &(0x7f0000000a80)={0x2020}, 0x2020) [ 2058.013593] ? copy_mnt_ns+0xa30/0xa30 [ 2058.017478] SyS_mount+0xa8/0x120 [ 2058.020924] ? copy_mnt_ns+0xa30/0xa30 [ 2058.024820] do_syscall_64+0x1d5/0x640 [ 2058.028707] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2058.033884] RIP: 0033:0x7fa4d53ef0c9 [ 2058.038124] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2058.045812] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2058.053076] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 08:19:51 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 11) 08:19:51 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 10) 08:19:51 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000280)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/190, 0xbe) (async) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f852516daec70065373a7f4a433c59a0f3951959bebdd3e9a23d2d37948e2db7e63f86cb984f86d54eb49dfdd5439c38488425dc9c9b310000000000000000"]) 08:19:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1, 0x0, 0x25dfdbfd}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04e32d0925811e12f5aa00aaaaaaaaaabb0000d366b26aa6e63014fbaf700e8582d4474e84fdf2105eddac7990af641f9f81e53536dfa53231c612e3af957c4f43c204ba745323c9101a2edff19c97f8bc606d2f198b3e1102000000f549fe797510c6a28257df32e2e71b83cd5e0314fbf99ae3f06be51a4055ea54d191c8b28ff97ac317b49c88e492fc86dff9"], 0x20}, 0x1, 0x0, 0x0, 0x4085}, 0x10810) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1001, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x4], 0x1, 0x40000, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000340)=0x6, 0x4) 08:19:51 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 9) [ 2058.060337] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2058.067592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2058.074844] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 08:19:51 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) accept4$vsock_stream(r2, &(0x7f0000000200)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x80c00) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1200040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) [ 2058.152748] FAULT_INJECTION: forcing a failure. [ 2058.152748] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.178044] FAULT_INJECTION: forcing a failure. [ 2058.178044] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.181995] CPU: 0 PID: 25418 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 08:19:51 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) (async) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) accept4$vsock_stream(r2, &(0x7f0000000200)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x80c00) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1200040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) [ 2058.197157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2058.206597] Call Trace: [ 2058.209206] dump_stack+0x1b2/0x281 [ 2058.213095] should_fail.cold+0x10a/0x149 [ 2058.217238] should_failslab+0xd6/0x130 [ 2058.221208] __kmalloc+0x2c1/0x400 [ 2058.224915] ? match_number+0x9d/0x200 [ 2058.228800] match_number+0x9d/0x200 [ 2058.232541] ? match_strdup+0xa0/0xa0 [ 2058.236334] ? register_shrinker+0x15a/0x220 [ 2058.240736] fuse_fill_super+0x437/0x15c0 [ 2058.244967] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.249365] ? up_write+0x17/0x60 [ 2058.252824] ? register_shrinker+0x15f/0x220 [ 2058.257310] ? sget_userns+0x768/0xc10 [ 2058.259837] FAULT_INJECTION: forcing a failure. [ 2058.259837] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.261191] ? get_anon_bdev+0x1c0/0x1c0 [ 2058.261200] ? sget+0xd9/0x110 [ 2058.261210] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.261219] mount_nodev+0x4c/0xf0 [ 2058.261228] mount_fs+0x92/0x2a0 [ 2058.261244] vfs_kern_mount.part.0+0x5b/0x470 [ 2058.295401] do_mount+0xe65/0x2a30 [ 2058.298945] ? copy_mount_string+0x40/0x40 08:19:51 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 32) getresgid(&(0x7f0000000000), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) (async) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) accept4$vsock_stream(r2, &(0x7f0000000200)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x80c00) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1200040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) [ 2058.303182] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2058.308193] ? copy_mnt_ns+0xa30/0xa30 [ 2058.312092] ? copy_mount_options+0x1fa/0x2f0 [ 2058.316595] ? copy_mnt_ns+0xa30/0xa30 [ 2058.320489] SyS_mount+0xa8/0x120 [ 2058.323949] ? copy_mnt_ns+0xa30/0xa30 [ 2058.327831] do_syscall_64+0x1d5/0x640 [ 2058.331746] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2058.336932] RIP: 0033:0x7f60c6f5e0c9 [ 2058.340627] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2058.348323] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2058.355581] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2058.362861] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2058.370125] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2058.377396] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2058.384752] CPU: 1 PID: 25424 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2058.392639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2058.401990] Call Trace: [ 2058.404575] dump_stack+0x1b2/0x281 [ 2058.408204] should_fail.cold+0x10a/0x149 [ 2058.412352] should_failslab+0xd6/0x130 [ 2058.416328] __kmalloc+0x2c1/0x400 [ 2058.419869] ? register_shrinker+0x1ab/0x220 [ 2058.424280] register_shrinker+0x1ab/0x220 [ 2058.428512] sget_userns+0x9aa/0xc10 [ 2058.432229] ? get_anon_bdev+0x1c0/0x1c0 [ 2058.434554] FAULT_INJECTION: forcing a failure. [ 2058.434554] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.436287] ? get_anon_bdev+0x1c0/0x1c0 08:19:51 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 12) [ 2058.436297] sget+0xd1/0x110 [ 2058.436308] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.436320] mount_nodev+0x2c/0xf0 [ 2058.462483] mount_fs+0x92/0x2a0 [ 2058.465836] vfs_kern_mount.part.0+0x5b/0x470 [ 2058.470335] do_mount+0xe65/0x2a30 [ 2058.473874] ? retint_kernel+0x2d/0x2d [ 2058.477747] ? copy_mount_string+0x40/0x40 [ 2058.481970] ? copy_mount_options+0x185/0x2f0 [ 2058.486542] ? copy_mount_options+0x197/0x2f0 [ 2058.491019] ? copy_mount_options+0x1fa/0x2f0 [ 2058.495501] ? copy_mnt_ns+0xa30/0xa30 [ 2058.499383] SyS_mount+0xa8/0x120 [ 2058.502833] ? copy_mnt_ns+0xa30/0xa30 [ 2058.506708] do_syscall_64+0x1d5/0x640 [ 2058.510931] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2058.516103] RIP: 0033:0x7f80d8a040c9 [ 2058.519891] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2058.527693] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2058.535070] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2058.542322] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:19:52 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:19:52 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2058.549576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2058.556835] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2058.564105] CPU: 0 PID: 25449 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2058.571994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2058.581350] Call Trace: [ 2058.583937] dump_stack+0x1b2/0x281 [ 2058.587573] should_fail.cold+0x10a/0x149 [ 2058.591727] should_failslab+0xd6/0x130 [ 2058.595707] __kmalloc+0x2c1/0x400 [ 2058.599246] ? match_number+0x9d/0x200 08:19:52 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfd9fa, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4850}, 0x0) (async) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffff9c, 0xc0406619, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x4, 0x5], 0x2, 0x81000, 0x0, 0xffffffffffffffff}) read$FUSE(r3, &(0x7f0000000a80)={0x2020}, 0x2020) 08:19:52 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x77359400}}) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2058.603140] match_number+0x9d/0x200 [ 2058.606854] ? match_strdup+0xa0/0xa0 [ 2058.610653] ? register_shrinker+0x15a/0x220 [ 2058.615062] fuse_fill_super+0x3f2/0x15c0 [ 2058.619221] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.623627] ? up_write+0x17/0x60 [ 2058.627166] ? register_shrinker+0x15f/0x220 [ 2058.631571] ? sget_userns+0x768/0xc10 [ 2058.635463] ? get_anon_bdev+0x1c0/0x1c0 [ 2058.639557] ? sget+0xd9/0x110 [ 2058.642746] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.647150] mount_nodev+0x4c/0xf0 [ 2058.650689] mount_fs+0x92/0x2a0 [ 2058.654056] vfs_kern_mount.part.0+0x5b/0x470 [ 2058.658553] do_mount+0xe65/0x2a30 [ 2058.662110] ? copy_mount_string+0x40/0x40 [ 2058.666354] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2058.671388] ? copy_mnt_ns+0xa30/0xa30 [ 2058.675275] ? copy_mount_options+0x1fa/0x2f0 [ 2058.679765] ? copy_mnt_ns+0xa30/0xa30 [ 2058.683649] SyS_mount+0xa8/0x120 [ 2058.687099] ? copy_mnt_ns+0xa30/0xa30 [ 2058.690985] do_syscall_64+0x1d5/0x640 [ 2058.694872] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2058.700051] RIP: 0033:0x7f60c6f5e0c9 [ 2058.703742] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2058.711451] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2058.718706] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2058.725954] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2058.733206] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2058.740460] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2058.747737] CPU: 1 PID: 25437 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2058.755623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2058.764974] Call Trace: [ 2058.767649] dump_stack+0x1b2/0x281 [ 2058.771285] should_fail.cold+0x10a/0x149 [ 2058.775436] should_failslab+0xd6/0x130 [ 2058.779412] __kmalloc+0x2c1/0x400 [ 2058.782949] ? __list_lru_init+0x67/0x710 [ 2058.787100] __list_lru_init+0x67/0x710 [ 2058.791079] sget_userns+0x504/0xc10 [ 2058.794796] ? get_anon_bdev+0x1c0/0x1c0 [ 2058.798862] ? get_anon_bdev+0x1c0/0x1c0 [ 2058.802949] sget+0xd1/0x110 [ 2058.802956] FAULT_INJECTION: forcing a failure. [ 2058.802956] name failslab, interval 1, probability 0, space 0, times 0 [ 2058.817128] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.821542] mount_nodev+0x2c/0xf0 [ 2058.825068] mount_fs+0x92/0x2a0 [ 2058.828436] vfs_kern_mount.part.0+0x5b/0x470 [ 2058.833109] do_mount+0xe65/0x2a30 [ 2058.836649] ? retint_kernel+0x2d/0x2d [ 2058.840539] ? copy_mount_string+0x40/0x40 [ 2058.844772] ? copy_mount_options+0x185/0x2f0 [ 2058.849256] ? copy_mount_options+0x19a/0x2f0 08:19:52 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 11) 08:19:52 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2020c00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x9}}], [{@measure}]}}) 08:19:52 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2058.853736] ? copy_mount_options+0x1fa/0x2f0 [ 2058.858217] ? copy_mnt_ns+0xa30/0xa30 [ 2058.862099] SyS_mount+0xa8/0x120 [ 2058.865536] ? copy_mnt_ns+0xa30/0xa30 [ 2058.869405] do_syscall_64+0x1d5/0x640 [ 2058.873539] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2058.879068] RIP: 0033:0x7fa4d53ef0c9 [ 2058.882768] RSP: 002b:00007fa4d3940168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2058.890468] RAX: ffffffffffffffda RBX: 00007fa4d550f050 RCX: 00007fa4d53ef0c9 [ 2058.897742] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2058.905000] RBP: 00007fa4d39401d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2058.912254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2058.919535] R13: 00007ffd4da7cbbf R14: 00007fa4d3940300 R15: 0000000000022000 [ 2058.926804] CPU: 0 PID: 25463 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2058.934687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2058.944071] Call Trace: [ 2058.946657] dump_stack+0x1b2/0x281 [ 2058.950284] should_fail.cold+0x10a/0x149 [ 2058.954435] should_failslab+0xd6/0x130 [ 2058.958402] __kmalloc+0x2c1/0x400 [ 2058.961921] ? match_number+0x9d/0x200 [ 2058.965795] match_number+0x9d/0x200 [ 2058.969493] ? match_strdup+0xa0/0xa0 [ 2058.973284] ? register_shrinker+0x15a/0x220 [ 2058.977675] fuse_fill_super+0x437/0x15c0 [ 2058.981806] ? fuse_get_root_inode+0xc0/0xc0 [ 2058.986202] ? up_write+0x17/0x60 [ 2058.989644] ? register_shrinker+0x15f/0x220 [ 2058.994032] ? sget_userns+0x768/0xc10 [ 2058.998076] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.002121] ? sget+0xd9/0x110 [ 2059.005288] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.009672] mount_nodev+0x4c/0xf0 [ 2059.013214] mount_fs+0x92/0x2a0 [ 2059.016562] vfs_kern_mount.part.0+0x5b/0x470 [ 2059.021067] do_mount+0xe65/0x2a30 [ 2059.024595] ? copy_mount_string+0x40/0x40 [ 2059.028816] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2059.034068] ? copy_mnt_ns+0xa30/0xa30 [ 2059.037932] ? copy_mount_options+0x1fa/0x2f0 [ 2059.042403] ? copy_mnt_ns+0xa30/0xa30 [ 2059.046269] SyS_mount+0xa8/0x120 [ 2059.049716] ? copy_mnt_ns+0xa30/0xa30 [ 2059.053596] do_syscall_64+0x1d5/0x640 [ 2059.057497] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2059.062677] RIP: 0033:0x7f80d8a040c9 [ 2059.066370] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2059.074055] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2059.081308] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2059.088595] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2059.095852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:19:52 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 10) 08:19:52 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 13) 08:19:52 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2020c00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x9}}], [{@measure}]}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280)) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2020c00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x9}}], [{@measure}]}}) (async) 08:19:52 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:19:52 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 12) [ 2059.103103] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:19:52 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:19:52 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2020c00, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x9}}], [{@measure}]}}) [ 2059.189454] FAULT_INJECTION: forcing a failure. [ 2059.189454] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.210494] FAULT_INJECTION: forcing a failure. [ 2059.210494] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.226548] CPU: 1 PID: 25475 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2059.229202] FAULT_INJECTION: forcing a failure. [ 2059.229202] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.234450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2059.234455] Call Trace: [ 2059.234473] dump_stack+0x1b2/0x281 [ 2059.234489] should_fail.cold+0x10a/0x149 [ 2059.234501] should_failslab+0xd6/0x130 [ 2059.234514] __kmalloc+0x2c1/0x400 [ 2059.234523] ? match_strdup+0x58/0xa0 [ 2059.234534] match_strdup+0x58/0xa0 [ 2059.234544] fuse_fill_super+0x2e1/0x15c0 [ 2059.234557] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.234568] ? up_write+0x17/0x60 [ 2059.234577] ? register_shrinker+0x15f/0x220 [ 2059.234586] ? sget_userns+0x768/0xc10 [ 2059.234602] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.234609] ? sget+0xd9/0x110 [ 2059.234618] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.234626] mount_nodev+0x4c/0xf0 [ 2059.234634] mount_fs+0x92/0x2a0 [ 2059.234647] vfs_kern_mount.part.0+0x5b/0x470 [ 2059.234658] do_mount+0xe65/0x2a30 [ 2059.234673] ? copy_mount_string+0x40/0x40 [ 2059.234684] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2059.234694] ? copy_mnt_ns+0xa30/0xa30 [ 2059.234705] ? copy_mount_options+0x1fa/0x2f0 [ 2059.234713] ? copy_mnt_ns+0xa30/0xa30 [ 2059.234724] SyS_mount+0xa8/0x120 [ 2059.234731] ? copy_mnt_ns+0xa30/0xa30 [ 2059.234742] do_syscall_64+0x1d5/0x640 [ 2059.234763] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2059.365383] RIP: 0033:0x7f60c6f5e0c9 [ 2059.369163] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2059.376890] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2059.384148] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2059.391408] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2059.398688] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2059.405941] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2059.413216] CPU: 0 PID: 25483 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2059.421184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2059.430620] Call Trace: [ 2059.433199] dump_stack+0x1b2/0x281 [ 2059.436821] should_fail.cold+0x10a/0x149 [ 2059.440953] should_failslab+0xd6/0x130 [ 2059.444933] __kmalloc+0x2c1/0x400 [ 2059.448454] ? register_shrinker+0x1ab/0x220 [ 2059.452843] register_shrinker+0x1ab/0x220 [ 2059.457060] sget_userns+0x9aa/0xc10 [ 2059.460760] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.464807] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.468859] sget+0xd1/0x110 [ 2059.471861] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.476256] mount_nodev+0x2c/0xf0 [ 2059.479775] mount_fs+0x92/0x2a0 [ 2059.483128] vfs_kern_mount.part.0+0x5b/0x470 [ 2059.487620] do_mount+0xe65/0x2a30 [ 2059.491150] ? retint_kernel+0x2d/0x2d [ 2059.495020] ? copy_mount_string+0x40/0x40 [ 2059.499254] ? copy_mount_options+0x185/0x2f0 [ 2059.503729] ? copy_mount_options+0x188/0x2f0 [ 2059.508205] ? copy_mount_options+0x1fa/0x2f0 [ 2059.512681] ? copy_mnt_ns+0xa30/0xa30 [ 2059.516548] SyS_mount+0xa8/0x120 [ 2059.520019] ? copy_mnt_ns+0xa30/0xa30 [ 2059.523892] do_syscall_64+0x1d5/0x640 [ 2059.527769] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2059.532943] RIP: 0033:0x7f80d8a040c9 [ 2059.536654] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2059.544426] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2059.551692] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2059.558944] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2059.566211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2059.573469] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2059.580734] CPU: 1 PID: 25486 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 08:19:53 executing program 3: socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @local}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x401, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) write$FUSE_LSEEK(r2, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x5}}, 0x18) 08:19:53 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @auto="fb6c42ec3ff4439de475bb2dc5de728e"}}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2059.588624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2059.597985] Call Trace: [ 2059.600579] dump_stack+0x1b2/0x281 [ 2059.604294] should_fail.cold+0x10a/0x149 [ 2059.608452] should_failslab+0xd6/0x130 [ 2059.612430] __kmalloc+0x2c1/0x400 [ 2059.615970] ? register_shrinker+0x1ab/0x220 [ 2059.620381] register_shrinker+0x1ab/0x220 [ 2059.624787] sget_userns+0x9aa/0xc10 [ 2059.628588] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.632652] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.636748] sget+0xd1/0x110 08:19:53 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @auto="fb6c42ec3ff4439de475bb2dc5de728e"}}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @auto="fb6c42ec3ff4439de475bb2dc5de728e"}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:19:53 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)) 08:19:53 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @auto="fb6c42ec3ff4439de475bb2dc5de728e"}}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @auto="fb6c42ec3ff4439de475bb2dc5de728e"}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) [ 2059.639764] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.644304] mount_nodev+0x2c/0xf0 [ 2059.647939] mount_fs+0x92/0x2a0 [ 2059.651315] vfs_kern_mount.part.0+0x5b/0x470 [ 2059.655813] do_mount+0xe65/0x2a30 [ 2059.659362] ? copy_mount_string+0x40/0x40 [ 2059.663600] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2059.668618] ? copy_mnt_ns+0xa30/0xa30 [ 2059.673555] ? copy_mount_options+0x1fa/0x2f0 [ 2059.678053] ? copy_mnt_ns+0xa30/0xa30 [ 2059.681952] SyS_mount+0xa8/0x120 [ 2059.685401] ? copy_mnt_ns+0xa30/0xa30 [ 2059.689289] do_syscall_64+0x1d5/0x640 [ 2059.693187] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2059.698370] RIP: 0033:0x7fa4d53ef0c9 [ 2059.702077] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2059.709792] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2059.717063] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2059.724317] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2059.731582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:19:53 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 11) 08:19:53 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 14) 08:19:53 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x4c00, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 08:19:53 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)) (async) 08:19:53 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 13) [ 2059.738851] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 08:19:53 executing program 3: socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @local}, 0x10) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x401, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) write$FUSE_LSEEK(r2, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x5}}, 0x18) 08:19:53 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x4c00, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x4c00, 0x0) (async) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) (async) 08:19:53 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)) [ 2059.839542] FAULT_INJECTION: forcing a failure. [ 2059.839542] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.868739] FAULT_INJECTION: forcing a failure. [ 2059.868739] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.875339] FAULT_INJECTION: forcing a failure. [ 2059.875339] name failslab, interval 1, probability 0, space 0, times 0 [ 2059.888409] CPU: 0 PID: 25520 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2059.899185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2059.908535] Call Trace: [ 2059.911116] dump_stack+0x1b2/0x281 [ 2059.914736] should_fail.cold+0x10a/0x149 [ 2059.918994] should_failslab+0xd6/0x130 [ 2059.922956] __kmalloc+0x2c1/0x400 [ 2059.926500] ? match_strdup+0x58/0xa0 [ 2059.930288] match_strdup+0x58/0xa0 [ 2059.934018] fuse_fill_super+0x2e1/0x15c0 [ 2059.938153] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.942549] ? up_write+0x17/0x60 [ 2059.945983] ? register_shrinker+0x15f/0x220 [ 2059.950374] ? sget_userns+0x768/0xc10 [ 2059.954251] ? get_anon_bdev+0x1c0/0x1c0 [ 2059.958310] ? sget+0xd9/0x110 [ 2059.961486] ? fuse_get_root_inode+0xc0/0xc0 [ 2059.965898] mount_nodev+0x4c/0xf0 [ 2059.969439] mount_fs+0x92/0x2a0 [ 2059.972893] vfs_kern_mount.part.0+0x5b/0x470 [ 2059.977379] do_mount+0xe65/0x2a30 [ 2059.981014] ? copy_mount_string+0x40/0x40 [ 2059.985423] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2059.990423] ? copy_mnt_ns+0xa30/0xa30 [ 2059.994295] ? copy_mount_options+0x1fa/0x2f0 [ 2059.998780] ? copy_mnt_ns+0xa30/0xa30 [ 2060.002654] SyS_mount+0xa8/0x120 [ 2060.006091] ? copy_mnt_ns+0xa30/0xa30 [ 2060.009970] do_syscall_64+0x1d5/0x640 [ 2060.013851] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2060.019032] RIP: 0033:0x7f80d8a040c9 [ 2060.022732] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2060.030441] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2060.037692] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2060.044948] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2060.052200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2060.059541] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2060.066807] CPU: 1 PID: 25526 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2060.074690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2060.084037] Call Trace: [ 2060.086618] dump_stack+0x1b2/0x281 [ 2060.090270] should_fail.cold+0x10a/0x149 [ 2060.094409] should_failslab+0xd6/0x130 [ 2060.098369] __kmalloc+0x2c1/0x400 [ 2060.101895] ? match_strdup+0x58/0xa0 [ 2060.105681] ? map_id_down+0xe9/0x180 [ 2060.109475] match_strdup+0x58/0xa0 [ 2060.113104] fuse_fill_super+0x21d/0x15c0 [ 2060.117345] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.121750] ? up_write+0x17/0x60 [ 2060.125209] ? register_shrinker+0x15f/0x220 [ 2060.129703] ? sget_userns+0x768/0xc10 [ 2060.133598] ? get_anon_bdev+0x1c0/0x1c0 [ 2060.137653] ? sget+0xd9/0x110 [ 2060.140843] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.145235] mount_nodev+0x4c/0xf0 [ 2060.148758] mount_fs+0x92/0x2a0 [ 2060.152110] vfs_kern_mount.part.0+0x5b/0x470 [ 2060.156606] do_mount+0xe65/0x2a30 [ 2060.160141] ? copy_mount_string+0x40/0x40 [ 2060.164367] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2060.169384] ? copy_mnt_ns+0xa30/0xa30 [ 2060.173259] ? copy_mount_options+0x1fa/0x2f0 [ 2060.177740] ? copy_mnt_ns+0xa30/0xa30 [ 2060.181612] SyS_mount+0xa8/0x120 [ 2060.185047] ? copy_mnt_ns+0xa30/0xa30 [ 2060.188916] do_syscall_64+0x1d5/0x640 [ 2060.192809] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2060.198256] RIP: 0033:0x7f60c6f5e0c9 [ 2060.201957] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2060.209653] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2060.216902] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2060.224151] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2060.231400] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 08:19:53 executing program 3: socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @local}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x401, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) write$FUSE_LSEEK(r2, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x5}}, 0x18) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) bind$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @local}, 0x10) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x401, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) write$FUSE_LSEEK(r2, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x5}}, 0x18) (async) 08:19:53 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 15) [ 2060.238654] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2060.245926] CPU: 0 PID: 25524 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2060.253811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2060.263162] Call Trace: [ 2060.265748] dump_stack+0x1b2/0x281 [ 2060.269375] should_fail.cold+0x10a/0x149 [ 2060.273527] should_failslab+0xd6/0x130 [ 2060.277502] __kmalloc+0x2c1/0x400 [ 2060.281041] ? __list_lru_init+0x67/0x710 [ 2060.285208] __list_lru_init+0x67/0x710 [ 2060.289184] sget_userns+0x504/0xc10 [ 2060.292909] ? get_anon_bdev+0x1c0/0x1c0 [ 2060.296972] ? get_anon_bdev+0x1c0/0x1c0 [ 2060.301028] sget+0xd1/0x110 [ 2060.304048] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.308464] mount_nodev+0x2c/0xf0 [ 2060.312001] mount_fs+0x92/0x2a0 [ 2060.315370] vfs_kern_mount.part.0+0x5b/0x470 [ 2060.319890] do_mount+0xe65/0x2a30 [ 2060.323060] FAULT_INJECTION: forcing a failure. [ 2060.323060] name failslab, interval 1, probability 0, space 0, times 0 [ 2060.323424] ? do_raw_spin_unlock+0x164/0x220 [ 2060.323440] ? copy_mount_string+0x40/0x40 [ 2060.323453] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2060.323463] ? copy_mnt_ns+0xa30/0xa30 [ 2060.323477] ? copy_mount_options+0x1fa/0x2f0 [ 2060.356649] ? copy_mnt_ns+0xa30/0xa30 [ 2060.360533] SyS_mount+0xa8/0x120 [ 2060.363972] ? copy_mnt_ns+0xa30/0xa30 [ 2060.367856] do_syscall_64+0x1d5/0x640 [ 2060.371733] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2060.376905] RIP: 0033:0x7fa4d53ef0c9 [ 2060.380592] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2060.388301] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2060.395557] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2060.402813] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2060.410080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2060.417330] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2060.424600] CPU: 1 PID: 25543 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2060.432482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2060.441829] Call Trace: [ 2060.444413] dump_stack+0x1b2/0x281 [ 2060.448044] should_fail.cold+0x10a/0x149 [ 2060.452197] should_failslab+0xd6/0x130 [ 2060.456173] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2060.460842] fuse_fill_super+0x74f/0x15c0 [ 2060.465013] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.469426] ? up_write+0x17/0x60 [ 2060.472875] ? register_shrinker+0x15f/0x220 [ 2060.477280] ? sget_userns+0x768/0xc10 [ 2060.481170] ? get_anon_bdev+0x1c0/0x1c0 [ 2060.485224] ? sget+0xd9/0x110 [ 2060.488413] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.492810] mount_nodev+0x4c/0xf0 [ 2060.496328] mount_fs+0x92/0x2a0 [ 2060.499673] vfs_kern_mount.part.0+0x5b/0x470 [ 2060.504164] do_mount+0xe65/0x2a30 [ 2060.507687] ? do_raw_spin_unlock+0x164/0x220 [ 2060.512165] ? copy_mount_string+0x40/0x40 [ 2060.516377] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2060.521375] ? copy_mnt_ns+0xa30/0xa30 [ 2060.525241] ? copy_mount_options+0x1fa/0x2f0 [ 2060.529727] ? copy_mnt_ns+0xa30/0xa30 [ 2060.533597] SyS_mount+0xa8/0x120 [ 2060.537028] ? copy_mnt_ns+0xa30/0xa30 [ 2060.540890] do_syscall_64+0x1d5/0x640 [ 2060.544757] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2060.549927] RIP: 0033:0x7f60c6f5e0c9 [ 2060.553614] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2060.561304] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2060.568568] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2060.575901] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2060.583149] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 08:19:54 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 12) 08:19:54 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) statx(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:19:54 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 14) 08:19:54 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x24480, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions}]}}) 08:19:54 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x4c00, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 08:19:54 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 16) [ 2060.590480] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 08:19:54 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) (async) statx(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:19:54 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x24480, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions}]}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x24480, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions}]}}) (async) [ 2060.682765] FAULT_INJECTION: forcing a failure. [ 2060.682765] name failslab, interval 1, probability 0, space 0, times 0 [ 2060.710160] FAULT_INJECTION: forcing a failure. [ 2060.710160] name failslab, interval 1, probability 0, space 0, times 0 [ 2060.729575] CPU: 0 PID: 25565 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2060.737481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2060.746829] Call Trace: [ 2060.749592] dump_stack+0x1b2/0x281 [ 2060.753224] should_fail.cold+0x10a/0x149 [ 2060.757384] should_failslab+0xd6/0x130 [ 2060.761395] __kmalloc+0x2c1/0x400 [ 2060.764934] ? match_strdup+0x58/0xa0 [ 2060.768739] ? map_id_down+0xe9/0x180 [ 2060.772579] match_strdup+0x58/0xa0 [ 2060.776197] fuse_fill_super+0x21d/0x15c0 [ 2060.780430] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.784835] ? up_write+0x17/0x60 [ 2060.788287] ? register_shrinker+0x15f/0x220 [ 2060.792691] ? sget_userns+0x768/0xc10 [ 2060.796583] ? get_anon_bdev+0x1c0/0x1c0 [ 2060.800636] ? sget+0xd9/0x110 [ 2060.803830] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.808231] mount_nodev+0x4c/0xf0 [ 2060.811771] mount_fs+0x92/0x2a0 [ 2060.815145] vfs_kern_mount.part.0+0x5b/0x470 [ 2060.819637] do_mount+0xe65/0x2a30 [ 2060.823179] ? copy_mount_string+0x40/0x40 [ 2060.827425] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2060.832542] ? copy_mnt_ns+0xa30/0xa30 [ 2060.836428] ? copy_mount_options+0x1fa/0x2f0 [ 2060.840921] ? copy_mnt_ns+0xa30/0xa30 [ 2060.844809] SyS_mount+0xa8/0x120 [ 2060.848262] ? copy_mnt_ns+0xa30/0xa30 [ 2060.852142] do_syscall_64+0x1d5/0x640 [ 2060.856034] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2060.861224] RIP: 0033:0x7f80d8a040c9 [ 2060.864934] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2060.872636] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:19:54 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) statx(r0, &(0x7f00000024c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() read$FUSE(r0, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresgid(&(0x7f0000004840), &(0x7f0000004880)=0x0, &(0x7f00000048c0)) statx(r0, &(0x7f0000004900)='./file0\x00', 0x0, 0x200, &(0x7f0000004940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000000280)="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", 0x2000, &(0x7f0000005100)={&(0x7f0000000180)={0x50, 0xfffffffffffffffe, 0x1000, {0x7, 0x26, 0x8, 0x4000, 0x1, 0x7f, 0x1, 0x800}}, &(0x7f0000000200)={0x18, 0x0, 0x80000001, {0xc000000000000}}, &(0x7f0000002280)={0x18, 0x0, 0x4, {0x7f}}, &(0x7f00000022c0)={0x18, 0x0, 0x101, {0x80000001}}, &(0x7f0000002300)={0x18, 0x0, 0xffff, {0x7}}, &(0x7f0000002340)={0x28, 0x0, 0xe4, {{0x86, 0x20}}}, &(0x7f0000002380)={0x60, 0x0, 0xaed, {{0x100000001, 0x2, 0xa9, 0x5, 0x0, 0x1, 0x10000, 0x7f}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x3}}, &(0x7f0000002440)=ANY=[@ANYBLOB="11000000dd000000040000000000000000"], &(0x7f0000002480)={0x20, 0x0, 0x80000001}, &(0x7f0000002600)={0x78, 0xfffffffffffffff5, 0x6, {0x4, 0xdbba, 0x0, {0x5, 0x7, 0x3, 0x6, 0x7, 0x200, 0x3, 0x2, 0x20, 0xa000, 0x9, r2, 0x0, 0x7, 0x9}}}, &(0x7f0000002680)={0x90, 0x0, 0x0, {0x6, 0x3, 0x7fff, 0x2, 0x64, 0xfffffb36, {0x2, 0x1b1, 0x9, 0x8, 0x9, 0x8, 0x3, 0x0, 0xb7cd, 0x1000, 0x2, r3, 0xee01, 0x3}}}, &(0x7f0000002740)={0xa8, 0x0, 0x7ff, [{0x6, 0x100000001, 0x1, 0xffff7fff, ':'}, {0x4, 0x5, 0x8, 0x4, 'rootmode'}, {0x0, 0x25f2, 0x8, 0x3ff, 'rootmode'}, {0x3, 0x8000000000000000, 0x2, 0x0, 'fd'}, {0x3, 0x1f, 0x0, 0xc2c2}]}, &(0x7f0000004a40)={0x5c0, 0x0, 0x8, [{{0x2, 0x3, 0x10001, 0x10001, 0x52, 0x8000, {0x5, 0x2, 0x7fffffffffffffff, 0x5, 0xe7, 0x8, 0xffffffff, 0x3, 0x1, 0x6000, 0x20, r4, 0xee00, 0x80000000, 0x8001}}, {0x5, 0x0, 0x5, 0x7fffffff, 'fuse\x00'}}, {{0x1, 0x2, 0xd0, 0x0, 0x9, 0x80000001, {0x1, 0x100, 0x1, 0x9, 0x7, 0x0, 0x7, 0x1, 0x8, 0x4000, 0x2, 0xee00, r5, 0x3, 0x40}}, {0x1, 0x1, 0x2, 0xffff7fff, 'fd'}}, {{0x5, 0x1, 0x3, 0x1d, 0x3, 0x2, {0x2, 0x10001, 0xe0, 0x9, 0x5, 0x9, 0x3f, 0x7, 0x4, 0x1000, 0x80, 0x0, 0xee00, 0xa7, 0x8}}, {0x5, 0x401, 0x8, 0x7f, 'group_id'}}, {{0x0, 0x2, 0x6, 0x7, 0x5, 0x5, {0x2, 0x401, 0xf8, 0x5, 0x81, 0x2, 0x7b, 0x80000001, 0x81, 0x1000, 0x8000, 0x0, 0xee01, 0x3, 0x71}}, {0x1, 0x9, 0x8, 0x0, 'rootmode'}}, {{0x6, 0x3, 0x457, 0x8000000000000000, 0x4, 0x5, {0x3, 0x8, 0x1000, 0x1, 0xeaf, 0x5, 0x0, 0xffffff48, 0x2, 0x2000, 0x3, 0xffffffffffffffff, 0xee00, 0xde000000, 0x3199ecfe}}, {0x2, 0x2, 0x5, 0x7, 'fuse\x00'}}, {{0x1, 0x0, 0x1, 0x1, 0x100, 0x4, {0x5, 0xffffffffffff0001, 0x4, 0x80000000, 0x9, 0x0, 0x1, 0x6, 0x6, 0x4000, 0xfffffffc, 0xee01, 0x0, 0x5343, 0x3}}, {0x3, 0x8367, 0x11, 0x6, '/dev/dlm-monitor\x00'}}, {{0x0, 0x1, 0x5, 0xfbc, 0xc3, 0x2890, {0x4, 0x0, 0x6109, 0x6, 0x8, 0x7, 0x7, 0x7, 0x80000000, 0xa000, 0x2, 0x0, r6, 0x0, 0x10000}}, {0x1, 0x1, 0x1, 0x2, '('}}, {{0x6, 0x2, 0x9, 0x5, 0x17f8, 0x101, {0x3, 0x1, 0x3, 0x2, 0x8, 0x4, 0x8001, 0x40, 0x2d6, 0x4000, 0x4d4d, 0xee01, 0xffffffffffffffff, 0xfffff801, 0x8}}, {0x5, 0x8, 0x1, 0x81, ','}}, {{0x6, 0x0, 0x1, 0x7ff, 0x8, 0x5, {0x2, 0x0, 0x7f, 0x313, 0x4, 0xf1b, 0x8000, 0x5e0, 0x3659, 0x4000, 0x10001, 0xee00, 0xffffffffffffffff, 0x7, 0x4}}, {0x5, 0x5, 0x8, 0x40, 'group_id'}}]}, &(0x7f0000005000)={0xa0, 0x0, 0x4, {{0x3, 0x2, 0x3, 0x9, 0x2ef, 0xffff317a, {0x0, 0x3, 0x4, 0x2, 0x1, 0x0, 0x2, 0x7, 0x18fa4bd8, 0xa000, 0x4, 0xee00, 0xee01, 0xc4, 0x80000000}}, {0x0, 0x1}}}, &(0x7f00000050c0)={0x20, 0x0, 0x7, {0x76, 0x0, 0x16b6f997, 0x5}}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:19:54 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) statx(r0, &(0x7f00000024c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() read$FUSE(r0, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresgid(&(0x7f0000004840), &(0x7f0000004880)=0x0, &(0x7f00000048c0)) statx(r0, &(0x7f0000004900)='./file0\x00', 0x0, 0x200, &(0x7f0000004940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000000280)="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", 0x2000, &(0x7f0000005100)={&(0x7f0000000180)={0x50, 0xfffffffffffffffe, 0x1000, {0x7, 0x26, 0x8, 0x4000, 0x1, 0x7f, 0x1, 0x800}}, &(0x7f0000000200)={0x18, 0x0, 0x80000001, {0xc000000000000}}, &(0x7f0000002280)={0x18, 0x0, 0x4, {0x7f}}, &(0x7f00000022c0)={0x18, 0x0, 0x101, {0x80000001}}, &(0x7f0000002300)={0x18, 0x0, 0xffff, {0x7}}, &(0x7f0000002340)={0x28, 0x0, 0xe4, {{0x86, 0x20}}}, &(0x7f0000002380)={0x60, 0x0, 0xaed, {{0x100000001, 0x2, 0xa9, 0x5, 0x0, 0x1, 0x10000, 0x7f}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x3}}, &(0x7f0000002440)=ANY=[@ANYBLOB="11000000dd000000040000000000000000"], &(0x7f0000002480)={0x20, 0x0, 0x80000001}, &(0x7f0000002600)={0x78, 0xfffffffffffffff5, 0x6, {0x4, 0xdbba, 0x0, {0x5, 0x7, 0x3, 0x6, 0x7, 0x200, 0x3, 0x2, 0x20, 0xa000, 0x9, r2, 0x0, 0x7, 0x9}}}, &(0x7f0000002680)={0x90, 0x0, 0x0, {0x6, 0x3, 0x7fff, 0x2, 0x64, 0xfffffb36, {0x2, 0x1b1, 0x9, 0x8, 0x9, 0x8, 0x3, 0x0, 0xb7cd, 0x1000, 0x2, r3, 0xee01, 0x3}}}, &(0x7f0000002740)={0xa8, 0x0, 0x7ff, [{0x6, 0x100000001, 0x1, 0xffff7fff, ':'}, {0x4, 0x5, 0x8, 0x4, 'rootmode'}, {0x0, 0x25f2, 0x8, 0x3ff, 'rootmode'}, {0x3, 0x8000000000000000, 0x2, 0x0, 'fd'}, {0x3, 0x1f, 0x0, 0xc2c2}]}, &(0x7f0000004a40)={0x5c0, 0x0, 0x8, [{{0x2, 0x3, 0x10001, 0x10001, 0x52, 0x8000, {0x5, 0x2, 0x7fffffffffffffff, 0x5, 0xe7, 0x8, 0xffffffff, 0x3, 0x1, 0x6000, 0x20, r4, 0xee00, 0x80000000, 0x8001}}, {0x5, 0x0, 0x5, 0x7fffffff, 'fuse\x00'}}, {{0x1, 0x2, 0xd0, 0x0, 0x9, 0x80000001, {0x1, 0x100, 0x1, 0x9, 0x7, 0x0, 0x7, 0x1, 0x8, 0x4000, 0x2, 0xee00, r5, 0x3, 0x40}}, {0x1, 0x1, 0x2, 0xffff7fff, 'fd'}}, {{0x5, 0x1, 0x3, 0x1d, 0x3, 0x2, {0x2, 0x10001, 0xe0, 0x9, 0x5, 0x9, 0x3f, 0x7, 0x4, 0x1000, 0x80, 0x0, 0xee00, 0xa7, 0x8}}, {0x5, 0x401, 0x8, 0x7f, 'group_id'}}, {{0x0, 0x2, 0x6, 0x7, 0x5, 0x5, {0x2, 0x401, 0xf8, 0x5, 0x81, 0x2, 0x7b, 0x80000001, 0x81, 0x1000, 0x8000, 0x0, 0xee01, 0x3, 0x71}}, {0x1, 0x9, 0x8, 0x0, 'rootmode'}}, {{0x6, 0x3, 0x457, 0x8000000000000000, 0x4, 0x5, {0x3, 0x8, 0x1000, 0x1, 0xeaf, 0x5, 0x0, 0xffffff48, 0x2, 0x2000, 0x3, 0xffffffffffffffff, 0xee00, 0xde000000, 0x3199ecfe}}, {0x2, 0x2, 0x5, 0x7, 'fuse\x00'}}, {{0x1, 0x0, 0x1, 0x1, 0x100, 0x4, {0x5, 0xffffffffffff0001, 0x4, 0x80000000, 0x9, 0x0, 0x1, 0x6, 0x6, 0x4000, 0xfffffffc, 0xee01, 0x0, 0x5343, 0x3}}, {0x3, 0x8367, 0x11, 0x6, '/dev/dlm-monitor\x00'}}, {{0x0, 0x1, 0x5, 0xfbc, 0xc3, 0x2890, {0x4, 0x0, 0x6109, 0x6, 0x8, 0x7, 0x7, 0x7, 0x80000000, 0xa000, 0x2, 0x0, r6, 0x0, 0x10000}}, {0x1, 0x1, 0x1, 0x2, '('}}, {{0x6, 0x2, 0x9, 0x5, 0x17f8, 0x101, {0x3, 0x1, 0x3, 0x2, 0x8, 0x4, 0x8001, 0x40, 0x2d6, 0x4000, 0x4d4d, 0xee01, 0xffffffffffffffff, 0xfffff801, 0x8}}, {0x5, 0x8, 0x1, 0x81, ','}}, {{0x6, 0x0, 0x1, 0x7ff, 0x8, 0x5, {0x2, 0x0, 0x7f, 0x313, 0x4, 0xf1b, 0x8000, 0x5e0, 0x3659, 0x4000, 0x10001, 0xee00, 0xffffffffffffffff, 0x7, 0x4}}, {0x5, 0x5, 0x8, 0x40, 'group_id'}}]}, &(0x7f0000005000)={0xa0, 0x0, 0x4, {{0x3, 0x2, 0x3, 0x9, 0x2ef, 0xffff317a, {0x0, 0x3, 0x4, 0x2, 0x1, 0x0, 0x2, 0x7, 0x18fa4bd8, 0xa000, 0x4, 0xee00, 0xee01, 0xc4, 0x80000000}}, {0x0, 0x1}}}, &(0x7f00000050c0)={0x20, 0x0, 0x7, {0x76, 0x0, 0x16b6f997, 0x5}}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) statx(r0, &(0x7f00000024c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)) (async) geteuid() (async) read$FUSE(r0, &(0x7f0000002800)={0x2020}, 0x2020) (async) getresgid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) (async) statx(r0, &(0x7f0000004900)='./file0\x00', 0x0, 0x200, &(0x7f0000004940)) (async) syz_fuse_handle_req(r1, &(0x7f0000000280)="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", 0x2000, &(0x7f0000005100)={&(0x7f0000000180)={0x50, 0xfffffffffffffffe, 0x1000, {0x7, 0x26, 0x8, 0x4000, 0x1, 0x7f, 0x1, 0x800}}, &(0x7f0000000200)={0x18, 0x0, 0x80000001, {0xc000000000000}}, &(0x7f0000002280)={0x18, 0x0, 0x4, {0x7f}}, &(0x7f00000022c0)={0x18, 0x0, 0x101, {0x80000001}}, &(0x7f0000002300)={0x18, 0x0, 0xffff, {0x7}}, &(0x7f0000002340)={0x28, 0x0, 0xe4, {{0x86, 0x20}}}, &(0x7f0000002380)={0x60, 0x0, 0xaed, {{0x100000001, 0x2, 0xa9, 0x5, 0x0, 0x1, 0x10000, 0x7f}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x3}}, &(0x7f0000002440)=ANY=[@ANYBLOB="11000000dd000000040000000000000000"], &(0x7f0000002480)={0x20, 0x0, 0x80000001}, &(0x7f0000002600)={0x78, 0xfffffffffffffff5, 0x6, {0x4, 0xdbba, 0x0, {0x5, 0x7, 0x3, 0x6, 0x7, 0x200, 0x3, 0x2, 0x20, 0xa000, 0x9, r2, 0x0, 0x7, 0x9}}}, &(0x7f0000002680)={0x90, 0x0, 0x0, {0x6, 0x3, 0x7fff, 0x2, 0x64, 0xfffffb36, {0x2, 0x1b1, 0x9, 0x8, 0x9, 0x8, 0x3, 0x0, 0xb7cd, 0x1000, 0x2, r3, 0xee01, 0x3}}}, &(0x7f0000002740)={0xa8, 0x0, 0x7ff, [{0x6, 0x100000001, 0x1, 0xffff7fff, ':'}, {0x4, 0x5, 0x8, 0x4, 'rootmode'}, {0x0, 0x25f2, 0x8, 0x3ff, 'rootmode'}, {0x3, 0x8000000000000000, 0x2, 0x0, 'fd'}, {0x3, 0x1f, 0x0, 0xc2c2}]}, &(0x7f0000004a40)={0x5c0, 0x0, 0x8, [{{0x2, 0x3, 0x10001, 0x10001, 0x52, 0x8000, {0x5, 0x2, 0x7fffffffffffffff, 0x5, 0xe7, 0x8, 0xffffffff, 0x3, 0x1, 0x6000, 0x20, r4, 0xee00, 0x80000000, 0x8001}}, {0x5, 0x0, 0x5, 0x7fffffff, 'fuse\x00'}}, {{0x1, 0x2, 0xd0, 0x0, 0x9, 0x80000001, {0x1, 0x100, 0x1, 0x9, 0x7, 0x0, 0x7, 0x1, 0x8, 0x4000, 0x2, 0xee00, r5, 0x3, 0x40}}, {0x1, 0x1, 0x2, 0xffff7fff, 'fd'}}, {{0x5, 0x1, 0x3, 0x1d, 0x3, 0x2, {0x2, 0x10001, 0xe0, 0x9, 0x5, 0x9, 0x3f, 0x7, 0x4, 0x1000, 0x80, 0x0, 0xee00, 0xa7, 0x8}}, {0x5, 0x401, 0x8, 0x7f, 'group_id'}}, {{0x0, 0x2, 0x6, 0x7, 0x5, 0x5, {0x2, 0x401, 0xf8, 0x5, 0x81, 0x2, 0x7b, 0x80000001, 0x81, 0x1000, 0x8000, 0x0, 0xee01, 0x3, 0x71}}, {0x1, 0x9, 0x8, 0x0, 'rootmode'}}, {{0x6, 0x3, 0x457, 0x8000000000000000, 0x4, 0x5, {0x3, 0x8, 0x1000, 0x1, 0xeaf, 0x5, 0x0, 0xffffff48, 0x2, 0x2000, 0x3, 0xffffffffffffffff, 0xee00, 0xde000000, 0x3199ecfe}}, {0x2, 0x2, 0x5, 0x7, 'fuse\x00'}}, {{0x1, 0x0, 0x1, 0x1, 0x100, 0x4, {0x5, 0xffffffffffff0001, 0x4, 0x80000000, 0x9, 0x0, 0x1, 0x6, 0x6, 0x4000, 0xfffffffc, 0xee01, 0x0, 0x5343, 0x3}}, {0x3, 0x8367, 0x11, 0x6, '/dev/dlm-monitor\x00'}}, {{0x0, 0x1, 0x5, 0xfbc, 0xc3, 0x2890, {0x4, 0x0, 0x6109, 0x6, 0x8, 0x7, 0x7, 0x7, 0x80000000, 0xa000, 0x2, 0x0, r6, 0x0, 0x10000}}, {0x1, 0x1, 0x1, 0x2, '('}}, {{0x6, 0x2, 0x9, 0x5, 0x17f8, 0x101, {0x3, 0x1, 0x3, 0x2, 0x8, 0x4, 0x8001, 0x40, 0x2d6, 0x4000, 0x4d4d, 0xee01, 0xffffffffffffffff, 0xfffff801, 0x8}}, {0x5, 0x8, 0x1, 0x81, ','}}, {{0x6, 0x0, 0x1, 0x7ff, 0x8, 0x5, {0x2, 0x0, 0x7f, 0x313, 0x4, 0xf1b, 0x8000, 0x5e0, 0x3659, 0x4000, 0x10001, 0xee00, 0xffffffffffffffff, 0x7, 0x4}}, {0x5, 0x5, 0x8, 0x40, 'group_id'}}]}, &(0x7f0000005000)={0xa0, 0x0, 0x4, {{0x3, 0x2, 0x3, 0x9, 0x2ef, 0xffff317a, {0x0, 0x3, 0x4, 0x2, 0x1, 0x0, 0x2, 0x7, 0x18fa4bd8, 0xa000, 0x4, 0xee00, 0xee01, 0xc4, 0x80000000}}, {0x0, 0x1}}}, &(0x7f00000050c0)={0x20, 0x0, 0x7, {0x76, 0x0, 0x16b6f997, 0x5}}}) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:19:54 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) statx(r0, &(0x7f00000024c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = geteuid() (async) read$FUSE(r0, &(0x7f0000002800)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresgid(&(0x7f0000004840), &(0x7f0000004880)=0x0, &(0x7f00000048c0)) (async) statx(r0, &(0x7f0000004900)='./file0\x00', 0x0, 0x200, &(0x7f0000004940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f0000000280)="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", 0x2000, &(0x7f0000005100)={&(0x7f0000000180)={0x50, 0xfffffffffffffffe, 0x1000, {0x7, 0x26, 0x8, 0x4000, 0x1, 0x7f, 0x1, 0x800}}, &(0x7f0000000200)={0x18, 0x0, 0x80000001, {0xc000000000000}}, &(0x7f0000002280)={0x18, 0x0, 0x4, {0x7f}}, &(0x7f00000022c0)={0x18, 0x0, 0x101, {0x80000001}}, &(0x7f0000002300)={0x18, 0x0, 0xffff, {0x7}}, &(0x7f0000002340)={0x28, 0x0, 0xe4, {{0x86, 0x20}}}, &(0x7f0000002380)={0x60, 0x0, 0xaed, {{0x100000001, 0x2, 0xa9, 0x5, 0x0, 0x1, 0x10000, 0x7f}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x3}}, &(0x7f0000002440)=ANY=[@ANYBLOB="11000000dd000000040000000000000000"], &(0x7f0000002480)={0x20, 0x0, 0x80000001}, &(0x7f0000002600)={0x78, 0xfffffffffffffff5, 0x6, {0x4, 0xdbba, 0x0, {0x5, 0x7, 0x3, 0x6, 0x7, 0x200, 0x3, 0x2, 0x20, 0xa000, 0x9, r2, 0x0, 0x7, 0x9}}}, &(0x7f0000002680)={0x90, 0x0, 0x0, {0x6, 0x3, 0x7fff, 0x2, 0x64, 0xfffffb36, {0x2, 0x1b1, 0x9, 0x8, 0x9, 0x8, 0x3, 0x0, 0xb7cd, 0x1000, 0x2, r3, 0xee01, 0x3}}}, &(0x7f0000002740)={0xa8, 0x0, 0x7ff, [{0x6, 0x100000001, 0x1, 0xffff7fff, ':'}, {0x4, 0x5, 0x8, 0x4, 'rootmode'}, {0x0, 0x25f2, 0x8, 0x3ff, 'rootmode'}, {0x3, 0x8000000000000000, 0x2, 0x0, 'fd'}, {0x3, 0x1f, 0x0, 0xc2c2}]}, &(0x7f0000004a40)={0x5c0, 0x0, 0x8, [{{0x2, 0x3, 0x10001, 0x10001, 0x52, 0x8000, {0x5, 0x2, 0x7fffffffffffffff, 0x5, 0xe7, 0x8, 0xffffffff, 0x3, 0x1, 0x6000, 0x20, r4, 0xee00, 0x80000000, 0x8001}}, {0x5, 0x0, 0x5, 0x7fffffff, 'fuse\x00'}}, {{0x1, 0x2, 0xd0, 0x0, 0x9, 0x80000001, {0x1, 0x100, 0x1, 0x9, 0x7, 0x0, 0x7, 0x1, 0x8, 0x4000, 0x2, 0xee00, r5, 0x3, 0x40}}, {0x1, 0x1, 0x2, 0xffff7fff, 'fd'}}, {{0x5, 0x1, 0x3, 0x1d, 0x3, 0x2, {0x2, 0x10001, 0xe0, 0x9, 0x5, 0x9, 0x3f, 0x7, 0x4, 0x1000, 0x80, 0x0, 0xee00, 0xa7, 0x8}}, {0x5, 0x401, 0x8, 0x7f, 'group_id'}}, {{0x0, 0x2, 0x6, 0x7, 0x5, 0x5, {0x2, 0x401, 0xf8, 0x5, 0x81, 0x2, 0x7b, 0x80000001, 0x81, 0x1000, 0x8000, 0x0, 0xee01, 0x3, 0x71}}, {0x1, 0x9, 0x8, 0x0, 'rootmode'}}, {{0x6, 0x3, 0x457, 0x8000000000000000, 0x4, 0x5, {0x3, 0x8, 0x1000, 0x1, 0xeaf, 0x5, 0x0, 0xffffff48, 0x2, 0x2000, 0x3, 0xffffffffffffffff, 0xee00, 0xde000000, 0x3199ecfe}}, {0x2, 0x2, 0x5, 0x7, 'fuse\x00'}}, {{0x1, 0x0, 0x1, 0x1, 0x100, 0x4, {0x5, 0xffffffffffff0001, 0x4, 0x80000000, 0x9, 0x0, 0x1, 0x6, 0x6, 0x4000, 0xfffffffc, 0xee01, 0x0, 0x5343, 0x3}}, {0x3, 0x8367, 0x11, 0x6, '/dev/dlm-monitor\x00'}}, {{0x0, 0x1, 0x5, 0xfbc, 0xc3, 0x2890, {0x4, 0x0, 0x6109, 0x6, 0x8, 0x7, 0x7, 0x7, 0x80000000, 0xa000, 0x2, 0x0, r6, 0x0, 0x10000}}, {0x1, 0x1, 0x1, 0x2, '('}}, {{0x6, 0x2, 0x9, 0x5, 0x17f8, 0x101, {0x3, 0x1, 0x3, 0x2, 0x8, 0x4, 0x8001, 0x40, 0x2d6, 0x4000, 0x4d4d, 0xee01, 0xffffffffffffffff, 0xfffff801, 0x8}}, {0x5, 0x8, 0x1, 0x81, ','}}, {{0x6, 0x0, 0x1, 0x7ff, 0x8, 0x5, {0x2, 0x0, 0x7f, 0x313, 0x4, 0xf1b, 0x8000, 0x5e0, 0x3659, 0x4000, 0x10001, 0xee00, 0xffffffffffffffff, 0x7, 0x4}}, {0x5, 0x5, 0x8, 0x40, 'group_id'}}]}, &(0x7f0000005000)={0xa0, 0x0, 0x4, {{0x3, 0x2, 0x3, 0x9, 0x2ef, 0xffff317a, {0x0, 0x3, 0x4, 0x2, 0x1, 0x0, 0x2, 0x7, 0x18fa4bd8, 0xa000, 0x4, 0xee00, 0xee01, 0xc4, 0x80000000}}, {0x0, 0x1}}}, &(0x7f00000050c0)={0x20, 0x0, 0x7, {0x76, 0x0, 0x16b6f997, 0x5}}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:19:54 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) statx(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_DATA_SEQ={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) (async) statx(r0, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) [ 2060.879904] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2060.887172] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2060.894446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2060.901739] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2060.910358] FAULT_INJECTION: forcing a failure. [ 2060.910358] name failslab, interval 1, probability 0, space 0, times 0 [ 2060.927568] CPU: 0 PID: 25567 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2060.935472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2060.944823] Call Trace: [ 2060.947410] dump_stack+0x1b2/0x281 [ 2060.951041] should_fail.cold+0x10a/0x149 [ 2060.955190] should_failslab+0xd6/0x130 [ 2060.959167] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2060.963833] fuse_dev_alloc+0x4b/0x310 [ 2060.967709] ? task_active_pid_ns+0xa1/0xc0 [ 2060.972024] fuse_fill_super+0x79d/0x15c0 [ 2060.976162] ? fuse_get_root_inode+0xc0/0xc0 [ 2060.980550] ? up_write+0x17/0x60 [ 2060.983993] ? register_shrinker+0x15f/0x220 [ 2060.988391] ? sget_userns+0x768/0xc10 [ 2060.992363] ? get_anon_bdev+0x1c0/0x1c0 [ 2060.996425] ? sget+0xd9/0x110 [ 2060.999596] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.003984] mount_nodev+0x4c/0xf0 [ 2061.007508] mount_fs+0x92/0x2a0 [ 2061.010882] vfs_kern_mount.part.0+0x5b/0x470 [ 2061.015361] do_mount+0xe65/0x2a30 [ 2061.018928] ? copy_mount_string+0x40/0x40 [ 2061.023151] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2061.028151] ? copy_mnt_ns+0xa30/0xa30 [ 2061.032022] ? copy_mount_options+0x1fa/0x2f0 [ 2061.036496] ? copy_mnt_ns+0xa30/0xa30 [ 2061.040380] SyS_mount+0xa8/0x120 [ 2061.043821] ? copy_mnt_ns+0xa30/0xa30 [ 2061.047695] do_syscall_64+0x1d5/0x640 [ 2061.051570] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2061.056739] RIP: 0033:0x7f60c6f5e0c9 [ 2061.060430] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2061.068117] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2061.075378] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2061.082646] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2061.089905] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2061.097176] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2061.104446] CPU: 1 PID: 25566 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2061.112333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2061.121675] Call Trace: [ 2061.124246] dump_stack+0x1b2/0x281 [ 2061.127853] should_fail.cold+0x10a/0x149 [ 2061.131978] should_failslab+0xd6/0x130 [ 2061.135929] __kmalloc+0x2c1/0x400 [ 2061.139444] ? match_number+0x9d/0x200 [ 2061.143320] match_number+0x9d/0x200 [ 2061.147547] ? match_strdup+0xa0/0xa0 [ 2061.151324] ? register_shrinker+0x15a/0x220 [ 2061.155708] fuse_fill_super+0x3f2/0x15c0 [ 2061.159846] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.164232] ? up_write+0x17/0x60 [ 2061.167660] ? register_shrinker+0x15f/0x220 [ 2061.172054] ? sget_userns+0x768/0xc10 [ 2061.175919] ? get_anon_bdev+0x1c0/0x1c0 [ 2061.179955] ? sget+0xd9/0x110 [ 2061.183129] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.187526] mount_nodev+0x4c/0xf0 [ 2061.191049] mount_fs+0x92/0x2a0 [ 2061.194413] vfs_kern_mount.part.0+0x5b/0x470 [ 2061.198894] do_mount+0xe65/0x2a30 [ 2061.202457] ? retint_kernel+0x2d/0x2d [ 2061.206329] ? copy_mount_string+0x40/0x40 [ 2061.210545] ? audit_kill_trees+0x230/0x230 [ 2061.214848] ? copy_mount_options+0x1fa/0x2f0 [ 2061.219332] ? copy_mnt_ns+0xa30/0xa30 [ 2061.223215] SyS_mount+0xa8/0x120 [ 2061.226659] ? copy_mnt_ns+0xa30/0xa30 [ 2061.230591] do_syscall_64+0x1d5/0x640 [ 2061.234488] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2061.239659] RIP: 0033:0x7fa4d53ef0c9 [ 2061.243348] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2061.251071] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2061.258502] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2061.265750] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2061.273112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:19:54 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 13) 08:19:54 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x24480, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions}]}}) 08:19:54 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x40}}, 0x10) accept4$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x80000) getsockname$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:19:54 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10001}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x50}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc8c4) 08:19:54 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 15) 08:19:54 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 17) [ 2061.280358] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 08:19:54 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) fanotify_mark(r1, 0x4, 0x40, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x319802, 0x0) statx(r3, &(0x7f00000000c0)='./file0\x00', 0x100, 0x40, &(0x7f0000000340)) 08:19:54 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10001}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x50}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc8c4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10001}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x50}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc8c4) (async) [ 2061.371553] FAULT_INJECTION: forcing a failure. [ 2061.371553] name failslab, interval 1, probability 0, space 0, times 0 [ 2061.387730] FAULT_INJECTION: forcing a failure. [ 2061.387730] name failslab, interval 1, probability 0, space 0, times 0 [ 2061.400989] FAULT_INJECTION: forcing a failure. [ 2061.400989] name failslab, interval 1, probability 0, space 0, times 0 08:19:55 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) fanotify_mark(r1, 0x4, 0x40, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x319802, 0x0) statx(r3, &(0x7f00000000c0)='./file0\x00', 0x100, 0x40, &(0x7f0000000340)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80800}) (async) fanotify_mark(r1, 0x4, 0x40, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x319802, 0x0) (async) statx(r3, &(0x7f00000000c0)='./file0\x00', 0x100, 0x40, &(0x7f0000000340)) (async) 08:19:55 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x40}}, 0x10) accept4$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x80000) getsockname$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2061.414536] CPU: 0 PID: 25607 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2061.422429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2061.431778] Call Trace: [ 2061.434365] dump_stack+0x1b2/0x281 [ 2061.437998] should_fail.cold+0x10a/0x149 [ 2061.442239] should_failslab+0xd6/0x130 [ 2061.446212] __kmalloc+0x2c1/0x400 [ 2061.449744] ? match_strdup+0x58/0xa0 [ 2061.453540] ? map_id_down+0xe9/0x180 [ 2061.457339] match_strdup+0x58/0xa0 [ 2061.460973] fuse_fill_super+0x21d/0x15c0 [ 2061.465124] ? fuse_get_root_inode+0xc0/0xc0 08:19:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10001}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x50}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc8c4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, 0x0, 0x20, 0x70bd28, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x10001}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x50}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1ff}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0xc8c4) (async) 08:19:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8, 0x9) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c726f6f3d30303030303030303030303030303030303034303070302c757365725f69f18b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2061.469530] ? up_write+0x17/0x60 [ 2061.472978] ? register_shrinker+0x15f/0x220 [ 2061.477383] ? sget_userns+0x768/0xc10 [ 2061.481278] ? get_anon_bdev+0x1c0/0x1c0 [ 2061.485336] ? sget+0xd9/0x110 [ 2061.488632] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.493036] mount_nodev+0x4c/0xf0 [ 2061.496571] mount_fs+0x92/0x2a0 [ 2061.499969] vfs_kern_mount.part.0+0x5b/0x470 [ 2061.504465] do_mount+0xe65/0x2a30 [ 2061.508008] ? copy_mount_string+0x40/0x40 [ 2061.512241] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2061.517432] ? copy_mnt_ns+0xa30/0xa30 [ 2061.521319] ? copy_mount_options+0x1fa/0x2f0 [ 2061.525808] ? copy_mnt_ns+0xa30/0xa30 [ 2061.530053] SyS_mount+0xa8/0x120 [ 2061.533503] ? copy_mnt_ns+0xa30/0xa30 [ 2061.537420] do_syscall_64+0x1d5/0x640 [ 2061.541318] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2061.546510] RIP: 0033:0x7fa4d53ef0c9 [ 2061.550219] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2061.557910] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2061.565179] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2061.572429] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2061.579679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2061.586947] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2061.594228] CPU: 1 PID: 25609 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2061.602461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2061.611992] Call Trace: [ 2061.614576] dump_stack+0x1b2/0x281 [ 2061.618202] should_fail.cold+0x10a/0x149 [ 2061.622344] should_failslab+0xd6/0x130 [ 2061.626305] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2061.631396] bdi_alloc_node+0x5d/0x2e0 [ 2061.635269] super_setup_bdi_name+0x8b/0x220 [ 2061.639667] ? kill_block_super+0xe0/0xe0 [ 2061.643799] ? __lockdep_init_map+0x100/0x560 [ 2061.648274] ? do_raw_spin_unlock+0x164/0x220 [ 2061.652757] fuse_fill_super+0x937/0x15c0 [ 2061.656919] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.661328] ? up_write+0x17/0x60 [ 2061.664870] ? register_shrinker+0x15f/0x220 [ 2061.669267] ? sget_userns+0x768/0xc10 [ 2061.673147] ? get_anon_bdev+0x1c0/0x1c0 [ 2061.677187] ? sget+0xd9/0x110 [ 2061.680359] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.684839] mount_nodev+0x4c/0xf0 [ 2061.688360] mount_fs+0x92/0x2a0 [ 2061.691710] vfs_kern_mount.part.0+0x5b/0x470 [ 2061.696189] do_mount+0xe65/0x2a30 [ 2061.699728] ? copy_mount_string+0x40/0x40 [ 2061.703955] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2061.708954] ? copy_mnt_ns+0xa30/0xa30 [ 2061.712822] ? copy_mount_options+0x1fa/0x2f0 [ 2061.717297] ? copy_mnt_ns+0xa30/0xa30 [ 2061.721166] SyS_mount+0xa8/0x120 [ 2061.724599] ? copy_mnt_ns+0xa30/0xa30 [ 2061.728472] do_syscall_64+0x1d5/0x640 [ 2061.732345] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2061.737520] RIP: 0033:0x7f60c6f5e0c9 [ 2061.741213] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2061.748921] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2061.756178] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2061.763431] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2061.770841] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2061.778191] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2061.785454] CPU: 0 PID: 25608 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2061.793334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2061.802676] Call Trace: [ 2061.805256] dump_stack+0x1b2/0x281 [ 2061.808884] should_fail.cold+0x10a/0x149 [ 2061.813014] should_failslab+0xd6/0x130 [ 2061.816970] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2061.821617] fuse_fill_super+0x74f/0x15c0 [ 2061.825761] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.830151] ? up_write+0x17/0x60 [ 2061.833582] ? register_shrinker+0x15f/0x220 [ 2061.837967] ? sget_userns+0x768/0xc10 [ 2061.841834] ? get_anon_bdev+0x1c0/0x1c0 [ 2061.845870] ? sget+0xd9/0x110 [ 2061.849042] ? fuse_get_root_inode+0xc0/0xc0 [ 2061.853425] mount_nodev+0x4c/0xf0 [ 2061.856942] mount_fs+0x92/0x2a0 [ 2061.860287] vfs_kern_mount.part.0+0x5b/0x470 [ 2061.864765] do_mount+0xe65/0x2a30 [ 2061.868291] ? dib3000mb_get_frontend+0xd90/0x1150 [ 2061.873197] ? copy_mount_string+0x40/0x40 [ 2061.877408] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2061.882403] ? copy_mnt_ns+0xa30/0xa30 [ 2061.886267] ? copy_mount_options+0x1fa/0x2f0 [ 2061.890743] ? copy_mnt_ns+0xa30/0xa30 [ 2061.894606] SyS_mount+0xa8/0x120 [ 2061.898035] ? copy_mnt_ns+0xa30/0xa30 [ 2061.901916] do_syscall_64+0x1d5/0x640 [ 2061.905784] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2061.910957] RIP: 0033:0x7f80d8a040c9 [ 2061.914650] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:19:55 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 14) 08:19:55 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x40}}, 0x10) accept4$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x80000) getsockname$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)) (async) bind$tipc(r0, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x0, {0x40}}, 0x10) (async) accept4$tipc(r1, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x80000) (async) getsockname$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:19:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8, 0x9) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c726f6f3d30303030303030303030303030303030303034303070302c757365725f69f18b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:19:55 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 16) 08:19:55 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 18) [ 2061.922339] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2061.929593] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2061.936877] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2061.944129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2061.951377] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:19:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8, 0x9) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB="2c726f6f3d30303030303030303030303030303030303034303070302c757365725f69f18b", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:19:55 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x100, &(0x7f0000000240)) [ 2062.058554] FAULT_INJECTION: forcing a failure. [ 2062.058554] name failslab, interval 1, probability 0, space 0, times 0 [ 2062.085107] FAULT_INJECTION: forcing a failure. [ 2062.085107] name failslab, interval 1, probability 0, space 0, times 0 [ 2062.091234] CPU: 0 PID: 25646 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 08:19:55 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80800, 0x0, 0xffffffffffffffff}) fanotify_mark(r1, 0x4, 0x40, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x319802, 0x0) statx(r3, &(0x7f00000000c0)='./file0\x00', 0x100, 0x40, &(0x7f0000000340)) [ 2062.104192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2062.113540] Call Trace: [ 2062.116126] dump_stack+0x1b2/0x281 [ 2062.119761] should_fail.cold+0x10a/0x149 [ 2062.124256] should_failslab+0xd6/0x130 [ 2062.128218] __kmalloc+0x2c1/0x400 [ 2062.131765] ? match_strdup+0x58/0xa0 [ 2062.135560] ? map_id_down+0xe9/0x180 [ 2062.139357] match_strdup+0x58/0xa0 [ 2062.142974] fuse_fill_super+0x21d/0x15c0 [ 2062.147114] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.151591] ? up_write+0x17/0x60 [ 2062.155024] ? register_shrinker+0x15f/0x220 [ 2062.159418] ? sget_userns+0x768/0xc10 [ 2062.163297] ? get_anon_bdev+0x1c0/0x1c0 [ 2062.167377] ? sget+0xd9/0x110 [ 2062.170552] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.174956] mount_nodev+0x4c/0xf0 [ 2062.178480] mount_fs+0x92/0x2a0 [ 2062.181830] vfs_kern_mount.part.0+0x5b/0x470 [ 2062.186312] do_mount+0xe65/0x2a30 [ 2062.189858] ? copy_mount_string+0x40/0x40 [ 2062.194080] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2062.199096] ? copy_mnt_ns+0xa30/0xa30 [ 2062.202966] ? copy_mount_options+0x1fa/0x2f0 [ 2062.207527] ? copy_mnt_ns+0xa30/0xa30 [ 2062.211404] SyS_mount+0xa8/0x120 [ 2062.214836] ? copy_mnt_ns+0xa30/0xa30 [ 2062.218708] do_syscall_64+0x1d5/0x640 [ 2062.222590] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2062.227766] RIP: 0033:0x7fa4d53ef0c9 [ 2062.231461] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2062.239148] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2062.246413] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2062.253680] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2062.260942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2062.268205] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2062.275478] CPU: 1 PID: 25649 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2062.283363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2062.292796] Call Trace: [ 2062.295381] dump_stack+0x1b2/0x281 [ 2062.299013] should_fail.cold+0x10a/0x149 [ 2062.304377] should_failslab+0xd6/0x130 08:19:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="088e0415c30000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:19:55 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="088e0415c30000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2062.308359] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2062.312382] FAULT_INJECTION: forcing a failure. [ 2062.312382] name failslab, interval 1, probability 0, space 0, times 0 [ 2062.313032] wb_congested_get_create+0x15b/0x360 [ 2062.328960] wb_init+0x4f6/0x7c0 [ 2062.332324] ? __raw_spin_lock_init+0x28/0x100 [ 2062.336932] cgwb_bdi_init+0xe2/0x1e0 [ 2062.340730] bdi_alloc_node+0x224/0x2e0 [ 2062.344708] super_setup_bdi_name+0x8b/0x220 [ 2062.349115] ? kill_block_super+0xe0/0xe0 [ 2062.353258] ? __lockdep_init_map+0x100/0x560 [ 2062.357739] ? do_raw_spin_unlock+0x164/0x220 [ 2062.362243] fuse_fill_super+0x937/0x15c0 [ 2062.366504] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.370910] ? up_write+0x17/0x60 [ 2062.374353] ? register_shrinker+0x15f/0x220 [ 2062.378748] ? sget_userns+0x768/0xc10 [ 2062.382633] ? get_anon_bdev+0x1c0/0x1c0 [ 2062.386685] ? sget+0xd9/0x110 [ 2062.389869] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.394261] mount_nodev+0x4c/0xf0 [ 2062.397877] mount_fs+0x92/0x2a0 [ 2062.401235] vfs_kern_mount.part.0+0x5b/0x470 [ 2062.405718] do_mount+0xe65/0x2a30 [ 2062.409260] ? copy_mount_string+0x40/0x40 [ 2062.413481] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2062.418490] ? copy_mnt_ns+0xa30/0xa30 [ 2062.422373] ? copy_mount_options+0x1fa/0x2f0 [ 2062.426882] ? copy_mnt_ns+0xa30/0xa30 [ 2062.430771] SyS_mount+0xa8/0x120 [ 2062.434229] ? copy_mnt_ns+0xa30/0xa30 [ 2062.438102] do_syscall_64+0x1d5/0x640 [ 2062.441979] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2062.447149] RIP: 0033:0x7f60c6f5e0c9 [ 2062.450840] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:19:56 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="088e0415c30000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="088e0415c30000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) [ 2062.458530] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2062.465789] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2062.473057] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2062.480309] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2062.487565] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 08:19:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x100, &(0x7f0000000240)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x100, &(0x7f0000000240)) (async) [ 2062.506045] CPU: 0 PID: 25653 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2062.513969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2062.523317] Call Trace: [ 2062.525912] dump_stack+0x1b2/0x281 [ 2062.529549] should_fail.cold+0x10a/0x149 [ 2062.533702] should_failslab+0xd6/0x130 [ 2062.537762] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2062.542436] fuse_dev_alloc+0x4b/0x310 [ 2062.546326] ? task_active_pid_ns+0xa1/0xc0 [ 2062.550646] fuse_fill_super+0x79d/0x15c0 [ 2062.554893] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.559480] ? up_write+0x17/0x60 [ 2062.562938] ? register_shrinker+0x15f/0x220 [ 2062.567350] ? sget_userns+0x768/0xc10 [ 2062.571233] ? get_anon_bdev+0x1c0/0x1c0 [ 2062.575276] ? sget+0xd9/0x110 [ 2062.578455] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.582842] mount_nodev+0x4c/0xf0 [ 2062.586375] mount_fs+0x92/0x2a0 [ 2062.589736] vfs_kern_mount.part.0+0x5b/0x470 [ 2062.594229] do_mount+0xe65/0x2a30 [ 2062.597765] ? copy_mount_string+0x40/0x40 [ 2062.601980] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2062.606974] ? copy_mnt_ns+0xa30/0xa30 [ 2062.610862] ? copy_mount_options+0x1fa/0x2f0 [ 2062.615345] ? copy_mnt_ns+0xa30/0xa30 [ 2062.619211] SyS_mount+0xa8/0x120 [ 2062.622728] ? copy_mnt_ns+0xa30/0xa30 [ 2062.626592] do_syscall_64+0x1d5/0x640 [ 2062.630462] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2062.635641] RIP: 0033:0x7f80d8a040c9 [ 2062.639336] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2062.647025] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2062.654272] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 08:19:56 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 15) 08:19:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x100, &(0x7f0000000240)) (rerun: 32) 08:19:56 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096d6f64653d3030303030303030303013303030303030303430725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:19:56 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 17) 08:19:56 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 19) [ 2062.661517] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2062.668770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2062.676020] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:19:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0xd, 0xb7, 0x49eeb31f, 0x0], 0x4, 0x0, 0x0, 0xffffffffffffffff}) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0c00000001000000f1a0c5000000800400000001"], &(0x7f0000000280), 0xc00) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x140, 0x0) 08:19:56 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, r2, {0x8, 0x0, 0x7, 0x401}}, 0x20) [ 2062.776041] FAULT_INJECTION: forcing a failure. [ 2062.776041] name failslab, interval 1, probability 0, space 0, times 0 [ 2062.792829] FAULT_INJECTION: forcing a failure. [ 2062.792829] name failslab, interval 1, probability 0, space 0, times 0 [ 2062.799161] FAULT_INJECTION: forcing a failure. [ 2062.799161] name failslab, interval 1, probability 0, space 0, times 0 [ 2062.814182] CPU: 0 PID: 25691 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2062.823153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2062.832498] Call Trace: [ 2062.835087] dump_stack+0x1b2/0x281 [ 2062.838709] should_fail.cold+0x10a/0x149 [ 2062.842849] should_failslab+0xd6/0x130 [ 2062.846911] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2062.851568] fuse_fill_super+0x74f/0x15c0 [ 2062.855700] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.860110] ? up_write+0x17/0x60 [ 2062.863550] ? register_shrinker+0x15f/0x220 [ 2062.867959] ? sget_userns+0x768/0xc10 [ 2062.871839] ? get_anon_bdev+0x1c0/0x1c0 [ 2062.876052] ? sget+0xd9/0x110 [ 2062.879238] ? fuse_get_root_inode+0xc0/0xc0 [ 2062.883626] mount_nodev+0x4c/0xf0 [ 2062.887147] mount_fs+0x92/0x2a0 [ 2062.890504] vfs_kern_mount.part.0+0x5b/0x470 [ 2062.894981] do_mount+0xe65/0x2a30 [ 2062.898510] ? copy_mount_string+0x40/0x40 [ 2062.902732] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2062.907728] ? copy_mnt_ns+0xa30/0xa30 [ 2062.911595] ? copy_mount_options+0x1fa/0x2f0 [ 2062.916070] ? copy_mnt_ns+0xa30/0xa30 [ 2062.919937] SyS_mount+0xa8/0x120 [ 2062.923373] ? copy_mnt_ns+0xa30/0xa30 [ 2062.927240] do_syscall_64+0x1d5/0x640 [ 2062.931123] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2062.936297] RIP: 0033:0x7fa4d53ef0c9 [ 2062.939991] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2062.947681] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2062.954942] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2062.962279] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2062.969530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2062.976786] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2062.984048] CPU: 1 PID: 25696 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2062.991934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2063.001285] Call Trace: [ 2063.003869] dump_stack+0x1b2/0x281 [ 2063.007500] should_fail.cold+0x10a/0x149 [ 2063.011650] should_failslab+0xd6/0x130 [ 2063.015622] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2063.020283] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 2063.025375] device_create_groups_vargs+0x7b/0x250 [ 2063.030293] device_create_vargs+0x3a/0x50 [ 2063.034516] bdi_register_va.part.0+0x35/0x650 [ 2063.039084] bdi_register_va+0x63/0x80 [ 2063.043001] super_setup_bdi_name+0x123/0x220 [ 2063.047482] ? kill_block_super+0xe0/0xe0 [ 2063.051626] ? do_raw_spin_unlock+0x164/0x220 [ 2063.056107] fuse_fill_super+0x937/0x15c0 [ 2063.060256] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.064662] ? up_write+0x17/0x60 [ 2063.068098] ? register_shrinker+0x15f/0x220 [ 2063.072493] ? sget_userns+0x768/0xc10 [ 2063.076369] ? get_anon_bdev+0x1c0/0x1c0 [ 2063.080408] ? sget+0xd9/0x110 [ 2063.083580] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.087967] mount_nodev+0x4c/0xf0 [ 2063.091487] mount_fs+0x92/0x2a0 [ 2063.094838] vfs_kern_mount.part.0+0x5b/0x470 [ 2063.099320] do_mount+0xe65/0x2a30 [ 2063.102844] ? copy_mount_string+0x40/0x40 [ 2063.107074] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2063.112072] ? copy_mnt_ns+0xa30/0xa30 [ 2063.115965] ? copy_mount_options+0x1fa/0x2f0 [ 2063.120440] ? copy_mnt_ns+0xa30/0xa30 [ 2063.124308] SyS_mount+0xa8/0x120 [ 2063.127744] ? copy_mnt_ns+0xa30/0xa30 [ 2063.131719] do_syscall_64+0x1d5/0x640 [ 2063.135594] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2063.140771] RIP: 0033:0x7f60c6f5e0c9 [ 2063.144464] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2063.152322] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2063.159592] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2063.166857] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 08:19:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8, 0x0) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0xd, 0xb7, 0x49eeb31f, 0x0], 0x4, 0x0, 0x0, 0xffffffffffffffff}) (rerun: 64) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0c00000001000000f1a0c5000000800400000001"], &(0x7f0000000280), 0xc00) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async, rerun: 64) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x140, 0x0) (rerun: 64) 08:19:56 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096d6f64653d3030303030303030303013303030303030303430725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:19:56 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096d6f64653d3030303030303030303013303030303030303430725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2063.174117] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2063.181374] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2063.188638] CPU: 0 PID: 25692 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2063.196520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2063.205900] Call Trace: [ 2063.208483] dump_stack+0x1b2/0x281 [ 2063.212118] should_fail.cold+0x10a/0x149 [ 2063.216268] should_failslab+0xd6/0x130 [ 2063.220348] kmem_cache_alloc_node_trace+0x25a/0x400 08:19:56 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2063.225456] bdi_alloc_node+0x5d/0x2e0 [ 2063.229339] super_setup_bdi_name+0x8b/0x220 [ 2063.233756] ? kill_block_super+0xe0/0xe0 [ 2063.237900] ? __lockdep_init_map+0x100/0x560 [ 2063.242389] ? do_raw_spin_unlock+0x164/0x220 [ 2063.246891] fuse_fill_super+0x937/0x15c0 [ 2063.251036] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.255532] ? up_write+0x17/0x60 [ 2063.258979] ? register_shrinker+0x15f/0x220 [ 2063.263467] ? sget_userns+0x768/0xc10 [ 2063.267443] ? get_anon_bdev+0x1c0/0x1c0 [ 2063.271498] ? sget+0xd9/0x110 08:19:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0xd, 0xb7, 0x49eeb31f, 0x0], 0x4, 0x0, 0x0, 0xffffffffffffffff}) (rerun: 32) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="0c00000001000000f1a0c5000000800400000001"], &(0x7f0000000280), 0xc00) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x140, 0x0) [ 2063.274691] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.279096] mount_nodev+0x4c/0xf0 [ 2063.282636] mount_fs+0x92/0x2a0 [ 2063.286124] vfs_kern_mount.part.0+0x5b/0x470 [ 2063.290621] do_mount+0xe65/0x2a30 [ 2063.294169] ? copy_mount_string+0x40/0x40 [ 2063.298401] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2063.303457] ? copy_mnt_ns+0xa30/0xa30 [ 2063.307353] ? copy_mount_options+0x1fa/0x2f0 [ 2063.311844] ? copy_mnt_ns+0xa30/0xa30 [ 2063.315817] SyS_mount+0xa8/0x120 [ 2063.319266] ? copy_mnt_ns+0xa30/0xa30 [ 2063.323159] do_syscall_64+0x1d5/0x640 [ 2063.327049] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2063.332234] RIP: 0033:0x7f80d8a040c9 [ 2063.336108] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2063.343808] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2063.351073] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2063.358332] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2063.365745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:19:56 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 16) 08:19:56 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:19:56 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:19:56 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 20) 08:19:56 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 18) [ 2063.373085] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:19:57 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async, rerun: 64) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async, rerun: 64) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, r2, {0x8, 0x0, 0x7, 0x401}}, 0x20) 08:19:57 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (rerun: 64) 08:19:57 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 2063.468448] FAULT_INJECTION: forcing a failure. [ 2063.468448] name failslab, interval 1, probability 0, space 0, times 0 [ 2063.510592] FAULT_INJECTION: forcing a failure. [ 2063.510592] name failslab, interval 1, probability 0, space 0, times 0 [ 2063.513415] CPU: 0 PID: 25725 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2063.522891] FAULT_INJECTION: forcing a failure. [ 2063.522891] name failslab, interval 1, probability 0, space 0, times 0 [ 2063.529796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2063.529801] Call Trace: [ 2063.529818] dump_stack+0x1b2/0x281 [ 2063.529832] should_fail.cold+0x10a/0x149 [ 2063.529851] should_failslab+0xd6/0x130 [ 2063.564959] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2063.569637] fuse_dev_alloc+0x4b/0x310 [ 2063.573508] ? task_active_pid_ns+0xa1/0xc0 [ 2063.577811] fuse_fill_super+0x79d/0x15c0 [ 2063.581946] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.586334] ? up_write+0x17/0x60 [ 2063.589854] ? register_shrinker+0x15f/0x220 [ 2063.594245] ? sget_userns+0x768/0xc10 [ 2063.598119] ? get_anon_bdev+0x1c0/0x1c0 [ 2063.602159] ? sget+0xd9/0x110 [ 2063.605351] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.609791] mount_nodev+0x4c/0xf0 [ 2063.613323] mount_fs+0x92/0x2a0 [ 2063.616670] vfs_kern_mount.part.0+0x5b/0x470 [ 2063.621146] do_mount+0xe65/0x2a30 [ 2063.624673] ? copy_mount_string+0x40/0x40 [ 2063.628887] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2063.633902] ? copy_mnt_ns+0xa30/0xa30 [ 2063.637780] ? copy_mount_options+0x1fa/0x2f0 [ 2063.642253] ? copy_mnt_ns+0xa30/0xa30 [ 2063.646124] SyS_mount+0xa8/0x120 [ 2063.649557] ? copy_mnt_ns+0xa30/0xa30 [ 2063.653423] do_syscall_64+0x1d5/0x640 [ 2063.657296] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2063.662467] RIP: 0033:0x7fa4d53ef0c9 [ 2063.666156] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2063.673843] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2063.681091] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2063.688360] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2063.695717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2063.702964] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2063.710232] CPU: 1 PID: 25730 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2063.718114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2063.727462] Call Trace: [ 2063.730047] dump_stack+0x1b2/0x281 [ 2063.733676] should_fail.cold+0x10a/0x149 [ 2063.737910] should_failslab+0xd6/0x130 [ 2063.741890] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2063.746555] wb_congested_get_create+0x15b/0x360 [ 2063.751310] wb_init+0x4f6/0x7c0 [ 2063.754676] ? __raw_spin_lock_init+0x28/0x100 [ 2063.759253] cgwb_bdi_init+0xe2/0x1e0 [ 2063.763049] bdi_alloc_node+0x224/0x2e0 [ 2063.767021] super_setup_bdi_name+0x8b/0x220 [ 2063.771526] ? kill_block_super+0xe0/0xe0 [ 2063.775668] ? __lockdep_init_map+0x100/0x560 [ 2063.780769] ? do_raw_spin_unlock+0x164/0x220 [ 2063.785265] fuse_fill_super+0x937/0x15c0 [ 2063.789416] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.793821] ? up_write+0x17/0x60 [ 2063.797279] ? register_shrinker+0x15f/0x220 [ 2063.801692] ? sget_userns+0x768/0xc10 [ 2063.805588] ? get_anon_bdev+0x1c0/0x1c0 [ 2063.809644] ? sget+0xd9/0x110 [ 2063.812831] ? fuse_get_root_inode+0xc0/0xc0 [ 2063.817235] mount_nodev+0x4c/0xf0 [ 2063.820770] mount_fs+0x92/0x2a0 [ 2063.824135] vfs_kern_mount.part.0+0x5b/0x470 [ 2063.828626] do_mount+0xe65/0x2a30 [ 2063.832174] ? copy_mount_string+0x40/0x40 [ 2063.836412] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2063.841427] ? copy_mnt_ns+0xa30/0xa30 [ 2063.845312] ? copy_mount_options+0x1fa/0x2f0 [ 2063.849807] ? copy_mnt_ns+0xa30/0xa30 [ 2063.853736] SyS_mount+0xa8/0x120 [ 2063.857183] ? copy_mnt_ns+0xa30/0xa30 08:19:57 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) futimesat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000180)={{}, {0x0, 0x2710}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:19:57 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 17) 08:19:57 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) futimesat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000180)={{}, {0x0, 0x2710}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2063.861066] do_syscall_64+0x1d5/0x640 [ 2063.864956] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2063.870140] RIP: 0033:0x7f80d8a040c9 [ 2063.873844] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2063.881544] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2063.888808] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2063.896171] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2063.903435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:19:57 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) [ 2063.904690] FAULT_INJECTION: forcing a failure. [ 2063.904690] name failslab, interval 1, probability 0, space 0, times 0 [ 2063.910696] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2063.934244] CPU: 1 PID: 25729 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2063.942148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2063.951677] Call Trace: [ 2063.954263] dump_stack+0x1b2/0x281 [ 2063.957974] should_fail.cold+0x10a/0x149 08:19:57 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) futimesat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000180)={{}, {0x0, 0x2710}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2063.962124] should_failslab+0xd6/0x130 [ 2063.966087] __kmalloc_track_caller+0x2bc/0x400 [ 2063.970757] ? kvasprintf_const+0x55/0x180 [ 2063.974986] kvasprintf+0xa8/0x100 [ 2063.978512] ? bust_spinlocks+0xc0/0xc0 [ 2063.982484] kvasprintf_const+0x55/0x180 [ 2063.986541] kobject_set_name_vargs+0x56/0x150 [ 2063.991169] device_create_groups_vargs+0x1a2/0x250 [ 2063.996183] device_create_vargs+0x3a/0x50 [ 2064.000409] bdi_register_va.part.0+0x35/0x650 [ 2064.005081] bdi_register_va+0x63/0x80 08:19:57 executing program 5: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000200)=0x6, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x5, 0x8) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r6, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x65}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getsockname$tipc(r7, &(0x7f0000000100)=@name, &(0x7f0000000340)=0x10) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000500), &(0x7f0000000540)=0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x108008, &(0x7f0000000280)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}]}}) r8 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000000140), &(0x7f00000001c0)=0x4) [ 2064.008961] super_setup_bdi_name+0x123/0x220 [ 2064.013447] ? kill_block_super+0xe0/0xe0 [ 2064.017605] ? do_raw_spin_unlock+0x164/0x220 [ 2064.022103] fuse_fill_super+0x937/0x15c0 [ 2064.026250] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.030655] ? up_write+0x17/0x60 [ 2064.034099] ? register_shrinker+0x15f/0x220 [ 2064.038508] ? sget_userns+0x768/0xc10 [ 2064.042400] ? get_anon_bdev+0x1c0/0x1c0 [ 2064.046449] ? sget+0xd9/0x110 [ 2064.049638] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.054123] mount_nodev+0x4c/0xf0 [ 2064.057652] mount_fs+0x92/0x2a0 [ 2064.061012] vfs_kern_mount.part.0+0x5b/0x470 [ 2064.065507] do_mount+0xe65/0x2a30 [ 2064.069044] ? do_raw_spin_unlock+0x164/0x220 [ 2064.073536] ? copy_mount_string+0x40/0x40 [ 2064.077765] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2064.082782] ? copy_mnt_ns+0xa30/0xa30 [ 2064.086666] ? copy_mount_options+0x1fa/0x2f0 [ 2064.091146] ? copy_mnt_ns+0xa30/0xa30 [ 2064.095020] SyS_mount+0xa8/0x120 [ 2064.098458] ? copy_mnt_ns+0xa30/0xa30 [ 2064.102345] do_syscall_64+0x1d5/0x640 [ 2064.106232] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 08:19:57 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x4, &(0x7f0000000000)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2064.111414] RIP: 0033:0x7f60c6f5e0c9 [ 2064.115113] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2064.122809] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2064.130061] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2064.137317] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2064.144575] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2064.151827] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2064.163394] CPU: 0 PID: 25749 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2064.171287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2064.180633] Call Trace: [ 2064.183219] dump_stack+0x1b2/0x281 [ 2064.186848] should_fail.cold+0x10a/0x149 [ 2064.191000] should_failslab+0xd6/0x130 [ 2064.195063] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2064.199733] fuse_fill_super+0x74f/0x15c0 [ 2064.203969] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.208375] ? up_write+0x17/0x60 [ 2064.211824] ? register_shrinker+0x15f/0x220 [ 2064.216230] ? sget_userns+0x768/0xc10 [ 2064.220120] ? get_anon_bdev+0x1c0/0x1c0 [ 2064.224281] ? sget+0xd9/0x110 [ 2064.227476] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.231178] FAULT_INJECTION: forcing a failure. [ 2064.231178] name failslab, interval 1, probability 0, space 0, times 0 [ 2064.231881] mount_nodev+0x4c/0xf0 [ 2064.231891] mount_fs+0x92/0x2a0 [ 2064.231906] vfs_kern_mount.part.0+0x5b/0x470 [ 2064.254404] do_mount+0xe65/0x2a30 [ 2064.257927] ? retint_kernel+0x2d/0x2d [ 2064.261801] ? copy_mount_string+0x40/0x40 [ 2064.266019] ? __sanitizer_cov_trace_pc+0x3d/0x50 [ 2064.270844] ? copy_mount_options+0x1fa/0x2f0 [ 2064.275320] ? copy_mnt_ns+0xa30/0xa30 [ 2064.279189] SyS_mount+0xa8/0x120 [ 2064.282623] ? copy_mnt_ns+0xa30/0xa30 [ 2064.286492] do_syscall_64+0x1d5/0x640 [ 2064.290369] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2064.295539] RIP: 0033:0x7fa4d53ef0c9 [ 2064.299228] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2064.306917] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 08:19:57 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 21) [ 2064.314167] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2064.321441] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2064.328690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2064.335939] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2064.343290] CPU: 1 PID: 25769 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2064.351176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2064.360540] Call Trace: 08:19:57 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 19) [ 2064.363124] dump_stack+0x1b2/0x281 [ 2064.366755] should_fail.cold+0x10a/0x149 [ 2064.370904] should_failslab+0xd6/0x130 [ 2064.374893] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2064.379559] device_add+0xd72/0x15c0 [ 2064.383269] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2064.388823] ? kfree_const+0x33/0x40 [ 2064.392532] ? device_is_dependent+0x2a0/0x2a0 [ 2064.397109] ? kfree+0x1f0/0x250 [ 2064.400474] device_create_groups_vargs+0x1dc/0x250 [ 2064.405496] device_create_vargs+0x3a/0x50 [ 2064.409732] bdi_register_va.part.0+0x35/0x650 [ 2064.414316] bdi_register_va+0x63/0x80 [ 2064.418212] super_setup_bdi_name+0x123/0x220 [ 2064.420154] FAULT_INJECTION: forcing a failure. [ 2064.420154] name failslab, interval 1, probability 0, space 0, times 0 [ 2064.422785] ? kill_block_super+0xe0/0xe0 [ 2064.422799] ? do_raw_spin_unlock+0x164/0x220 [ 2064.422812] fuse_fill_super+0x937/0x15c0 [ 2064.422823] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.422834] ? up_write+0x17/0x60 [ 2064.422841] ? register_shrinker+0x15f/0x220 [ 2064.422849] ? sget_userns+0x768/0xc10 [ 2064.422864] ? get_anon_bdev+0x1c0/0x1c0 [ 2064.422877] ? sget+0xd9/0x110 [ 2064.470174] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.474563] mount_nodev+0x4c/0xf0 [ 2064.478091] mount_fs+0x92/0x2a0 [ 2064.481445] vfs_kern_mount.part.0+0x5b/0x470 [ 2064.485956] do_mount+0xe65/0x2a30 [ 2064.489537] ? copy_mount_string+0x40/0x40 [ 2064.493771] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2064.498777] ? copy_mnt_ns+0xa30/0xa30 [ 2064.502653] ? copy_mount_options+0x1fa/0x2f0 [ 2064.507141] ? copy_mnt_ns+0xa30/0xa30 [ 2064.511025] SyS_mount+0xa8/0x120 [ 2064.514461] ? copy_mnt_ns+0xa30/0xa30 [ 2064.518336] do_syscall_64+0x1d5/0x640 [ 2064.522211] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2064.527407] RIP: 0033:0x7f60c6f5e0c9 [ 2064.531096] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2064.538784] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2064.546035] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2064.553291] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2064.560986] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2064.568242] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2064.575513] CPU: 0 PID: 25775 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2064.583411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2064.592763] Call Trace: [ 2064.595375] dump_stack+0x1b2/0x281 [ 2064.599010] should_fail.cold+0x10a/0x149 [ 2064.603155] should_failslab+0xd6/0x130 [ 2064.607118] __kmalloc_track_caller+0x2bc/0x400 [ 2064.611778] ? kvasprintf_const+0x55/0x180 [ 2064.616062] kvasprintf+0xa8/0x100 [ 2064.619598] ? bust_spinlocks+0xc0/0xc0 [ 2064.623575] kvasprintf_const+0x55/0x180 [ 2064.627644] kobject_set_name_vargs+0x56/0x150 [ 2064.632480] device_create_groups_vargs+0x1a2/0x250 [ 2064.637512] device_create_vargs+0x3a/0x50 [ 2064.641745] bdi_register_va.part.0+0x35/0x650 [ 2064.646331] bdi_register_va+0x63/0x80 [ 2064.650211] super_setup_bdi_name+0x123/0x220 [ 2064.654691] ? kill_block_super+0xe0/0xe0 [ 2064.658824] ? do_raw_spin_unlock+0x164/0x220 [ 2064.663363] fuse_fill_super+0x937/0x15c0 [ 2064.667503] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.671904] ? up_write+0x17/0x60 [ 2064.675347] ? register_shrinker+0x15f/0x220 [ 2064.679829] ? sget_userns+0x768/0xc10 [ 2064.683701] ? get_anon_bdev+0x1c0/0x1c0 [ 2064.687757] ? sget+0xd9/0x110 [ 2064.690940] ? fuse_get_root_inode+0xc0/0xc0 [ 2064.695329] mount_nodev+0x4c/0xf0 [ 2064.698864] mount_fs+0x92/0x2a0 [ 2064.702215] vfs_kern_mount.part.0+0x5b/0x470 [ 2064.706688] do_mount+0xe65/0x2a30 [ 2064.710303] ? copy_mount_string+0x40/0x40 [ 2064.714606] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2064.719605] ? copy_mnt_ns+0xa30/0xa30 [ 2064.723488] ? copy_mount_options+0x1fa/0x2f0 [ 2064.727965] ? copy_mnt_ns+0xa30/0xa30 [ 2064.731839] SyS_mount+0xa8/0x120 [ 2064.735269] ? copy_mnt_ns+0xa30/0xa30 [ 2064.739138] do_syscall_64+0x1d5/0x640 [ 2064.743010] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2064.748176] RIP: 0033:0x7f80d8a040c9 [ 2064.751878] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:19:58 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, r2, {0x8, 0x0, 0x7, 0x401}}, 0x20) 08:19:58 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x4, &(0x7f0000000000)) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:19:58 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 18) 08:19:58 executing program 5: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000200)=0x6, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x5, 0x8) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r6, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x65}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getsockname$tipc(r7, &(0x7f0000000100)=@name, &(0x7f0000000340)=0x10) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000500), &(0x7f0000000540)=0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x108008, &(0x7f0000000280)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}]}}) r8 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000000140), &(0x7f00000001c0)=0x4) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) (async) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000200)=0x6, 0x8) (async) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x5, 0x8) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000380)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r6, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x65}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) getsockname$tipc(r7, &(0x7f0000000100)=@name, &(0x7f0000000340)=0x10) (async) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000500), &(0x7f0000000540)=0x4) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x108008, &(0x7f0000000280)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}]}}) (async) socket$tipc(0x1e, 0x2, 0x0) (async) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000000140), &(0x7f00000001c0)=0x4) (async) 08:19:58 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 22) [ 2064.759583] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2064.766841] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2064.774108] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2064.781355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2064.788603] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2064.866641] FAULT_INJECTION: forcing a failure. [ 2064.866641] name failslab, interval 1, probability 0, space 0, times 0 [ 2064.882314] CPU: 0 PID: 25786 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2064.890240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2064.899592] Call Trace: [ 2064.902198] dump_stack+0x1b2/0x281 [ 2064.905920] should_fail.cold+0x10a/0x149 [ 2064.910071] should_failslab+0xd6/0x130 [ 2064.914053] __kmalloc_track_caller+0x2bc/0x400 [ 2064.918736] ? kstrdup_const+0x35/0x60 [ 2064.922627] kstrdup+0x36/0x70 [ 2064.925822] kstrdup_const+0x35/0x60 [ 2064.929541] __kernfs_new_node+0x2e/0x470 [ 2064.931968] FAULT_INJECTION: forcing a failure. [ 2064.931968] name failslab, interval 1, probability 0, space 0, times 0 [ 2064.933688] kernfs_create_dir_ns+0x8c/0x200 [ 2064.933701] sysfs_create_dir_ns+0xb7/0x1d0 [ 2064.933712] kobject_add_internal+0x28b/0x930 [ 2064.933730] kobject_add+0x11f/0x180 [ 2064.961802] ? kset_create_and_add+0x190/0x190 [ 2064.966478] device_add+0x33f/0x15c0 [ 2064.970227] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2064.975670] ? kfree_const+0x33/0x40 [ 2064.979374] ? device_is_dependent+0x2a0/0x2a0 [ 2064.983946] ? kfree+0x1f0/0x250 [ 2064.987310] device_create_groups_vargs+0x1dc/0x250 [ 2064.992331] device_create_vargs+0x3a/0x50 [ 2064.996573] bdi_register_va.part.0+0x35/0x650 [ 2065.001155] bdi_register_va+0x63/0x80 [ 2065.005034] super_setup_bdi_name+0x123/0x220 [ 2065.009521] ? kill_block_super+0xe0/0xe0 [ 2065.013658] ? do_raw_spin_unlock+0x164/0x220 [ 2065.018160] fuse_fill_super+0x937/0x15c0 [ 2065.022312] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.026711] ? up_write+0x17/0x60 [ 2065.030152] ? register_shrinker+0x15f/0x220 [ 2065.034586] ? sget_userns+0x768/0xc10 [ 2065.038480] ? get_anon_bdev+0x1c0/0x1c0 [ 2065.042528] ? sget+0xd9/0x110 [ 2065.045712] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.050205] mount_nodev+0x4c/0xf0 [ 2065.053734] mount_fs+0x92/0x2a0 [ 2065.057089] vfs_kern_mount.part.0+0x5b/0x470 [ 2065.061573] do_mount+0xe65/0x2a30 [ 2065.065119] ? copy_mount_string+0x40/0x40 [ 2065.069342] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2065.074342] ? copy_mnt_ns+0xa30/0xa30 [ 2065.078211] ? copy_mount_options+0x1fa/0x2f0 [ 2065.082693] ? copy_mnt_ns+0xa30/0xa30 [ 2065.086754] SyS_mount+0xa8/0x120 [ 2065.090190] ? copy_mnt_ns+0xa30/0xa30 [ 2065.094065] do_syscall_64+0x1d5/0x640 [ 2065.097943] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2065.103113] RIP: 0033:0x7f60c6f5e0c9 [ 2065.106835] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:19:58 executing program 5: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000200)=0x6, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x5, 0x8) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r6, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x65}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) getsockname$tipc(r7, &(0x7f0000000100)=@name, &(0x7f0000000340)=0x10) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000500), &(0x7f0000000540)=0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x108008, &(0x7f0000000280)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}]}}) r8 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000000140), &(0x7f00000001c0)=0x4) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) (async) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000200)=0x6, 0x8) (async) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000180)=0x5, 0x8) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000380)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x3c, r6, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x65}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) getsockname$tipc(r7, &(0x7f0000000100)=@name, &(0x7f0000000340)=0x10) (async) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000500), &(0x7f0000000540)=0x4) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x108008, &(0x7f0000000280)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}]}}) (async) socket$tipc(0x1e, 0x2, 0x0) (async) getsockopt$TIPC_DEST_DROPPABLE(r8, 0x10f, 0x81, &(0x7f0000000140), &(0x7f00000001c0)=0x4) (async) 08:19:58 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x4, &(0x7f0000000000)) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2065.114530] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2065.121788] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2065.129066] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2065.136332] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2065.144027] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2065.151314] CPU: 1 PID: 25785 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2065.158382] kobject_add_internal failed for 0:59 (error: -12 parent: bdi) [ 2065.159197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2065.159201] Call Trace: [ 2065.159217] dump_stack+0x1b2/0x281 [ 2065.159232] should_fail.cold+0x10a/0x149 [ 2065.185786] should_failslab+0xd6/0x130 [ 2065.189759] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2065.194601] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 2065.199701] device_create_groups_vargs+0x7b/0x250 [ 2065.204620] device_create_vargs+0x3a/0x50 [ 2065.208839] bdi_register_va.part.0+0x35/0x650 [ 2065.213399] bdi_register_va+0x63/0x80 [ 2065.217263] super_setup_bdi_name+0x123/0x220 [ 2065.221735] ? kill_block_super+0xe0/0xe0 [ 2065.225860] ? do_raw_spin_unlock+0x164/0x220 [ 2065.230333] fuse_fill_super+0x937/0x15c0 [ 2065.234582] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.238988] ? up_write+0x17/0x60 [ 2065.242440] ? register_shrinker+0x15f/0x220 [ 2065.246827] ? sget_userns+0x768/0xc10 [ 2065.250703] ? get_anon_bdev+0x1c0/0x1c0 [ 2065.254832] ? sget+0xd9/0x110 [ 2065.258004] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.262390] mount_nodev+0x4c/0xf0 [ 2065.265918] mount_fs+0x92/0x2a0 [ 2065.269265] vfs_kern_mount.part.0+0x5b/0x470 [ 2065.273827] do_mount+0xe65/0x2a30 [ 2065.277347] ? copy_mount_string+0x40/0x40 [ 2065.281563] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2065.286558] ? copy_mnt_ns+0xa30/0xa30 [ 2065.290433] ? copy_mount_options+0x1fa/0x2f0 [ 2065.294906] ? copy_mnt_ns+0xa30/0xa30 [ 2065.298774] SyS_mount+0xa8/0x120 [ 2065.302208] ? copy_mnt_ns+0xa30/0xa30 [ 2065.306072] do_syscall_64+0x1d5/0x640 [ 2065.309957] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2065.315125] RIP: 0033:0x7fa4d53ef0c9 08:19:58 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 23) 08:19:58 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x200010, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c6a6f3030303030303030303034303030302c757365725f69643dbb43789ce47d92229f6167a3a16d2a28dec4071263fefa812e89caa30797dfee04cbc43c1856de3ffdf620a23052e055853128f6b45daedaf2709ae0f2bfb7345e5314311b9b222a0e1792edafa566e5bbaccfe9e46e8511fe390f00561506000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce4ddcd0d466cd149eafdae46cf5f20fa09"]) 08:19:58 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 20) 08:19:58 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1400) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB="66643df38c0e0481d852c5aa70b16917554d5834816c34a55028ab7bd92fdeb1a9975fb8644fd571ab1a2cc6addd794fadc22a5d942ba16f09105ceb5a5719d77224f8b4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0001"]) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="8bce81925c0d6b49131ce2661b1beb1cc68f48728db5e3bc2ebc7acb4cdc25048900e65d7394424cf17d04f2b7ea3b1164") r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) renameat2(r2, &(0x7f0000000280)='./file0\x00', r3, &(0x7f00000002c0)='./file0\x00', 0x6) 08:19:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8810}, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x200c00, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) statx(r3, &(0x7f0000000100)='./file1\x00', 0x1000, 0x0, &(0x7f0000000140)) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000380), 0x1, 0x430000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000000c0)) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f00000003c0)=0x10000) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000080)) [ 2065.318837] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2065.326523] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2065.333779] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2065.341026] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2065.348270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2065.355604] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 08:19:58 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 19) 08:19:59 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1400) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB="66643df38c0e0481d852c5aa70b16917554d5834816c34a55028ab7bd92fdeb1a9975fb8644fd571ab1a2cc6addd794fadc22a5d942ba16f09105ceb5a5719d77224f8b4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0001"]) (async) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="8bce81925c0d6b49131ce2661b1beb1cc68f48728db5e3bc2ebc7acb4cdc25048900e65d7394424cf17d04f2b7ea3b1164") r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) renameat2(r2, &(0x7f0000000280)='./file0\x00', r3, &(0x7f00000002c0)='./file0\x00', 0x6) 08:19:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8810}, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x200c00, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) statx(r3, &(0x7f0000000100)='./file1\x00', 0x1000, 0x0, &(0x7f0000000140)) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000380), 0x1, 0x430000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000000c0)) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f00000003c0)=0x10000) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8810}, 0x4) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x200c00, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) statx(r3, &(0x7f0000000100)='./file1\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) (async) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000240)) (async) syz_open_dev$sg(&(0x7f0000000380), 0x1, 0x430000) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000000c0)) (async) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f00000003c0)=0x10000) (async) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000080)) (async) [ 2065.452725] FAULT_INJECTION: forcing a failure. [ 2065.452725] name failslab, interval 1, probability 0, space 0, times 0 [ 2065.483029] FAULT_INJECTION: forcing a failure. [ 2065.483029] name failslab, interval 1, probability 0, space 0, times 0 [ 2065.502342] FAULT_INJECTION: forcing a failure. [ 2065.502342] name failslab, interval 1, probability 0, space 0, times 0 [ 2065.515851] CPU: 0 PID: 25839 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2065.523745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2065.533090] Call Trace: [ 2065.536018] dump_stack+0x1b2/0x281 [ 2065.539641] should_fail.cold+0x10a/0x149 [ 2065.543779] should_failslab+0xd6/0x130 [ 2065.547754] kmem_cache_alloc+0x28e/0x3c0 [ 2065.551893] __kernfs_new_node+0x6f/0x470 [ 2065.556044] kernfs_create_dir_ns+0x8c/0x200 [ 2065.560449] sysfs_create_dir_ns+0xb7/0x1d0 [ 2065.564847] kobject_add_internal+0x28b/0x930 [ 2065.569339] kobject_add+0x11f/0x180 [ 2065.573046] ? kset_create_and_add+0x190/0x190 [ 2065.577621] device_add+0x33f/0x15c0 [ 2065.581322] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2065.586753] ? kfree_const+0x33/0x40 [ 2065.590448] ? device_is_dependent+0x2a0/0x2a0 [ 2065.595012] ? kfree+0x1f0/0x250 [ 2065.598363] device_create_groups_vargs+0x1dc/0x250 [ 2065.603372] device_create_vargs+0x3a/0x50 [ 2065.607599] bdi_register_va.part.0+0x35/0x650 [ 2065.612167] bdi_register_va+0x63/0x80 [ 2065.616045] super_setup_bdi_name+0x123/0x220 [ 2065.620523] ? kill_block_super+0xe0/0xe0 [ 2065.624654] ? do_raw_spin_unlock+0x164/0x220 [ 2065.629150] fuse_fill_super+0x937/0x15c0 [ 2065.633300] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.637691] ? up_write+0x17/0x60 [ 2065.641125] ? register_shrinker+0x15f/0x220 [ 2065.645514] ? sget_userns+0x768/0xc10 [ 2065.649388] ? get_anon_bdev+0x1c0/0x1c0 [ 2065.653426] ? sget+0xd9/0x110 [ 2065.656616] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.661443] mount_nodev+0x4c/0xf0 [ 2065.664972] mount_fs+0x92/0x2a0 [ 2065.668329] vfs_kern_mount.part.0+0x5b/0x470 [ 2065.672811] do_mount+0xe65/0x2a30 [ 2065.676337] ? copy_mount_string+0x40/0x40 [ 2065.680569] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2065.685583] ? copy_mnt_ns+0xa30/0xa30 [ 2065.689478] ? copy_mount_options+0x1fa/0x2f0 [ 2065.693968] ? copy_mnt_ns+0xa30/0xa30 [ 2065.697856] SyS_mount+0xa8/0x120 [ 2065.701291] ? copy_mnt_ns+0xa30/0xa30 [ 2065.705179] do_syscall_64+0x1d5/0x640 [ 2065.709052] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2065.714246] RIP: 0033:0x7f60c6f5e0c9 [ 2065.717936] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2065.725633] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2065.732884] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2065.740141] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 08:19:59 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x200010, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c6a6f3030303030303030303034303030302c757365725f69643dbb43789ce47d92229f6167a3a16d2a28dec4071263fefa812e89caa30797dfee04cbc43c1856de3ffdf620a23052e055853128f6b45daedaf2709ae0f2bfb7345e5314311b9b222a0e1792edafa566e5bbaccfe9e46e8511fe390f00561506000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce4ddcd0d466cd149eafdae46cf5f20fa09"]) [ 2065.747420] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2065.754674] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2065.761943] CPU: 1 PID: 25841 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2065.769825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2065.779177] Call Trace: [ 2065.781760] dump_stack+0x1b2/0x281 [ 2065.785386] should_fail.cold+0x10a/0x149 [ 2065.789532] should_failslab+0xd6/0x130 [ 2065.793506] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2065.798174] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 2065.803276] device_create_groups_vargs+0x7b/0x250 [ 2065.808208] device_create_vargs+0x3a/0x50 [ 2065.810162] kobject_add_internal failed for 0:60 (error: -12 parent: bdi) [ 2065.812452] bdi_register_va.part.0+0x35/0x650 [ 2065.812463] bdi_register_va+0x63/0x80 [ 2065.812476] super_setup_bdi_name+0x123/0x220 [ 2065.812487] ? kill_block_super+0xe0/0xe0 [ 2065.812499] ? do_raw_spin_unlock+0x164/0x220 [ 2065.812513] fuse_fill_super+0x937/0x15c0 [ 2065.812523] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.849472] ? up_write+0x17/0x60 [ 2065.849483] ? register_shrinker+0x15f/0x220 [ 2065.857331] ? sget_userns+0x768/0xc10 [ 2065.857347] ? get_anon_bdev+0x1c0/0x1c0 [ 2065.865358] ? sget+0xd9/0x110 [ 2065.868546] ? fuse_get_root_inode+0xc0/0xc0 [ 2065.872951] mount_nodev+0x4c/0xf0 [ 2065.876481] mount_fs+0x92/0x2a0 [ 2065.879839] vfs_kern_mount.part.0+0x5b/0x470 [ 2065.884326] do_mount+0xe65/0x2a30 [ 2065.887864] ? copy_mount_string+0x40/0x40 [ 2065.892101] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2065.897098] ? copy_mnt_ns+0xa30/0xa30 [ 2065.900972] ? copy_mount_options+0x1fa/0x2f0 [ 2065.905455] ? copy_mnt_ns+0xa30/0xa30 [ 2065.909330] SyS_mount+0xa8/0x120 [ 2065.912774] ? copy_mnt_ns+0xa30/0xa30 [ 2065.916652] do_syscall_64+0x1d5/0x640 [ 2065.920538] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2065.925728] RIP: 0033:0x7fa4d53ef0c9 [ 2065.929417] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2065.937123] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2065.944375] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2065.951632] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2065.958885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2065.966166] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2065.973436] CPU: 0 PID: 25835 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2065.981321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2065.990667] Call Trace: [ 2065.993254] dump_stack+0x1b2/0x281 [ 2065.996884] should_fail.cold+0x10a/0x149 [ 2066.001034] should_failslab+0xd6/0x130 [ 2066.005014] __kmalloc_track_caller+0x2bc/0x400 [ 2066.009684] ? kvasprintf_const+0x55/0x180 [ 2066.013918] kvasprintf+0xa8/0x100 [ 2066.017455] ? bust_spinlocks+0xc0/0xc0 [ 2066.021432] kvasprintf_const+0x55/0x180 [ 2066.025497] kobject_set_name_vargs+0x56/0x150 [ 2066.030080] device_create_groups_vargs+0x1a2/0x250 [ 2066.035122] device_create_vargs+0x3a/0x50 [ 2066.039374] bdi_register_va.part.0+0x35/0x650 [ 2066.043954] bdi_register_va+0x63/0x80 [ 2066.047837] super_setup_bdi_name+0x123/0x220 [ 2066.052330] ? kill_block_super+0xe0/0xe0 [ 2066.056478] ? do_raw_spin_unlock+0x164/0x220 [ 2066.060970] fuse_fill_super+0x937/0x15c0 [ 2066.065116] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.069518] ? up_write+0x17/0x60 [ 2066.072965] ? register_shrinker+0x15f/0x220 [ 2066.077366] ? sget_userns+0x768/0xc10 [ 2066.081291] ? get_anon_bdev+0x1c0/0x1c0 [ 2066.085377] ? sget+0xd9/0x110 [ 2066.088567] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.092991] mount_nodev+0x4c/0xf0 [ 2066.093002] mount_fs+0x92/0x2a0 [ 2066.099910] vfs_kern_mount.part.0+0x5b/0x470 08:19:59 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1400) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB="66643df38c0e0481d852c5aa70b16917554d5834816c34a55028ab7bd92fdeb1a9975fb8644fd571ab1a2cc6addd794fadc22a5d942ba16f09105ceb5a5719d77224f8b4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0001"]) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000080)="8bce81925c0d6b49131ce2661b1beb1cc68f48728db5e3bc2ebc7acb4cdc25048900e65d7394424cf17d04f2b7ea3b1164") (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) renameat2(r2, &(0x7f0000000280)='./file0\x00', r3, &(0x7f00000002c0)='./file0\x00', 0x6) 08:19:59 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x200010, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c6a6f3030303030303030303034303030302c757365725f69643dbb43789ce47d92229f6167a3a16d2a28dec4071263fefa812e89caa30797dfee04cbc43c1856de3ffdf620a23052e055853128f6b45daedaf2709ae0f2bfb7345e5314311b9b222a0e1792edafa566e5bbaccfe9e46e8511fe390f00561506000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce4ddcd0d466cd149eafdae46cf5f20fa09"]) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x200010, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c6a6f3030303030303030303034303030302c757365725f69643dbb43789ce47d92229f6167a3a16d2a28dec4071263fefa812e89caa30797dfee04cbc43c1856de3ffdf620a23052e055853128f6b45daedaf2709ae0f2bfb7345e5314311b9b222a0e1792edafa566e5bbaccfe9e46e8511fe390f00561506000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce4ddcd0d466cd149eafdae46cf5f20fa09"]) (async) 08:19:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x1f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8810}, 0x4) (async, rerun: 64) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x200c00, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) statx(r3, &(0x7f0000000100)='./file1\x00', 0x1000, 0x0, &(0x7f0000000140)) (async, rerun: 64) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) (async) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000240)) r5 = syz_open_dev$sg(&(0x7f0000000380), 0x1, 0x430000) (async, rerun: 32) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000000c0)) (rerun: 32) ioctl$SG_SET_KEEP_ORPHAN(r5, 0x2287, &(0x7f00000003c0)=0x10000) (async, rerun: 32) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000080)) (rerun: 32) 08:19:59 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 24) 08:19:59 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x2], 0x1, 0x800, 0x0, 0xffffffffffffffff}) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x80) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r0, &(0x7f0000000300)='./file1\x00', 0x10) readlinkat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/66, 0x42) [ 2066.099923] do_mount+0xe65/0x2a30 [ 2066.099941] ? copy_mount_string+0x40/0x40 [ 2066.099954] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2066.099964] ? copy_mnt_ns+0xa30/0xa30 [ 2066.099975] ? copy_mount_options+0x1fa/0x2f0 [ 2066.099983] ? copy_mnt_ns+0xa30/0xa30 [ 2066.099993] SyS_mount+0xa8/0x120 [ 2066.100002] ? copy_mnt_ns+0xa30/0xa30 [ 2066.136763] do_syscall_64+0x1d5/0x640 [ 2066.140816] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2066.146005] RIP: 0033:0x7f80d8a040c9 08:19:59 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 21) 08:19:59 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x2], 0x1, 0x800, 0x0, 0xffffffffffffffff}) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x80) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r0, &(0x7f0000000300)='./file1\x00', 0x10) readlinkat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/66, 0x42) 08:19:59 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 20) [ 2066.149720] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2066.149738] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:19:59 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000002380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x15}}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@appraise_type}]}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x164081, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@measure}]}}) 08:19:59 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 22) [ 2066.149744] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2066.149748] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:19:59 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 25) [ 2066.149754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2066.149758] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2066.244665] FAULT_INJECTION: forcing a failure. [ 2066.244665] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.244682] CPU: 1 PID: 25889 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2066.244688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2066.244693] Call Trace: [ 2066.244707] dump_stack+0x1b2/0x281 [ 2066.244722] should_fail.cold+0x10a/0x149 [ 2066.244737] should_failslab+0xd6/0x130 [ 2066.244750] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2066.244763] device_add+0xd72/0x15c0 [ 2066.244774] ? rcu_lockdep_current_cpu_online+0xed/0x140 08:19:59 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xfffffc01, 0x7fff, 0xb5e9, 0x0, 0xffff8001, 0xffffffff, 0x10001, 0x1, 0xa7], 0x9, 0x0, 0x0, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:19:59 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x2], 0x1, 0x800, 0x0, 0xffffffffffffffff}) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x80) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) fchmodat(r0, &(0x7f0000000300)='./file1\x00', 0x10) (async) readlinkat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/66, 0x42) [ 2066.244784] ? kfree_const+0x33/0x40 [ 2066.244793] ? device_is_dependent+0x2a0/0x2a0 [ 2066.244801] ? kfree+0x1f0/0x250 [ 2066.244815] device_create_groups_vargs+0x1dc/0x250 [ 2066.244827] device_create_vargs+0x3a/0x50 [ 2066.244841] bdi_register_va.part.0+0x35/0x650 [ 2066.244855] bdi_register_va+0x63/0x80 [ 2066.244867] super_setup_bdi_name+0x123/0x220 [ 2066.244877] ? kill_block_super+0xe0/0xe0 [ 2066.244889] ? do_raw_spin_unlock+0x164/0x220 [ 2066.244904] fuse_fill_super+0x937/0x15c0 [ 2066.244916] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.244927] ? up_write+0x17/0x60 [ 2066.244935] ? register_shrinker+0x15f/0x220 [ 2066.244943] ? sget_userns+0x768/0xc10 [ 2066.244960] ? get_anon_bdev+0x1c0/0x1c0 [ 2066.244967] ? sget+0xd9/0x110 [ 2066.244975] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.244984] mount_nodev+0x4c/0xf0 [ 2066.244993] mount_fs+0x92/0x2a0 [ 2066.245006] vfs_kern_mount.part.0+0x5b/0x470 [ 2066.245018] do_mount+0xe65/0x2a30 [ 2066.245035] ? copy_mount_string+0x40/0x40 [ 2066.245047] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2066.245057] ? copy_mnt_ns+0xa30/0xa30 [ 2066.245069] ? copy_mount_options+0x1fa/0x2f0 [ 2066.245078] ? copy_mnt_ns+0xa30/0xa30 [ 2066.245089] SyS_mount+0xa8/0x120 [ 2066.245097] ? copy_mnt_ns+0xa30/0xa30 [ 2066.245108] do_syscall_64+0x1d5/0x640 [ 2066.245123] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2066.245132] RIP: 0033:0x7f80d8a040c9 [ 2066.245137] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2066.245148] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2066.245153] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2066.245159] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2066.245164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2066.245170] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2066.275369] FAULT_INJECTION: forcing a failure. [ 2066.275369] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.275381] CPU: 0 PID: 25890 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2066.275387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2066.275391] Call Trace: [ 2066.275405] dump_stack+0x1b2/0x281 [ 2066.275421] should_fail.cold+0x10a/0x149 [ 2066.275435] should_failslab+0xd6/0x130 [ 2066.275448] kmem_cache_alloc+0x28e/0x3c0 [ 2066.275462] __kernfs_new_node+0x6f/0x470 [ 2066.275474] kernfs_new_node+0x7b/0xe0 [ 2066.275486] __kernfs_create_file+0x3d/0x320 [ 2066.275499] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2066.275515] device_create_file+0xc8/0x100 [ 2066.275527] ? acpi_platform_notify_remove+0x1f0/0x1f0 [ 2066.275535] device_add+0x37a/0x15c0 [ 2066.275545] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2066.275555] ? kfree_const+0x33/0x40 [ 2066.275564] ? device_is_dependent+0x2a0/0x2a0 [ 2066.275572] ? kfree+0x1f0/0x250 [ 2066.275586] device_create_groups_vargs+0x1dc/0x250 [ 2066.275597] device_create_vargs+0x3a/0x50 [ 2066.275610] bdi_register_va.part.0+0x35/0x650 [ 2066.275624] bdi_register_va+0x63/0x80 [ 2066.275636] super_setup_bdi_name+0x123/0x220 [ 2066.275646] ? kill_block_super+0xe0/0xe0 [ 2066.275658] ? do_raw_spin_unlock+0x164/0x220 [ 2066.275673] fuse_fill_super+0x937/0x15c0 [ 2066.275685] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.275695] ? up_write+0x17/0x60 [ 2066.275703] ? register_shrinker+0x15f/0x220 [ 2066.275711] ? sget_userns+0x768/0xc10 [ 2066.275736] ? get_anon_bdev+0x1c0/0x1c0 [ 2066.275743] ? sget+0xd9/0x110 [ 2066.275753] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.275762] mount_nodev+0x4c/0xf0 [ 2066.275772] mount_fs+0x92/0x2a0 [ 2066.275787] vfs_kern_mount.part.0+0x5b/0x470 [ 2066.275800] do_mount+0xe65/0x2a30 [ 2066.275818] ? copy_mount_string+0x40/0x40 [ 2066.275830] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2066.275840] ? copy_mnt_ns+0xa30/0xa30 [ 2066.275852] ? copy_mount_options+0x1fa/0x2f0 [ 2066.275861] ? copy_mnt_ns+0xa30/0xa30 [ 2066.275872] SyS_mount+0xa8/0x120 [ 2066.275881] ? copy_mnt_ns+0xa30/0xa30 [ 2066.275892] do_syscall_64+0x1d5/0x640 [ 2066.275907] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2066.275915] RIP: 0033:0x7f60c6f5e0c9 [ 2066.275920] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2066.275930] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2066.275936] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2066.275941] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2066.275946] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2066.275952] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2066.301442] FAULT_INJECTION: forcing a failure. [ 2066.301442] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.357559] FAULT_INJECTION: forcing a failure. [ 2066.357559] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.378872] FAULT_INJECTION: forcing a failure. [ 2066.378872] name failslab, interval 1, probability 0, space 0, times 0 [ 2066.428647] CPU: 1 PID: 25901 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2066.834177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2066.843513] Call Trace: [ 2066.846084] dump_stack+0x1b2/0x281 [ 2066.849709] should_fail.cold+0x10a/0x149 [ 2066.853843] should_failslab+0xd6/0x130 [ 2066.857821] __kmalloc_track_caller+0x2bc/0x400 [ 2066.862490] ? kstrdup_const+0x35/0x60 [ 2066.866366] kstrdup+0x36/0x70 [ 2066.869541] kstrdup_const+0x35/0x60 [ 2066.873266] __kernfs_new_node+0x2e/0x470 [ 2066.877397] kernfs_create_dir_ns+0x8c/0x200 [ 2066.881802] sysfs_create_dir_ns+0xb7/0x1d0 [ 2066.886122] kobject_add_internal+0x28b/0x930 [ 2066.890606] kobject_add+0x11f/0x180 [ 2066.894303] ? kset_create_and_add+0x190/0x190 [ 2066.898884] device_add+0x33f/0x15c0 [ 2066.902601] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2066.908041] ? kfree_const+0x33/0x40 [ 2066.911739] ? device_is_dependent+0x2a0/0x2a0 [ 2066.916304] ? kfree+0x1f0/0x250 [ 2066.919674] device_create_groups_vargs+0x1dc/0x250 [ 2066.924704] device_create_vargs+0x3a/0x50 [ 2066.928932] bdi_register_va.part.0+0x35/0x650 [ 2066.933508] bdi_register_va+0x63/0x80 [ 2066.937383] super_setup_bdi_name+0x123/0x220 [ 2066.941879] ? kill_block_super+0xe0/0xe0 [ 2066.946026] ? do_raw_spin_unlock+0x164/0x220 [ 2066.950853] fuse_fill_super+0x937/0x15c0 [ 2066.954990] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.959488] ? up_write+0x17/0x60 [ 2066.962924] ? register_shrinker+0x15f/0x220 [ 2066.967318] ? sget_userns+0x768/0xc10 [ 2066.971194] ? get_anon_bdev+0x1c0/0x1c0 [ 2066.975234] ? sget+0xd9/0x110 [ 2066.978406] ? fuse_get_root_inode+0xc0/0xc0 [ 2066.982798] mount_nodev+0x4c/0xf0 [ 2066.986320] mount_fs+0x92/0x2a0 [ 2066.989670] vfs_kern_mount.part.0+0x5b/0x470 [ 2066.994163] do_mount+0xe65/0x2a30 [ 2066.997688] ? copy_mount_string+0x40/0x40 [ 2067.001993] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2067.006995] ? copy_mnt_ns+0xa30/0xa30 [ 2067.010868] ? copy_mount_options+0x1fa/0x2f0 [ 2067.015343] ? copy_mnt_ns+0xa30/0xa30 [ 2067.019211] SyS_mount+0xa8/0x120 [ 2067.022658] ? copy_mnt_ns+0xa30/0xa30 [ 2067.026535] do_syscall_64+0x1d5/0x640 [ 2067.030508] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2067.035686] RIP: 0033:0x7f80d8a040c9 [ 2067.039380] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2067.047078] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2067.054340] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 08:20:00 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000002380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x15}}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@appraise_type}]}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x164081, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@measure}]}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000002380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x15}}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@appraise_type}]}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x164081, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@measure}]}}) (async) 08:20:00 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xfffffc01, 0x7fff, 0xb5e9, 0x0, 0xffff8001, 0xffffffff, 0x10001, 0x1, 0xa7], 0x9, 0x0, 0x0, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x3) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:00 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, r1, {0x4, 0x4, 0x80000000, 0x10000}}, 0x20) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2067.061609] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2067.068874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.076125] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2067.083439] CPU: 0 PID: 25902 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2067.091323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2067.101108] Call Trace: [ 2067.103695] dump_stack+0x1b2/0x281 [ 2067.107326] should_fail.cold+0x10a/0x149 [ 2067.111476] should_failslab+0xd6/0x130 08:20:00 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, r1, {0x4, 0x4, 0x80000000, 0x10000}}, 0x20) (async, rerun: 32) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (rerun: 32) 08:20:00 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 23) [ 2067.115570] kmem_cache_alloc+0x28e/0x3c0 [ 2067.119733] __kernfs_new_node+0x6f/0x470 [ 2067.123882] kernfs_new_node+0x7b/0xe0 [ 2067.127770] kernfs_create_link+0x27/0x160 [ 2067.127866] kobject_add_internal failed for 0:60 (error: -12 parent: bdi) [ 2067.132010] sysfs_do_create_link_sd+0x90/0x120 [ 2067.132022] sysfs_create_link+0x5f/0xc0 [ 2067.132040] device_add+0x461/0x15c0 [ 2067.132056] ? kfree_const+0x33/0x40 [ 2067.132065] ? device_is_dependent+0x2a0/0x2a0 [ 2067.132074] ? kfree+0x1f0/0x250 [ 2067.132086] device_create_groups_vargs+0x1dc/0x250 [ 2067.168086] device_create_vargs+0x3a/0x50 [ 2067.172339] bdi_register_va.part.0+0x35/0x650 [ 2067.176922] bdi_register_va+0x63/0x80 [ 2067.180818] super_setup_bdi_name+0x123/0x220 [ 2067.185310] ? kill_block_super+0xe0/0xe0 [ 2067.189458] ? do_raw_spin_unlock+0x164/0x220 [ 2067.193959] fuse_fill_super+0x937/0x15c0 [ 2067.195452] FAULT_INJECTION: forcing a failure. [ 2067.195452] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.198103] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.198115] ? up_write+0x17/0x60 [ 2067.198125] ? register_shrinker+0x15f/0x220 [ 2067.198135] ? sget_userns+0x768/0xc10 [ 2067.198158] ? get_anon_bdev+0x1c0/0x1c0 [ 2067.229495] ? sget+0xd9/0x110 [ 2067.232673] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.237070] mount_nodev+0x4c/0xf0 [ 2067.240609] mount_fs+0x92/0x2a0 [ 2067.244071] vfs_kern_mount.part.0+0x5b/0x470 [ 2067.248556] do_mount+0xe65/0x2a30 [ 2067.252093] ? copy_mount_string+0x40/0x40 [ 2067.256330] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2067.261340] ? copy_mnt_ns+0xa30/0xa30 [ 2067.265408] ? copy_mount_options+0x1fa/0x2f0 [ 2067.269899] ? copy_mnt_ns+0xa30/0xa30 [ 2067.273768] SyS_mount+0xa8/0x120 [ 2067.277215] ? copy_mnt_ns+0xa30/0xa30 [ 2067.281089] do_syscall_64+0x1d5/0x640 [ 2067.284974] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2067.290160] RIP: 0033:0x7f60c6f5e0c9 [ 2067.293857] RSP: 002b:00007f60c54d0168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2067.301805] RAX: ffffffffffffffda RBX: 00007f60c707df80 RCX: 00007f60c6f5e0c9 [ 2067.309056] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2067.316310] RBP: 00007f60c54d01d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2067.323565] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000002 [ 2067.330815] R13: 00007ffc2a52301f R14: 00007f60c54d0300 R15: 0000000000022000 [ 2067.338082] CPU: 1 PID: 25920 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2067.345965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2067.355313] Call Trace: [ 2067.357893] dump_stack+0x1b2/0x281 [ 2067.361514] should_fail.cold+0x10a/0x149 [ 2067.365650] should_failslab+0xd6/0x130 [ 2067.369618] kmem_cache_alloc+0x28e/0x3c0 [ 2067.373759] __kernfs_new_node+0x6f/0x470 [ 2067.377892] kernfs_create_dir_ns+0x8c/0x200 [ 2067.382292] sysfs_create_dir_ns+0xb7/0x1d0 [ 2067.386600] kobject_add_internal+0x28b/0x930 [ 2067.391085] kobject_add+0x11f/0x180 [ 2067.394786] ? kset_create_and_add+0x190/0x190 [ 2067.399361] device_add+0x33f/0x15c0 [ 2067.403065] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2067.408549] ? kfree_const+0x33/0x40 [ 2067.412256] ? device_is_dependent+0x2a0/0x2a0 [ 2067.417014] ? kfree+0x1f0/0x250 [ 2067.420378] device_create_groups_vargs+0x1dc/0x250 [ 2067.425385] device_create_vargs+0x3a/0x50 [ 2067.429625] bdi_register_va.part.0+0x35/0x650 [ 2067.434287] bdi_register_va+0x63/0x80 [ 2067.438173] super_setup_bdi_name+0x123/0x220 [ 2067.442650] ? kill_block_super+0xe0/0xe0 [ 2067.446780] ? do_raw_spin_unlock+0x164/0x220 [ 2067.451272] fuse_fill_super+0x937/0x15c0 [ 2067.455419] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.459806] ? up_write+0x17/0x60 [ 2067.463244] ? register_shrinker+0x15f/0x220 [ 2067.467632] ? sget_userns+0x768/0xc10 [ 2067.471518] ? get_anon_bdev+0x1c0/0x1c0 [ 2067.475557] ? sget+0xd9/0x110 [ 2067.478730] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.483117] mount_nodev+0x4c/0xf0 [ 2067.486638] mount_fs+0x92/0x2a0 [ 2067.489991] vfs_kern_mount.part.0+0x5b/0x470 [ 2067.494470] do_mount+0xe65/0x2a30 [ 2067.498000] ? retint_kernel+0x2d/0x2d [ 2067.502043] ? copy_mount_string+0x40/0x40 [ 2067.506262] ? copy_mount_options+0x185/0x2f0 [ 2067.510744] ? copy_mount_options+0x18b/0x2f0 [ 2067.515221] ? copy_mount_options+0x1fa/0x2f0 [ 2067.519704] ? copy_mnt_ns+0xa30/0xa30 [ 2067.523592] SyS_mount+0xa8/0x120 [ 2067.527034] ? copy_mnt_ns+0xa30/0xa30 [ 2067.530903] do_syscall_64+0x1d5/0x640 [ 2067.534831] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2067.540117] RIP: 0033:0x7f80d8a040c9 [ 2067.543813] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2067.551628] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2067.558975] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2067.566234] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2067.573497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.580754] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2067.588018] CPU: 0 PID: 25898 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2067.595987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2067.605342] Call Trace: [ 2067.606244] kobject_add_internal failed for 0:60 (error: -12 parent: bdi) 08:20:01 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 24) [ 2067.607920] dump_stack+0x1b2/0x281 [ 2067.607936] should_fail.cold+0x10a/0x149 [ 2067.607949] should_failslab+0xd6/0x130 [ 2067.607962] __kmalloc_track_caller+0x2bc/0x400 [ 2067.631227] ? kvasprintf_const+0x55/0x180 [ 2067.635585] kvasprintf+0xa8/0x100 [ 2067.639121] ? bust_spinlocks+0xc0/0xc0 [ 2067.643098] kvasprintf_const+0x55/0x180 [ 2067.647165] kobject_set_name_vargs+0x56/0x150 [ 2067.651752] device_create_groups_vargs+0x1a2/0x250 [ 2067.656769] device_create_vargs+0x3a/0x50 [ 2067.656982] FAULT_INJECTION: forcing a failure. [ 2067.656982] name failslab, interval 1, probability 0, space 0, times 0 [ 2067.661015] bdi_register_va.part.0+0x35/0x650 [ 2067.661031] bdi_register_va+0x63/0x80 [ 2067.661042] super_setup_bdi_name+0x123/0x220 [ 2067.661051] ? kill_block_super+0xe0/0xe0 [ 2067.661063] ? do_raw_spin_unlock+0x164/0x220 [ 2067.661080] fuse_fill_super+0x937/0x15c0 [ 2067.697904] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.702301] ? up_write+0x17/0x60 [ 2067.705734] ? register_shrinker+0x15f/0x220 [ 2067.710125] ? sget_userns+0x768/0xc10 [ 2067.714032] ? get_anon_bdev+0x1c0/0x1c0 [ 2067.718078] ? sget+0xd9/0x110 [ 2067.721266] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.725660] mount_nodev+0x4c/0xf0 [ 2067.729182] mount_fs+0x92/0x2a0 [ 2067.732711] vfs_kern_mount.part.0+0x5b/0x470 [ 2067.737200] do_mount+0xe65/0x2a30 [ 2067.740721] ? do_raw_spin_unlock+0x164/0x220 [ 2067.745200] ? copy_mount_string+0x40/0x40 [ 2067.749415] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2067.754430] ? copy_mnt_ns+0xa30/0xa30 [ 2067.758319] ? copy_mount_options+0x1fa/0x2f0 [ 2067.762796] ? copy_mnt_ns+0xa30/0xa30 [ 2067.766671] SyS_mount+0xa8/0x120 [ 2067.770222] ? copy_mnt_ns+0xa30/0xa30 [ 2067.774098] do_syscall_64+0x1d5/0x640 [ 2067.778071] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2067.783247] RIP: 0033:0x7fa4d53ef0c9 [ 2067.786937] RSP: 002b:00007fa4d3961168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2067.794629] RAX: ffffffffffffffda RBX: 00007fa4d550ef80 RCX: 00007fa4d53ef0c9 [ 2067.801964] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2067.809212] RBP: 00007fa4d39611d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2067.816463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2067.823713] R13: 00007ffd4da7cbbf R14: 00007fa4d3961300 R15: 0000000000022000 [ 2067.830978] CPU: 1 PID: 25931 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2067.838862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2067.848212] Call Trace: [ 2067.850795] dump_stack+0x1b2/0x281 [ 2067.854430] should_fail.cold+0x10a/0x149 [ 2067.858577] should_failslab+0xd6/0x130 [ 2067.862549] kmem_cache_alloc+0x28e/0x3c0 [ 2067.866696] __kernfs_new_node+0x6f/0x470 [ 2067.870849] kernfs_new_node+0x7b/0xe0 [ 2067.874732] __kernfs_create_file+0x3d/0x320 [ 2067.879138] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2067.883834] device_create_file+0xc8/0x100 [ 2067.888073] ? acpi_platform_notify_remove+0x1f0/0x1f0 [ 2067.893344] device_add+0x37a/0x15c0 [ 2067.897066] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2067.902495] ? kfree_const+0x33/0x40 [ 2067.906198] ? device_is_dependent+0x2a0/0x2a0 [ 2067.910783] ? kfree+0x1f0/0x250 [ 2067.914132] device_create_groups_vargs+0x1dc/0x250 [ 2067.919148] device_create_vargs+0x3a/0x50 [ 2067.923389] bdi_register_va.part.0+0x35/0x650 [ 2067.927954] bdi_register_va+0x63/0x80 [ 2067.931854] super_setup_bdi_name+0x123/0x220 [ 2067.936353] ? kill_block_super+0xe0/0xe0 [ 2067.940485] ? do_raw_spin_unlock+0x164/0x220 [ 2067.944980] fuse_fill_super+0x937/0x15c0 [ 2067.949109] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.953495] ? up_write+0x17/0x60 [ 2067.956929] ? register_shrinker+0x15f/0x220 [ 2067.961335] ? sget_userns+0x768/0xc10 [ 2067.965216] ? get_anon_bdev+0x1c0/0x1c0 [ 2067.969266] ? sget+0xd9/0x110 [ 2067.972436] ? fuse_get_root_inode+0xc0/0xc0 [ 2067.976938] mount_nodev+0x4c/0xf0 [ 2067.980464] mount_fs+0x92/0x2a0 [ 2067.983898] vfs_kern_mount.part.0+0x5b/0x470 [ 2067.988377] do_mount+0xe65/0x2a30 [ 2067.991901] ? do_raw_spin_unlock+0x164/0x220 [ 2067.996383] ? copy_mount_string+0x40/0x40 [ 2068.000603] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2068.005603] ? copy_mnt_ns+0xa30/0xa30 [ 2068.009479] ? copy_mount_options+0x1fa/0x2f0 [ 2068.013947] ? copy_mnt_ns+0xa30/0xa30 [ 2068.017810] SyS_mount+0xa8/0x120 [ 2068.021241] ? copy_mnt_ns+0xa30/0xa30 [ 2068.025120] do_syscall_64+0x1d5/0x640 [ 2068.029003] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2068.034170] RIP: 0033:0x7f80d8a040c9 [ 2068.038203] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2068.045904] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2068.053160] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2068.060413] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:01 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d19968a82145ffcd50a640852837b6a352f24454cee5dcf1967e138047b5c9751c4d5a38ebe86722f9632f910a2a7814abcd775c88f621b19ada52fb835040061e3b94073a644cc2f8c763744ba3b10fc49f9032a8e5fc576bb3b851af42f11e265b1798f989a0acf6a00cafc966767a3a1a222d9cd27c6bf11600db63be2e5253d2fa9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:01 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000002380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@pcr={'pcr', 0x3d, 0x15}}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@appraise_type}]}}) (async, rerun: 64) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x164081, &(0x7f00000022c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@measure}]}}) 08:20:01 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 25) 08:20:01 executing program 4: socket$rds(0x15, 0x5, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x820402, &(0x7f0000000240)=ANY=[@ANYBLOB="c6b54f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686173682c736d61636b66737472616e736d7574653d2b6446762f6675736500db9ec8bd4fd5929a04eb205a4ddefacd3039a51a8fc54c5c7eff49e5e4aabee9cfbe2e679b3c75b310b3cd401fbbc618a335723dd76b895c97707b064750a48b2b99fc04d37a00af10f3b3006aa3b8508ca10074830016a7a43573a283081fb8c198e2f0c91c692c00"]) 08:20:01 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, r1, {0x4, 0x4, 0x80000000, 0x10000}}, 0x20) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) write$FUSE_IOCTL(r0, &(0x7f0000000080)={0x20, 0x0, r1, {0x4, 0x4, 0x80000000, 0x10000}}, 0x20) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) [ 2068.067677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2068.074927] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:01 executing program 4: socket$rds(0x15, 0x5, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x820402, &(0x7f0000000240)=ANY=[@ANYBLOB="c6b54f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686173682c736d61636b66737472616e736d7574653d2b6446762f6675736500db9ec8bd4fd5929a04eb205a4ddefacd3039a51a8fc54c5c7eff49e5e4aabee9cfbe2e679b3c75b310b3cd401fbbc618a335723dd76b895c97707b064750a48b2b99fc04d37a00af10f3b3006aa3b8508ca10074830016a7a43573a283081fb8c198e2f0c91c692c00"]) 08:20:01 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xfffffc01, 0x7fff, 0xb5e9, 0x0, 0xffff8001, 0xffffffff, 0x10001, 0x1, 0xa7], 0x9, 0x0, 0x0, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xfffffc01, 0x7fff, 0xb5e9, 0x0, 0xffff8001, 0xffffffff, 0x10001, 0x1, 0xa7], 0x9}) (async) renameat2(r0, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x3) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:01 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000080)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000500)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x10b402, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40081) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 08:20:01 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d19968a82145ffcd50a640852837b6a352f24454cee5dcf1967e138047b5c9751c4d5a38ebe86722f9632f910a2a7814abcd775c88f621b19ada52fb835040061e3b94073a644cc2f8c763744ba3b10fc49f9032a8e5fc576bb3b851af42f11e265b1798f989a0acf6a00cafc966767a3a1a222d9cd27c6bf11600db63be2e5253d2fa9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d19968a82145ffcd50a640852837b6a352f24454cee5dcf1967e138047b5c9751c4d5a38ebe86722f9632f910a2a7814abcd775c88f621b19ada52fb835040061e3b94073a644cc2f8c763744ba3b10fc49f9032a8e5fc576bb3b851af42f11e265b1798f989a0acf6a00cafc966767a3a1a222d9cd27c6bf11600db63be2e5253d2fa9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) [ 2068.187527] FAULT_INJECTION: forcing a failure. [ 2068.187527] name failslab, interval 1, probability 0, space 0, times 0 [ 2068.252301] CPU: 1 PID: 25944 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2068.260319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2068.269670] Call Trace: [ 2068.272258] dump_stack+0x1b2/0x281 [ 2068.275893] should_fail.cold+0x10a/0x149 [ 2068.280043] should_failslab+0xd6/0x130 [ 2068.284013] kmem_cache_alloc+0x28e/0x3c0 [ 2068.288159] __kernfs_new_node+0x6f/0x470 [ 2068.292309] kernfs_new_node+0x7b/0xe0 [ 2068.296193] kernfs_create_link+0x27/0x160 [ 2068.300429] sysfs_do_create_link_sd+0x90/0x120 [ 2068.305095] sysfs_create_link+0x5f/0xc0 [ 2068.309154] device_add+0x461/0x15c0 [ 2068.312902] ? kfree_const+0x33/0x40 [ 2068.316610] ? device_is_dependent+0x2a0/0x2a0 [ 2068.321187] ? kfree+0x1f0/0x250 [ 2068.324552] device_create_groups_vargs+0x1dc/0x250 [ 2068.329597] device_create_vargs+0x3a/0x50 [ 2068.333835] bdi_register_va.part.0+0x35/0x650 [ 2068.338415] bdi_register_va+0x63/0x80 [ 2068.342314] super_setup_bdi_name+0x123/0x220 [ 2068.346831] ? kill_block_super+0xe0/0xe0 08:20:01 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d19968a82145ffcd50a640852837b6a352f24454cee5dcf1967e138047b5c9751c4d5a38ebe86722f9632f910a2a7814abcd775c88f621b19ada52fb835040061e3b94073a644cc2f8c763744ba3b10fc49f9032a8e5fc576bb3b851af42f11e265b1798f989a0acf6a00cafc966767a3a1a222d9cd27c6bf11600db63be2e5253d2fa9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2068.350972] ? do_raw_spin_unlock+0x164/0x220 [ 2068.355486] fuse_fill_super+0x937/0x15c0 [ 2068.359641] ? fuse_get_root_inode+0xc0/0xc0 [ 2068.364050] ? up_write+0x4e/0x60 [ 2068.367500] ? register_shrinker+0x15f/0x220 [ 2068.371902] ? sget_userns+0x768/0xc10 [ 2068.375792] ? get_anon_bdev+0x1c0/0x1c0 [ 2068.379847] ? sget+0xd9/0x110 [ 2068.383071] ? fuse_get_root_inode+0xc0/0xc0 [ 2068.387574] mount_nodev+0x4c/0xf0 [ 2068.391111] mount_fs+0x92/0x2a0 [ 2068.394488] vfs_kern_mount.part.0+0x5b/0x470 [ 2068.398980] do_mount+0xe65/0x2a30 08:20:01 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, 'fd'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'rootmode'}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, ':\x8e-}-&\f,'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type}, {@fowner_eq}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}]}}) syslog(0x2, &(0x7f0000000a80)=""/187, 0xbb) r1 = fanotify_init(0x1, 0x2) fanotify_mark(r1, 0x8, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') [ 2068.402521] ? retint_kernel+0x2d/0x2d [ 2068.406441] ? copy_mount_string+0x40/0x40 [ 2068.410673] ? copy_mount_options+0x185/0x2f0 [ 2068.415179] ? copy_mount_options+0x19a/0x2f0 [ 2068.419673] ? copy_mount_options+0x1fa/0x2f0 [ 2068.424170] ? copy_mnt_ns+0xa30/0xa30 [ 2068.428052] SyS_mount+0xa8/0x120 [ 2068.431504] ? copy_mnt_ns+0xa30/0xa30 [ 2068.435387] do_syscall_64+0x1d5/0x640 [ 2068.439277] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2068.444460] RIP: 0033:0x7f80d8a040c9 08:20:02 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, 'fd'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'rootmode'}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, ':\x8e-}-&\f,'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type}, {@fowner_eq}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}]}}) syslog(0x2, &(0x7f0000000a80)=""/187, 0xbb) r1 = fanotify_init(0x1, 0x2) fanotify_mark(r1, 0x8, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, 'fd'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'rootmode'}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, ':\x8e-}-&\f,'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type}, {@fowner_eq}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}]}}) (async) syslog(0x2, &(0x7f0000000a80)=""/187, 0xbb) (async) fanotify_init(0x1, 0x2) (async) fanotify_mark(r1, 0x8, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') (async) 08:20:02 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000080)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000500)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x10b402, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40081) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000080)) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000500)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x10b402, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40081) (async) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') (async) 08:20:02 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, 'fd'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'rootmode'}}, {@seclabel}, {@subj_role={'subj_role', 0x3d, ':\x8e-}-&\f,'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type}, {@fowner_eq}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}]}}) (async) syslog(0x2, &(0x7f0000000a80)=""/187, 0xbb) r1 = fanotify_init(0x1, 0x2) fanotify_mark(r1, 0x8, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00') 08:20:02 executing program 4: socket$rds(0x15, 0x5, 0x0) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x820402, &(0x7f0000000240)=ANY=[@ANYBLOB="c6b54f", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686173682c736d61636b66737472616e736d7574653d2b6446762f6675736500db9ec8bd4fd5929a04eb205a4ddefacd3039a51a8fc54c5c7eff49e5e4aabee9cfbe2e679b3c75b310b3cd401fbbc618a335723dd76b895c97707b064750a48b2b99fc04d37a00af10f3b3006aa3b8508ca10074830016a7a43573a283081fb8c198e2f0c91c692c00"]) 08:20:02 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 26) 08:20:02 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+60000}}) [ 2068.448169] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2068.455870] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2068.463136] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2068.470400] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2068.477663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2068.484929] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:02 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}}) [ 2068.555129] FAULT_INJECTION: forcing a failure. [ 2068.555129] name failslab, interval 1, probability 0, space 0, times 0 [ 2068.599359] CPU: 1 PID: 25996 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2068.607272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2068.616627] Call Trace: [ 2068.619214] dump_stack+0x1b2/0x281 [ 2068.622844] should_fail.cold+0x10a/0x149 [ 2068.626996] should_failslab+0xd6/0x130 [ 2068.630971] __kmalloc_track_caller+0x2bc/0x400 [ 2068.635641] ? kstrdup_const+0x35/0x60 [ 2068.639526] kstrdup+0x36/0x70 [ 2068.642718] kstrdup_const+0x35/0x60 08:20:02 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+60000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) (async) clock_gettime(0x0, &(0x7f0000000180)) (async) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+60000}}) (async) 08:20:02 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000080)) (async, rerun: 32) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x7ff, &(0x7f0000000500)) (rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x10b402, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x40081) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') [ 2068.646432] __kernfs_new_node+0x2e/0x470 [ 2068.650575] kernfs_new_node+0x7b/0xe0 [ 2068.654459] kernfs_create_link+0x27/0x160 [ 2068.658690] sysfs_do_create_link_sd+0x90/0x120 [ 2068.663359] sysfs_create_link+0x5f/0xc0 [ 2068.667426] device_add+0x749/0x15c0 [ 2068.671141] ? kfree_const+0x33/0x40 [ 2068.674853] ? device_is_dependent+0x2a0/0x2a0 [ 2068.679432] ? kfree+0x1f0/0x250 [ 2068.682796] device_create_groups_vargs+0x1dc/0x250 [ 2068.687808] device_create_vargs+0x3a/0x50 [ 2068.692044] bdi_register_va.part.0+0x35/0x650 08:20:02 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2068.696625] bdi_register_va+0x63/0x80 [ 2068.700516] super_setup_bdi_name+0x123/0x220 [ 2068.705012] ? kill_block_super+0xe0/0xe0 [ 2068.709199] ? do_raw_spin_unlock+0x164/0x220 [ 2068.713692] fuse_fill_super+0x937/0x15c0 [ 2068.717840] ? fuse_get_root_inode+0xc0/0xc0 [ 2068.722275] ? up_write+0x17/0x60 [ 2068.725723] ? register_shrinker+0x15f/0x220 [ 2068.730123] ? sget_userns+0x768/0xc10 [ 2068.734011] ? get_anon_bdev+0x1c0/0x1c0 [ 2068.738065] ? sget+0xd9/0x110 [ 2068.741256] ? fuse_get_root_inode+0xc0/0xc0 [ 2068.745666] mount_nodev+0x4c/0xf0 08:20:02 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x183}}]}}) r1 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000024c0)='./file0\x00', 0x100, 0x0, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)=0x0) r4 = geteuid() statx(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x1000, 0x800, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r7 = geteuid() syz_fuse_handle_req(r0, &(0x7f0000000240)="05de9410bd0d510ef81976a273532eb036288571aaaa66aef0c4e66b67f6ee1001cb1b7c8189477d6712ec55429d8a5b1b73ccbb5047a2dd3d7be2a84ea826ea67b9f0bfc7d465f83a53de9c70bdaf403ee42326d21b0d9d5914990bc1447c0c945433a6f09506aee4ec8e7e4e4a8fa4e479fd9fbe3243fd39122507196cb099ec1a76775691f81a99cd2ea883a77401049dcdbaf4af5aea6240807eae66c44028e1f9318aae057bc6ed5a11c2b071c2ed62fb8da8bbd6ac163f95dc1f95a1a204e7b891d097c9aa18f051ab651043bf9089d4bd88e0450aafbb90c08a79dc243d7707b68f6c296c687bff4fd748013e1dfe741dbee874935c46bb28ad9d1d061229992ae048438c329daf682ea6dc63845ee913e46261f887c4bbd12a62d726aa7a7333628f54b9b9c8c274d3ccb9fd283aaf7232fe48014fbd01686a38de5631cc2d80d60277579ac6ed3c466b4ce14c0f07ca37d5ce97711ad08f3b729b36eea50d790af769976d44b7737ab0ee61dc2add1781d7012213c6f1bb0d20684ead2bc2bebba7bb972b07bb3330b12c62cb634095372a8cd8222b735f08157b126e819f110d29c25c25e3b65c1d77231415bb7cfd1caa085359c1bb8a4a67cb00883abe798df1a0ba57d529659b4efc3dde799ac9459ed8e866de08f5e1d74d1a2a19e56b2d03e78d5b5447bc59877eb09e3d2617a9436d930f20cc8bf1d8bc853e34a51952318bf89c7bff7cc0908ee6237c6d3f9b4b7e474b2572950dc67ed06fb2ec84d42cec639976a7bbe4c9c0b0bad6a6107c008c4f5789aabd8d54af63ecc24d3f71ae07c417e1b95ce6e0a46c5ba82c85c51fa5b481f716a4f479d952bfe11fc5d789e3c7b0e8bd44e26923d15f7316b82471a55a5c53b01e6969c0ef2cf7a65ea0c9556934ff1b3459977c83c179e713055d84f8120db00adb569c941bbc22076a9c22c72b01c7e31cb855b9f791a7722d1bc71c70beef78a19983b86848616c922359ec40e73f0ad4da0cb07a85da7dacd0efd9cd7cdc43d14be7e95855f0f15a3db872b694878c9c55d952b8f8d3da1b87ed49cddbd3f5221ec7a692976fb0c5aebe338169328f3c639baae83ac14ed529dea13731581f12623292cedb0e3dd765f596389dd0d7a551850f59436f74641a379c1f2a363135c1edfd27c18c367da66cf4cb56d981058f92cd6261e00c27e642640bd20967fa03e6b795f4d30dcd08acd752305f444ad0dc5eb1a8f5042738816b8b6cb9e7a7b990ce4cd2a77947782a5e221fc883ea2266e92adc69d95de9caa4273667866c37edad4feef9be167db51fbe004af6762838e9a322865adc393394e2fc900256b7ee445e050bb26996b3346028326a298ffa5fe2465fe34494456db331a24d2b3c29b9dc3c43962467681ae189b00cf5feadb34c98eb271be716db9d29f48fa1176747d3570ae103dde4132d8438f06d4532dd610e958c5bce0217f53df37cf7076323e4a7b34e3f75e435766197f46d0ea0110b69a554dcaf4d5b744192b2aff36cb0293fae9d784ca792f067e690b9b3728b3b4dd9357aea397b1498e1cb59c214d102087b333eb2dedee00a4fcaf788ea093303346e584b50f7fdc4c56c0ac8a14c109e2cc930139c1be133279eb1676a4aa4f3e22479d4c881e8cddd55d89a8653ab781bdb8765ade285e0934e6611a349567b74beddbc313616d4a43e6f4f7bf7cac3e75de3c000e47c9f40736c7a894db875bd2f230ff00f8711469cd3e97f265689a500ac99fe7a6ccf65fce4a7c0ea33c35049f4a95f7b2891938c639192c96f6fa055c43eae42dd640d1047f7d15ed97bca37fccbf955d21dfcd98af0fe9b26c37b28afb5ba42ff3447c75703b7dea9bf24601f2e4fb1b253a4693f54f8f866fb5aff91942104f0fbcd2f07884524a9fd19c9256695746ec35d08ae805a0523aafe9fe4391ebbe446271d2ef46cfc0bc356505c1d5416103829622d291ab9e542400bd34ee28894cd9c6bbd90d8fa8f7f1391e368b0bc4517645d609e64910c312a60cbe5c894d8c24ee2e46a68e8b48c8543c2c9c9b9b58e478d524dc8393e2a8942c78a9483667519ee0f4cae2ca0bfc70e96652b8c503687e72dfc48d62060ee05a84e6e122f509531be3ad3aa02c06202ea773d25b1d455d233d2550fd92d8167c7a9c91d7c728809b49b7a36ebf5ca7c8ff8d2913e6e6664c8363c3063e42e33cdb0ff5a7d048725688450e0e186a7bfbcf4226d73a282730480bd931bed5549c78849303a62609967ed074490512376e6a870be2de48b6f476ed0197cb3de1da6097ac3f9a6b4ca4ee15dbc14b836596de65014f8d7c31e25921851a3bf1295c54052cb77a72c9771cd3a25228a961cba21aa56c9267f4b5e2940013a3e1d8bde8afba0232ca81d10d329a0dee567a44b0461dd2cba8da8a5f93c6af02fbfc4f5a1a8a9c404593f163d56fb3c7299e18e178191482ce224b7b098becacd89f82233800cbf78d5384f9747edc9028568da71d056df0ca56dcb448d7e221e9ce9689859c3064423bbe3d71bac8b4eec5f23f8e0dff220b1f759309345f9d353ad3d90dc4f307fe1d3de5284f5a621145143bdbf876bc4a05b0fe8aba66a86865359bb6f8f3dd99e661ac46bf1566b3749f2260471c2ceeec42bf9b777b430a7e7b595ea4d223bf5d36618cda99446eadbe8a05f4ce0f5803eba4c7c83808fe0e60e28285048409f1b22dc70c110c81f32c415f2041e1b106cec69c5a0217d8928b1dc269b52975587d4a34eeafe530742f174ff69648035579e6bd84d4adc854bdd6ac0452454d8bb9d11f6472e46801ce14ab7b8e2ee67866830f63c3e7d7d6d3070a0165fe497a0b48fab283edd5f6d61d2efc62424d635d6b328531ff463504ea205a8182eef8ad8332c420ba8615eb331510e524ed27508ab1059d61490b3e9b77c46550c0fc044085c3305c1e1e913681d2d85b8670ecf2728a4559527bda0b1cfeed701f55f95e292ae67cc8970cb97e1206492abd23870d4441ed8d2fef3bb4480e44ad8a35fa62fa26d7ead36df872629bb899fbe0aa249318ec27ab78be8fadd51671ae8c30a2d5d09274f9dda30969cf2cbb4a49cdf6f8bae6611e6bb0d462c677eb5785af4ae56f144f470d0219b5380dd069df6a4bcca9ddc71ae4c6c37f810194a8338fc27ed058136f3312e7eb91de872fd4db5629a0640dc455c33152f5f0f85d854a35619c6d49a388edac76a3ddf30f5caf590e5665c693df85c7312f3cd42e609005407398698ae55af803162a6d79483149e1d71ca6c57ff5bdb1513ab8de8b25fa74ccc6ff61fcb6b48c4733730c770ddc727018eb9041c9475dda65af0b6a61715f2a7dafe012e7008affb7d6ec1a42261b5cd04b6f109255ae764874e8ea9541c5f930b38f6f6d39b37a1954232d3f3eb2975c02ceac7bcd757a99d5d7e108f97f052a214bd744b7065a1f2c22ad16fb197e4907ba9584ac0d3759031ce6807d0c6f7e5b0040dbf7f08fb5543e071116b6387992ba906bb6fbe8f75b16cb5c34d511187b85a4eacb817ee905704d0b480a77de667441b5a7fc7f9bd0494d9be7773622573a05b4f38334a707c71411a43779650fc4b15b47519019366049918df8f396d9e5bb1f8c5d8932824e152e14d9ee4bed1761815f5a5863a6174a5795ccc63f2e64da1b713be047a32f619a89ce5c949dc26906b82a7a90ad8e5571c05050560fc1ad60c5a9a027c90c76ace6a34e60a2b4ca4331820deea0747f5d1646c5d2e6269235a33ac3637fc573ab9aef27423bf22ad731af043b056863a2f27f0ea57aa3f53e4ea5c0f10ac2da53833ed857960b46f443a48669752580c631d19646e014640396a246520636a3e3c4cef9fc9e3a3bf513f6452d3f8a386a1b4d8e135cf0b312de42b482e34bb0ffff5dc138b3f444348890a7f09781b0ffd128acecc844275b2f67192ad61a074484926d9730c2eaea17ba0b200e8d666f07035bb8ac1cd6db008f5f707305ca956e37d6caa1cebc7e8f1d5f1ddac5cdd79cf53201ab103a596ce138df837af2a0813620d3f384381b6e673cd895386996fc163b963826b0057d6c086d900a2dbe7016c626e9df4764a1e4e67456399c7bed6a3ba7eb980fc24657bc7b57f8b5c93eed637c98662c5ff704757c41fafb7e1067a616a438a8ef6388d287478c7630157287fa45bc7d3c8c191b700c75244ba2bdbc8837b8e2577f435c6d559f67a6d18ea1d1a600a6b9a21cfabb3af0cbe5b9cdffad7bfda765a88e0f99405cb9672ca2a990e1f97c808848dc8a5ad444aa7ef477e2849b38fb4ae2bfd41334a8ac095f61a4a75dc8c36856b02c37ccaa8440f400c897719ed2ea977f5f5e05ae8d153f8cee734c788dc6e976ba874e620f7a8f40524056b978000df6549e27c105d214c3a885fcd5d245dc8d0918d116da27b758880e09392baea31e449fb94a0dde658b3b6af97207671d753edde9abbbb773ada00c94eec3c22b1768c26b57b155dba628cf5d196f1caebb5282a2404b85f51c81e172719d9bd74c289ba385853c6cfc43e90d3f6109ee2980159cfe369075c887bbf32d32e63c30d47c73221aeef11e6f3d01fc23e98d220cd1c4ec8dfda7619808484659f465806a80be9c56d4d1003b9fa6d4e904bcc914f1a40fbbd63b582434d737bb365949e74d2527d7e9475c1dfddb8f8c9fc15c34f9a40ada8daf9641c90b616f75aeb8c652dbb07f434ae0af02c376b2d92fb4aee9867fb9daa342d9ef365f46c07b6c6a06384e615d3bb80446848b3218a7fe8de65f17a23e7f019becbd57f5495ef7632320159b7c854e994af8e340e5a9c31cd2061851112a2e374831c47286c68df844988f19e38e3e5f6ec9037dd12148f22e8042f4a687ed5148f9a68650557e4edd8552d181a6c91006198ddff4c8bfe151054a81ab6803346a9902bcdd125bc98a335b7e4d569ca256f367df27ccb0870e18ff0f752a9909f73cc4327b95f879f5979e1b6b6113f9fe24983d5e79d1c2657c2cacbe7af7a47448863871e744009167e4152e6e259de0b213b3d441c9565c7170da8595df93c6d032fecffc2eb1c4615aec592f714c527fc5038c6069f3b71ec16a4d42e86cacaa392f30e8c9050ba2fd9c6c843424d35bb6d79fad05b74e4ad2bd65d52e4caf8f8fc624c87c11c28efb20f19023a8f9b580b05bf98b3f3fdda4669f7d4de61ae9dbdde85509212280933d809e189173c0cf9b5c0d810546b697f99933e07eb61831037bd775e719ff9615197a20634e1edbfc62ed6e972fe45f7a88ea3ed7194f453c83131d4f9aab1318f726a37e2dec9079da425129a335ff02e1faf6a93745c72a0a4f3572f265ca44eb2b53585710abe0d136f87b2c45d3141087f2f57c6fc224149a927d75eb015919babed0a1a3b990269b67599d9f9e848af6e5e1910df4f9f0051645c97e8c6fcb94050c95c2f41c8be1f90086a0ef4883cac7898498c9c9690ccafaa24375964b4d7e880381934debfa0dbab90b6ec3c7b4a8790c0b16ed20e98442ec6622cc04b1f31c282f0c2f9780fd75b5cd6978d097e1ecb45b24f65f14bfde1af05cf7a1702c40b9919ca4fdad03f2a7923a6dd0d37807c7c3179006c877874d8517f52551482703415a49bb7a556c363191c4941b061d20a614255b5a4081b7358fdbffd77379c00c803ad6562fff45b2fc2443155dfbbff25f2730584a95c2324fe291105a65624ac3985b433163f3356a60ccc87c9c520d96fc365f75d6007f1754cad9a7f91efa4fc6fcc48be382b07cacb12cff2969b46086a27254f19cf90debeb17994ce4f8ed1cc6a09c245eb88df18a64adfc4969f57fb2746bfe9814bc5ab9a7b4b5be2cc618334acf2076cef0341132f1e2d099ca0525200aaf22ad209d21fd42893b1fceeb2efa3fe0c45d40b851d455c9ec5b2dcc1bc632b1d700a9c2a851d4445c895ea156c91876fcec6aaa3a99ecd8fae2b0cd9db6a21f95a52e96e215084b638eaaa73d0c8fb5d220427dca439de7a693078f12278c17fb31628364c7c3ffc2a156701ed699806f6bac1f494dbd9e539bea789fef77427fd8e07cc25ba6d1bc7f8dbb24b16d815c6a2bd916718f008da35e4f6fc12a5b53895a73eafd3bcaab3e0a09d994f695ba5fe9904ef9b0b1485426d2da1a04168e95c963c3649b1d05fa2e3ad9039c08278bfbefd6e1b0d092ac22e76c0c138e9a190d692cddbcf51ce54ad6a6baff88347b28dcd2acad31257050eab2c5c8351b782809fec003a3969a39e0a09c79983ec121ab8417eed3972019bef04530096f40cd1c5c56e0fb8ce067a9be14d6b962c6592d8d6fdb68dd2642c7ae11b3caba7282a5e7b911f05a8e30acc79b715b2af468f65b9a8e04467a7bdb80c15f6c2bf4ec573fbd6fb606b2b2af001fad41e554aa332b56b4885af797b594deb4a470cc535d9f759e673fe040d815a3d22ed4aa46b1503a637e94c41f9483ac38bb16645f412a6e989241d7ed09b9c53d609cf55dee9ee10a6c60cf5355542a26bddb3a2be977b27370cdc89f0d28fa0959c97aba1c7921504b1f65115e9323996e3a776e8cf03157131b56447e2aad6016c3f489ca31997a1f02b3e171362c80fff74bdfe3a67aa5bc2b75474daf3eb94af58814e936ede97d580710dc52f58e06913cbd1cc31d54c3dc744ce06f9c798ec1fd425780fa533a5582502a1e1a037ece2f1102d542258985a34e86027d422a99bab693e8e99bf28a149365ccc23aa3f84b819ae39e13b9240555aac5b0b213c97cad4e3b95774c01348ede7532d174428f175284ff9b1101b998fe8ead55b180db668de78c4e8959e0bdde9eb7b367c4034138c65875c70d4f7b5ca103520adb68e22994c8464f2559570f3145ed2891ff88b2b652e0dd0dc74f723bfdaa8619875975372550c71ca8312eec904c7932b9f77c6820030cca9d20461ff0b4f5c8565084fe8f31d4b669a5b44f54f8c3a01e7864c77d64254d0cbdbb162cc23b5fe0ec1eed573bee1052481167b35537e0ceebe84dc20aef778631f9dfff0db5928d1c93fe73ede77fff5ba8fc832b03a7cf666f354dff702fa05906d50da237e9e6fbf3bf72735b09d68df14bcab25da2b1c4a553ec8d328cb3f53402466a696529e705a2c271bae94dc455e005ba2164869909a52c80f42c78de4cf34bec344aabbc94c260586837447147103268003403815e37097c99179a8d856a1012ee6c3cf99cc3545cbc31791afc1e007f8e0fb7c011d6f48e5d01e808671ede87c27d4c32a4096adb4bc4a57cd450e0922b526cd4e8fac59c80b75d8056c2becf1123796b47a6cbaea7d0da31a3f248bbdb5a17a78ae3971183bca3735f897cc585b8fdfd0755c1d9d4e4a05211d53cdaad758bca53d150d809b6af6f611b611d2eb2aadb65199e1d1a5498e4d51d795d383cf11a0cc54597094dc47d86465c99eef831899808af5cf22401119f2365fd9983c9daa27e552e9ed051242d3ff515a7e5b7aafb934d69e539ad904839905cfba62236aa2307965e2f262e23e259847c1eb6ee19f3f856e6768ca2ec56f6baaa535bbe81d6e7f9ee0b75da83b4526d01caeaa76a47d2fbf6adbaf05a47a4b40b29fdd7dd3ad71d80c19713e0bcd024390abcf60bb75e409f8180b67d99e052da51849ec7a3947becf56d93fb71a6a22306b8facc65395ef671752c1f0e7626832474a231902c92abe74c26d2a7545387344c314c4329e646dd03b2a4a56695578541a0a36a36aee79c24129e0f8fc2f424cf0101893227e4a1f7ce4c0167ea4fd8aa1733851caad7b774def4d5c26f159e8d86189c072a5d72e378bceb3f2049fd709651156cc4aa0ee1bc27cbf5a15d7a7fe8b809ba434ef118728be0953cf666d19fe8bdae3cd17b7b9770473745ef88b2b6352e10ff064d8acf1aa70d6d3c4b75161357e3787686df8387f9f93ea4915f4f6df44a42f3b48977165e66a00fb38f9ffb56c51588baa2eef290b21e293511038aafbc91f6ce85fd03e676f188cf93b6ab2838527d085fcda9b986149d760e2951280c0ca33166a4b43de9b6d636881721c5d1d266810efa863f115482b01e116595fce8c414f24844d326d2534f046e1830c186f82ed57ac1732d391293c7e5ba1e4582638d1908637ea1ab1550f9b7fbc725b2df32324e810ac0891db933f1ce0f33b48bb1f918c14d819dc93d460869bfad8ad700e6430239a0c4e937fa77ec12ef41b94a50f39164969316d944d3ba08d1b3f9ee60898dfcfdb3ef913236b986cab8817a5040b4f9946f82e092cf7b8ac51a3cdabb01157740ec656dd50d2eb2a4e5ac87987eb6edf792c27e7bf1cdc312e91354d8b6a71b641e95c75e7b2338b0ba5f265afb1882edbdb44b6bcb2682360ab12cfcb9df6d6af3003fadadaaa38f1ed8f9bb4c24a0743077e92480004921ea08190bfa5906aaeb71c0ddf25f04c1d880118159423ae32c8e7097fb5c4cb38daa6b38d2f525075fdd004500157681510878d55304b1c6078aa7328f895e8a2277c121148a1a20d4b1de4bc62d35161c34445e515d072153ad926b7591fa91df9bc7e8dbc0159108d2057e825b9395e467eab38ae878cef85a2ae89dd222b1c6dded6cff0311279ab7d5da466cec20b665e1bcac9af5e73d8c99b875cbc631a27ff65955167768ba0e0066ab5b72a5128d105377ec54a78ad9d5f426229b775ee48e43c03aac8f451d425723fb780661ea3bc764a73c586a7567674738c1659225cabdcb325fd8cd367701a0f937714c583bec1760eccaa73e8555c0f59e1c0595b88d33362def28c1c73892744a8c25ae91902248cfb6aaaef150d949241a4a93230073f9f4491c51af7412ab18deba5c30583cc97c16802f60b6e0284dc8fe6958468f0c8ac6537d88c083b7855b3d53ee75d54273c0f70b49f57d8c0f178c9d334ee4807e6bb403cbb3d11b9ed365f49e102dbee6f7e457d66386c31d1a8e134d5574fe15a1e19c1210a2bc27a52553f6e5c06da4cc3cebb19dc61d82af0ff898304db75b7f04f6c09b8684ff8abd64791f2a92a81531f74418c05b08fd7c13636355a18d1990c2c44de03901dd20994581d524d13fa62e5216013ccd2c00404ac5556194e0480bb79e10de0389f71c861b62c4d6bf6badc9467d2bbe51ae27134cf19ea1c9200503828473aa73b88d3e2744213dc0a1974dc8f6559733af7a8758373dbcde4c620d7c841209ee6960ee2e2906d7b1fd67cd6aaa94d1139fd758fa379a246f26cfdd1e6183b75ca1f814a47b2f80bb4e4ca218d0dcd97f63566fd8ceebfd5f42b7e93c44825de7979e1e9c811f739afa249bb7001dcf1c8dd12d710542b646d4e49ce6890d447e1306e8905a26c41d3c88dea199f1364a2cf6850b6fea9e898e1b3777bb0b239ee35456e98d54e8af1c9752462d7126df16754d44df4033a0e74765c66463f0fd6556c6fe4bce708573bbbb622012fad8bb0df63484f65c6bf78bf8a872fd6d8391e20cf7504b48d27cd1c43d59d70fa609ed65eb31ea2d90cd6c0474a1ffc0c0eece7a8b3946463ca3060929b51ffaf95846c10e51f0a082dde3fe71b47e6bf91deb31ebff73961753a3d954a54587ac14342eb95078efa4e864696e53e2062d6bdbc3605b1464cbadac259e13ff9fbcf25a8557eaa90ea98d1575448d1b68ff1e04e682119e92a80e4418b285789ca87acaae929685689ffc99a8be5218fc7978ce295a3a8169467645ab7d1ec6d642e77b5d77ace4fd179ac55962592f5c63ae0b6c6a5dd3ab8594c800b503ba12a02c26934b79fbc09cb2d85b2351cc549cc3b4857af3c63817f8cdbafc99817e8f10a2ac4bfc6170522185cc5e1e47c8202ca1f3c6a229c29957a919ceb5f5ac6d8c2a225aaebbba4dc93d7d4ac25951bd1a72fc807dd9ff6f880184d4cfaafd3ce45221c02cb66fd70f7753f962b6ed2b929dc89633333056a1300a0fae81aa6c4958a0874d8463de231b31ea22a8df7eb89a5f918e27384b52b1aae68a0233b4448f18b50f0cdd94d0a13eaa11ce73583a3081c9791869b040caee7baa145f0869955d1dcfce6cdf1a0bb09cd49f57061968e8c7a96e3755f7ca045343333c8c50c1b850f46ef0800653540d00c623783b0c1fd8972da04b544cde2a3f329ecfba0de43b464b32fe4d7df455475191ba4e4ab3246aed96bac15e9f6b4120d8d26de1359acdaa1d0d0c95b433f9ddff9185f9330672b07eaceaf027665f5491f526b1ad63a130b340a49f20c4c9e9948fc1d313afaf876ad6e52b739acbf928783257c7dbc0a18ae6a6edd7e938b0a85293ab407d9ead4bd392cae9741c6d8f983998c24d9c8f9f27d299d88cfd1c153c5e464000c29656d0bfe7489bc1225ee95c1e75817bbbb7f5b767264cd65ad31282bf0a420b5539809ad9dae3ca0cb7cb9efb3ee3ba299b37943f3c92ea060d6ce39b814c9155e5b072e35055e25c4b6b4a3822494099132fca612858355950a86814320365593a9e3c3be1680c907325d2c053fa71a5d72d60d9815b45a831bcc4908005c9d8e34132563089cde3fa1c74fcdd59a9c38d93546a0ce1844d9a4190974b702c26e08352b802c2fac010d70ce360dfeb7fd8097244628095bbc83000831bfb475cc64808b554248edc89c0a6552e9dab70242dbf404ec5571085ec3cc7c2bb91f8c983b451ea616ab73fb8f53ff73cdf0f0f7d695f1907cbe48dbc4a2d5f64775f28f6d0ec689e72a98991667090fecc7ce4201e2d221af522df696c58aef36b7b1b40073c4bf5f7c397b764b48f37087b2c48f7eed33d9aa7285a5957917216ea704c77ae3eeb24946256c59422ded1052408cbb4cd82feb1caf40599c9a06078d475d17547b26a691da52780c9310042ee1b4f6ad603267ff8ad565489dd12db5617f84f552b7f94a0ab5221be4fc426b7fd5ce2f3051914ea03756db486c7e119755d58cd5024b0d9eb0348e84fdf1cb6f6d6a6c503892e485bd31cbc07fd8bcb3c56406e91b3348b723de4ce52467a4b03b60d0a9b861096d80b6989898b422ae58c4eab9ff63ff2e3dd62628065bf05d6196885e44f5a48c5b2383679ed4dbbea6d80c5785c5dd9a46de78100952a9fcd85f1b1227817394b748a2040863753d94b81c7fe041dab11b124246fa4e661b23ddf2574b6a0162b62b5222dd4545ebf03d162ef9b2a4f51e32b952df1b61242d6502b3bf749c0b09d15a4e56537d5d3e014508ea55dab27127b1b455c287e9bed07c21e0d3d8b906431d2d48649d388e52a4ea00fee4b87a8954843f6be12fa5734e24f318d019446d37e5f95b9e73ae0bd48d5615470244b97a6f51fdb00e3d685b0f2a98569320f455c5da919bae322c81ec1a40c441b1c37172dadd4b92c05e7abb439e4e14012cdea883b39cb8d69f686d87f803d0bc4e8b3234d08d57f5f99302fdd8081937b28e28eb75632588e1c3b80b4603145a9230821f9c5573e2ed0015b34149dda3779e2c86d5b629882da26300f01d7efa09317cbb0aa5503199a572f1e8a09d7d983dfc6687e6a26041840802bf6691b6", 0x2000, &(0x7f0000004e40)={&(0x7f0000000080)={0x50, 0x0, 0x5, {0x7, 0x26, 0xfe, 0xd81daf28992fe1b0, 0x200, 0x400, 0x9, 0x3}}, &(0x7f0000002240)={0x18, 0x0, 0x3f, {0x5}}, &(0x7f0000002280)={0x18, 0x0, 0xffffffffffffffff, {0x100000001}}, &(0x7f00000022c0)={0x18, 0xffffffffffffffda, 0x0, {0x8b7a}}, &(0x7f0000002300)={0x18, 0x0, 0x7f, {0xf8b}}, &(0x7f0000002340)={0x28, 0x0, 0x7, {{0x7, 0x7, 0x0, r1}}}, &(0x7f0000002380)={0x60, 0x0, 0x3, {{0x7fffffffffffffff, 0xe89e, 0x4, 0xd3, 0x20, 0x10000, 0xd5ca, 0x2}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x80000000}}, &(0x7f0000002440)={0x12, 0x0, 0x6, {'&\x00'}}, &(0x7f0000002480)={0x20, 0x0, 0x1000, {0x0, 0x1}}, &(0x7f0000002600)={0x78, 0x0, 0x3, {0x3, 0x81, 0x0, {0x1, 0x8000, 0x100000001, 0x89, 0x24, 0x7fff, 0x5, 0x8, 0x6, 0x6000, 0x5, r2, 0x0, 0x9, 0x10000}}}, &(0x7f0000002740)={0x90, 0x0, 0x2, {0x1, 0x0, 0xd2d4, 0xea, 0x212d85a3, 0x6, {0x1, 0x5, 0x200, 0x0, 0x10000, 0x8000, 0x1000, 0x9, 0x6, 0x1000, 0x3, 0x0, r3, 0x1, 0x7}}}, &(0x7f0000002800)=ANY=[@ANYBLOB="c8000000f5ffffffff010000000000000300000000002000080000000000000000000000ff030000060000000000000001000000000000000100000001000000be000000000000000400000000000000e00800000000000005000000c400000024252a5b0b00000003000000000000000800000000000000050000000300000066757365000000000100000000000000cb0d00000000000008000000040000006d61785f726561640000000000000000030000000000000007000000880500002e4028272b232f00"], &(0x7f0000004a80)={0x290, 0x0, 0x9, [{{0x3, 0x0, 0x6, 0xfff, 0x1000, 0x400, {0x0, 0x100000000, 0x4ed9, 0x3ff, 0x401, 0x9, 0x4, 0x3, 0x3ac1b645, 0x2000, 0x2, r4, r5, 0xb98, 0xffff}}, {0x3, 0xed5, 0x0, 0x3f}}, {{0x2, 0x2, 0x8000, 0xfffffffffffffff7, 0x82, 0x40, {0x6, 0x10001, 0x8, 0x3, 0x7ff, 0x8, 0x10000, 0x1f, 0x9, 0x4000, 0x6, r6, 0x0, 0x4, 0x8000}}, {0x5, 0x4, 0x3, 0x0, '+$-'}}, {{0x5, 0x2, 0x10000, 0x6, 0x3f, 0x7fffffff, {0x9, 0x4, 0x1, 0x7, 0x7, 0x0, 0x2, 0x800, 0x0, 0xc000, 0x2, 0xee01, 0xffffffffffffffff, 0x8}}, {0x1, 0x6, 0x3, 0x7, '@,\x00'}}, {{0x1, 0x2, 0x7, 0x7, 0xfffffffd, 0x3, {0x2, 0x8000000000000000, 0x8, 0x9, 0x5, 0x0, 0xc78, 0x0, 0x9, 0xc000, 0x4fd1, 0xee01, 0xee01, 0x8, 0xfffffffc}}, {0x6, 0x7, 0xc, 0x6, '],:{}@&+!/*)'}}]}, &(0x7f0000004d40)={0xa0, 0x0, 0x100000000, {{0x0, 0x3, 0x4, 0x5a, 0x1, 0x2, {0x0, 0x7fffffff, 0x8, 0x7fffffff, 0xffffffffffffffff, 0x81, 0xe89, 0x8000, 0x1, 0x14000, 0x9, r7, 0xee00, 0x7}}, {0x0, 0x3}}}, &(0x7f0000004e00)={0x20, 0xfffffffffffffff5, 0x1, {0x9, 0x0, 0x0, 0x6}}}) 08:20:02 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x2b, 0x3, 0x0, {0x5, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) [ 2068.749205] mount_fs+0x92/0x2a0 [ 2068.752570] vfs_kern_mount.part.0+0x5b/0x470 [ 2068.757060] do_mount+0xe65/0x2a30 [ 2068.760601] ? copy_mount_string+0x40/0x40 [ 2068.764834] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2068.769844] ? copy_mnt_ns+0xa30/0xa30 [ 2068.773727] ? copy_mount_options+0x1fa/0x2f0 [ 2068.778217] ? copy_mnt_ns+0xa30/0xa30 [ 2068.782111] SyS_mount+0xa8/0x120 [ 2068.785568] ? copy_mnt_ns+0xa30/0xa30 [ 2068.789450] do_syscall_64+0x1d5/0x640 [ 2068.793339] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 08:20:02 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:02 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 32) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}}) [ 2068.798533] RIP: 0033:0x7f80d8a040c9 [ 2068.802230] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2068.809964] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2068.817227] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2068.824527] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2068.831791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2068.839168] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:02 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x2b, 0x3, 0x0, {0x5, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x2b, 0x3, 0x0, {0x5, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) (async) 08:20:02 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 27) 08:20:02 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+60000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) (async) clock_gettime(0x0, &(0x7f0000000180)) (async) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+60000}}) (async) 08:20:02 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:02 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}}) 08:20:02 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x2b, 0x3, 0x0, {0x5, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x2b, 0x3, 0x0, {0x5, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) (async) [ 2069.017722] FAULT_INJECTION: forcing a failure. [ 2069.017722] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.052798] CPU: 1 PID: 26062 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:02 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2069.060688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2069.070037] Call Trace: [ 2069.072624] dump_stack+0x1b2/0x281 [ 2069.076256] should_fail.cold+0x10a/0x149 [ 2069.080407] should_failslab+0xd6/0x130 [ 2069.084385] kmem_cache_alloc+0x28e/0x3c0 [ 2069.088532] __kernfs_new_node+0x6f/0x470 [ 2069.092681] kernfs_new_node+0x7b/0xe0 [ 2069.096566] __kernfs_create_file+0x3d/0x320 [ 2069.100971] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2069.105646] device_create_file+0xc8/0x100 [ 2069.109879] ? acpi_platform_notify_remove+0x1f0/0x1f0 08:20:02 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000000)={0x2, 0x7, 0x80}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06003d2a8379b29981811275c5733277f91f581fbf422574fc348ed01d88d103ae6d39ad6ec79c58eb39ce0333e519e5e4cdf6efc573ca92dda934b29548936b4bee6fa89e95a28ff2667dc0d69e1b206105", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2069.115152] device_add+0x37a/0x15c0 [ 2069.118867] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2069.124313] ? kfree_const+0x33/0x40 [ 2069.128022] ? device_is_dependent+0x2a0/0x2a0 [ 2069.132602] ? kfree+0x1f0/0x250 [ 2069.135976] device_create_groups_vargs+0x1dc/0x250 [ 2069.141000] device_create_vargs+0x3a/0x50 [ 2069.145242] bdi_register_va.part.0+0x35/0x650 [ 2069.149829] bdi_register_va+0x63/0x80 [ 2069.153718] super_setup_bdi_name+0x123/0x220 [ 2069.158213] ? kill_block_super+0xe0/0xe0 [ 2069.162363] ? do_raw_spin_unlock+0x164/0x220 [ 2069.166861] fuse_fill_super+0x937/0x15c0 [ 2069.171008] ? fuse_get_root_inode+0xc0/0xc0 [ 2069.175415] ? up_write+0x17/0x60 [ 2069.178889] ? register_shrinker+0x15f/0x220 [ 2069.183286] ? sget_userns+0x768/0xc10 [ 2069.187178] ? get_anon_bdev+0x1c0/0x1c0 [ 2069.191224] ? sget+0xd9/0x110 [ 2069.194400] ? fuse_get_root_inode+0xc0/0xc0 [ 2069.198799] mount_nodev+0x4c/0xf0 [ 2069.202344] mount_fs+0x92/0x2a0 [ 2069.205692] vfs_kern_mount.part.0+0x5b/0x470 [ 2069.210173] do_mount+0xe65/0x2a30 [ 2069.213695] ? do_raw_spin_unlock+0x164/0x220 [ 2069.218170] ? copy_mount_string+0x40/0x40 [ 2069.222384] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2069.227377] ? copy_mnt_ns+0xa30/0xa30 [ 2069.231260] ? copy_mount_options+0x1fa/0x2f0 [ 2069.235747] ? copy_mnt_ns+0xa30/0xa30 [ 2069.239614] SyS_mount+0xa8/0x120 [ 2069.243044] ? copy_mnt_ns+0xa30/0xa30 [ 2069.246926] do_syscall_64+0x1d5/0x640 [ 2069.250804] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2069.255987] RIP: 0033:0x7f80d8a040c9 [ 2069.259672] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2069.267353] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2069.274601] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2069.281870] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2069.289124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2069.296370] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x183}}]}}) (async) r1 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000024c0)='./file0\x00', 0x100, 0x0, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) getresgid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)=0x0) r4 = geteuid() (async) statx(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x1000, 0x800, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) read$FUSE(r0, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r7 = geteuid() syz_fuse_handle_req(r0, &(0x7f0000000240)="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", 0x2000, &(0x7f0000004e40)={&(0x7f0000000080)={0x50, 0x0, 0x5, {0x7, 0x26, 0xfe, 0xd81daf28992fe1b0, 0x200, 0x400, 0x9, 0x3}}, &(0x7f0000002240)={0x18, 0x0, 0x3f, {0x5}}, &(0x7f0000002280)={0x18, 0x0, 0xffffffffffffffff, {0x100000001}}, &(0x7f00000022c0)={0x18, 0xffffffffffffffda, 0x0, {0x8b7a}}, &(0x7f0000002300)={0x18, 0x0, 0x7f, {0xf8b}}, &(0x7f0000002340)={0x28, 0x0, 0x7, {{0x7, 0x7, 0x0, r1}}}, &(0x7f0000002380)={0x60, 0x0, 0x3, {{0x7fffffffffffffff, 0xe89e, 0x4, 0xd3, 0x20, 0x10000, 0xd5ca, 0x2}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x80000000}}, &(0x7f0000002440)={0x12, 0x0, 0x6, {'&\x00'}}, &(0x7f0000002480)={0x20, 0x0, 0x1000, {0x0, 0x1}}, &(0x7f0000002600)={0x78, 0x0, 0x3, {0x3, 0x81, 0x0, {0x1, 0x8000, 0x100000001, 0x89, 0x24, 0x7fff, 0x5, 0x8, 0x6, 0x6000, 0x5, r2, 0x0, 0x9, 0x10000}}}, &(0x7f0000002740)={0x90, 0x0, 0x2, {0x1, 0x0, 0xd2d4, 0xea, 0x212d85a3, 0x6, {0x1, 0x5, 0x200, 0x0, 0x10000, 0x8000, 0x1000, 0x9, 0x6, 0x1000, 0x3, 0x0, r3, 0x1, 0x7}}}, &(0x7f0000002800)=ANY=[@ANYBLOB="c8000000f5ffffffff010000000000000300000000002000080000000000000000000000ff030000060000000000000001000000000000000100000001000000be000000000000000400000000000000e00800000000000005000000c400000024252a5b0b00000003000000000000000800000000000000050000000300000066757365000000000100000000000000cb0d00000000000008000000040000006d61785f726561640000000000000000030000000000000007000000880500002e4028272b232f00"], &(0x7f0000004a80)={0x290, 0x0, 0x9, [{{0x3, 0x0, 0x6, 0xfff, 0x1000, 0x400, {0x0, 0x100000000, 0x4ed9, 0x3ff, 0x401, 0x9, 0x4, 0x3, 0x3ac1b645, 0x2000, 0x2, r4, r5, 0xb98, 0xffff}}, {0x3, 0xed5, 0x0, 0x3f}}, {{0x2, 0x2, 0x8000, 0xfffffffffffffff7, 0x82, 0x40, {0x6, 0x10001, 0x8, 0x3, 0x7ff, 0x8, 0x10000, 0x1f, 0x9, 0x4000, 0x6, r6, 0x0, 0x4, 0x8000}}, {0x5, 0x4, 0x3, 0x0, '+$-'}}, {{0x5, 0x2, 0x10000, 0x6, 0x3f, 0x7fffffff, {0x9, 0x4, 0x1, 0x7, 0x7, 0x0, 0x2, 0x800, 0x0, 0xc000, 0x2, 0xee01, 0xffffffffffffffff, 0x8}}, {0x1, 0x6, 0x3, 0x7, '@,\x00'}}, {{0x1, 0x2, 0x7, 0x7, 0xfffffffd, 0x3, {0x2, 0x8000000000000000, 0x8, 0x9, 0x5, 0x0, 0xc78, 0x0, 0x9, 0xc000, 0x4fd1, 0xee01, 0xee01, 0x8, 0xfffffffc}}, {0x6, 0x7, 0xc, 0x6, '],:{}@&+!/*)'}}]}, &(0x7f0000004d40)={0xa0, 0x0, 0x100000000, {{0x0, 0x3, 0x4, 0x5a, 0x1, 0x2, {0x0, 0x7fffffff, 0x8, 0x7fffffff, 0xffffffffffffffff, 0x81, 0xe89, 0x8000, 0x1, 0x14000, 0x9, r7, 0xee00, 0x7}}, {0x0, 0x3}}}, &(0x7f0000004e00)={0x20, 0xfffffffffffffff5, 0x1, {0x9, 0x0, 0x0, 0x6}}}) 08:20:03 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:03 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000000)={0x2, 0x7, 0x80}) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06003d2a8379b29981811275c5733277f91f581fbf422574fc348ed01d88d103ae6d39ad6ec79c58eb39ce0333e519e5e4cdf6efc573ca92dda934b29548936b4bee6fa89e95a28ff2667dc0d69e1b206105", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:03 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1400, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}}) 08:20:03 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="001ba6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) 08:20:03 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 28) 08:20:03 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:03 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000000)={0x2, 0x7, 0x80}) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06003d2a8379b29981811275c5733277f91f581fbf422574fc348ed01d88d103ae6d39ad6ec79c58eb39ce0333e519e5e4cdf6efc573ca92dda934b29548936b4bee6fa89e95a28ff2667dc0d69e1b206105", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:03 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1400, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1400, 0x8, &(0x7f0000000180)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}}) (async) 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x183}}]}}) r1 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f00000024c0)='./file0\x00', 0x100, 0x0, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) getresgid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)=0x0) (async, rerun: 64) r4 = geteuid() (async) statx(0xffffffffffffffff, &(0x7f0000002900)='./file0\x00', 0x1000, 0x800, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) read$FUSE(r0, &(0x7f0000002a40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (rerun: 64) r7 = geteuid() syz_fuse_handle_req(r0, &(0x7f0000000240)="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", 0x2000, &(0x7f0000004e40)={&(0x7f0000000080)={0x50, 0x0, 0x5, {0x7, 0x26, 0xfe, 0xd81daf28992fe1b0, 0x200, 0x400, 0x9, 0x3}}, &(0x7f0000002240)={0x18, 0x0, 0x3f, {0x5}}, &(0x7f0000002280)={0x18, 0x0, 0xffffffffffffffff, {0x100000001}}, &(0x7f00000022c0)={0x18, 0xffffffffffffffda, 0x0, {0x8b7a}}, &(0x7f0000002300)={0x18, 0x0, 0x7f, {0xf8b}}, &(0x7f0000002340)={0x28, 0x0, 0x7, {{0x7, 0x7, 0x0, r1}}}, &(0x7f0000002380)={0x60, 0x0, 0x3, {{0x7fffffffffffffff, 0xe89e, 0x4, 0xd3, 0x20, 0x10000, 0xd5ca, 0x2}}}, &(0x7f0000002400)={0x18, 0x0, 0x0, {0x80000000}}, &(0x7f0000002440)={0x12, 0x0, 0x6, {'&\x00'}}, &(0x7f0000002480)={0x20, 0x0, 0x1000, {0x0, 0x1}}, &(0x7f0000002600)={0x78, 0x0, 0x3, {0x3, 0x81, 0x0, {0x1, 0x8000, 0x100000001, 0x89, 0x24, 0x7fff, 0x5, 0x8, 0x6, 0x6000, 0x5, r2, 0x0, 0x9, 0x10000}}}, &(0x7f0000002740)={0x90, 0x0, 0x2, {0x1, 0x0, 0xd2d4, 0xea, 0x212d85a3, 0x6, {0x1, 0x5, 0x200, 0x0, 0x10000, 0x8000, 0x1000, 0x9, 0x6, 0x1000, 0x3, 0x0, r3, 0x1, 0x7}}}, &(0x7f0000002800)=ANY=[@ANYBLOB="c8000000f5ffffffff010000000000000300000000002000080000000000000000000000ff030000060000000000000001000000000000000100000001000000be000000000000000400000000000000e00800000000000005000000c400000024252a5b0b00000003000000000000000800000000000000050000000300000066757365000000000100000000000000cb0d00000000000008000000040000006d61785f726561640000000000000000030000000000000007000000880500002e4028272b232f00"], &(0x7f0000004a80)={0x290, 0x0, 0x9, [{{0x3, 0x0, 0x6, 0xfff, 0x1000, 0x400, {0x0, 0x100000000, 0x4ed9, 0x3ff, 0x401, 0x9, 0x4, 0x3, 0x3ac1b645, 0x2000, 0x2, r4, r5, 0xb98, 0xffff}}, {0x3, 0xed5, 0x0, 0x3f}}, {{0x2, 0x2, 0x8000, 0xfffffffffffffff7, 0x82, 0x40, {0x6, 0x10001, 0x8, 0x3, 0x7ff, 0x8, 0x10000, 0x1f, 0x9, 0x4000, 0x6, r6, 0x0, 0x4, 0x8000}}, {0x5, 0x4, 0x3, 0x0, '+$-'}}, {{0x5, 0x2, 0x10000, 0x6, 0x3f, 0x7fffffff, {0x9, 0x4, 0x1, 0x7, 0x7, 0x0, 0x2, 0x800, 0x0, 0xc000, 0x2, 0xee01, 0xffffffffffffffff, 0x8}}, {0x1, 0x6, 0x3, 0x7, '@,\x00'}}, {{0x1, 0x2, 0x7, 0x7, 0xfffffffd, 0x3, {0x2, 0x8000000000000000, 0x8, 0x9, 0x5, 0x0, 0xc78, 0x0, 0x9, 0xc000, 0x4fd1, 0xee01, 0xee01, 0x8, 0xfffffffc}}, {0x6, 0x7, 0xc, 0x6, '],:{}@&+!/*)'}}]}, &(0x7f0000004d40)={0xa0, 0x0, 0x100000000, {{0x0, 0x3, 0x4, 0x5a, 0x1, 0x2, {0x0, 0x7fffffff, 0x8, 0x7fffffff, 0xffffffffffffffff, 0x81, 0xe89, 0x8000, 0x1, 0x14000, 0x9, r7, 0xee00, 0x7}}, {0x0, 0x3}}}, &(0x7f0000004e00)={0x20, 0xfffffffffffffff5, 0x1, {0x9, 0x0, 0x0, 0x6}}}) 08:20:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000080)={0x6, 0x9, 0x1}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x1) 08:20:03 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="001ba6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) (async) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) (async, rerun: 32) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) (rerun: 32) [ 2069.885794] FAULT_INJECTION: forcing a failure. [ 2069.885794] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.939614] CPU: 0 PID: 26108 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2069.947522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2069.956957] Call Trace: [ 2069.959551] dump_stack+0x1b2/0x281 [ 2069.963190] should_fail.cold+0x10a/0x149 [ 2069.967340] should_failslab+0xd6/0x130 [ 2069.971309] kmem_cache_alloc+0x28e/0x3c0 [ 2069.975457] __kernfs_new_node+0x6f/0x470 [ 2069.979612] kernfs_new_node+0x7b/0xe0 [ 2069.983502] kernfs_create_link+0x27/0x160 [ 2069.987742] sysfs_do_create_link_sd+0x90/0x120 [ 2069.992412] sysfs_create_link+0x5f/0xc0 [ 2069.996571] device_add+0x461/0x15c0 [ 2070.000377] ? kfree_const+0x33/0x40 [ 2070.004087] ? device_is_dependent+0x2a0/0x2a0 [ 2070.008839] ? kfree+0x1f0/0x250 [ 2070.012206] device_create_groups_vargs+0x1dc/0x250 [ 2070.017226] device_create_vargs+0x3a/0x50 [ 2070.021465] bdi_register_va.part.0+0x35/0x650 [ 2070.026050] bdi_register_va+0x63/0x80 [ 2070.029935] super_setup_bdi_name+0x123/0x220 [ 2070.034430] ? kill_block_super+0xe0/0xe0 [ 2070.038578] ? do_raw_spin_unlock+0x164/0x220 [ 2070.043088] fuse_fill_super+0x937/0x15c0 [ 2070.047244] ? fuse_get_root_inode+0xc0/0xc0 [ 2070.051651] ? up_write+0x17/0x60 [ 2070.055098] ? register_shrinker+0x15f/0x220 [ 2070.059506] ? sget_userns+0x768/0xc10 [ 2070.063395] ? get_anon_bdev+0x1c0/0x1c0 [ 2070.067453] ? sget+0xd9/0x110 [ 2070.070642] ? fuse_get_root_inode+0xc0/0xc0 [ 2070.075044] mount_nodev+0x4c/0xf0 [ 2070.078586] mount_fs+0x92/0x2a0 [ 2070.081951] vfs_kern_mount.part.0+0x5b/0x470 [ 2070.086447] do_mount+0xe65/0x2a30 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2ca0b83d906d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2ca0b83d906d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2ca0b83d906d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2070.089982] ? do_raw_spin_unlock+0x164/0x220 [ 2070.094476] ? copy_mount_string+0x40/0x40 [ 2070.098709] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2070.103732] ? copy_mnt_ns+0xa30/0xa30 [ 2070.107619] ? copy_mount_options+0x1fa/0x2f0 [ 2070.112107] ? copy_mnt_ns+0xa30/0xa30 [ 2070.115992] SyS_mount+0xa8/0x120 [ 2070.119440] ? copy_mnt_ns+0xa30/0xa30 [ 2070.123326] do_syscall_64+0x1d5/0x640 [ 2070.127216] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2070.132397] RIP: 0033:0x7f80d8a040c9 08:20:03 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2600}}]}}) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x6}) 08:20:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000080)={0x6, 0x9, 0x1}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x1) [ 2070.136100] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2070.143802] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2070.151063] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2070.158324] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2070.165583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2070.172832] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:03 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 29) 08:20:03 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="001ba6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="001ba6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',\x00']) (async) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) (async) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) (async) 08:20:03 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1400, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}}) 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x8c0410, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES16=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC, @ANYBLOB, @ANYRESHEX=r0, @ANYBLOB="5a04"]) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), 0x200800, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB="b5ad04a875705f8b4643", @ANYRESDEC, @ANYBLOB=',max_read=0x8000000000000001,allow_other,max_read=0x0000000000000410,max_read=0x0000000000000006,default_permissions,allow_other,blksize=0x0000000000000600,permit_directio,mask=MAY_READ,sync,mask=MAY_APPEND,fowner=', @ANYRES16=r2, @ANYBLOB="2c7375626a5f747970653d2f6465762f66757365002c61707072616973655f747970653d696d617369672c6673636f6e746578743d73797361646d5f752c007ae6e8cb8da7dd887136ae77970e0caecac100cdf8dc"]) 08:20:03 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2600}}]}}) (async) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x6}) 08:20:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000080)={0x6, 0x9, 0x1}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async, rerun: 64) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x1) (rerun: 64) 08:20:03 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00'}) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2600}}]}}) (async) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0x6}) 08:20:03 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @d}}) 08:20:03 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x8c0410, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES16=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC, @ANYBLOB, @ANYRESHEX=r0, @ANYBLOB="5a04"]) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), 0x200800, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB="b5ad04a875705f8b4643", @ANYRESDEC, @ANYBLOB=',max_read=0x8000000000000001,allow_other,max_read=0x0000000000000410,max_read=0x0000000000000006,default_permissions,allow_other,blksize=0x0000000000000600,permit_directio,mask=MAY_READ,sync,mask=MAY_APPEND,fowner=', @ANYRES16=r2, @ANYBLOB="2c7375626a5f747970653d2f6465762f66757365002c61707072616973655f747970653d696d617369672c6673636f6e746578743d73797361646d5f752c007ae6e8cb8da7dd887136ae77970e0caecac100cdf8dc"]) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) (async) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x8c0410, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES16=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC, @ANYBLOB, @ANYRESHEX=r0, @ANYBLOB="5a04"]) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), 0x200800, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB="b5ad04a875705f8b4643", @ANYRESDEC, @ANYBLOB=',max_read=0x8000000000000001,allow_other,max_read=0x0000000000000410,max_read=0x0000000000000006,default_permissions,allow_other,blksize=0x0000000000000600,permit_directio,mask=MAY_READ,sync,mask=MAY_APPEND,fowner=', @ANYRES16=r2, @ANYBLOB="2c7375626a5f747970653d2f6465762f66757365002c61707072616973655f747970653d696d617369672c6673636f6e746578743d73797361646d5f752c007ae6e8cb8da7dd887136ae77970e0caecac100cdf8dc"]) (async) [ 2070.352788] FAULT_INJECTION: forcing a failure. [ 2070.352788] name failslab, interval 1, probability 0, space 0, times 0 [ 2070.395621] CPU: 0 PID: 26178 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2070.403542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2070.412892] Call Trace: [ 2070.415484] dump_stack+0x1b2/0x281 [ 2070.419114] should_fail.cold+0x10a/0x149 [ 2070.423262] should_failslab+0xd6/0x130 [ 2070.427234] kmem_cache_alloc+0x28e/0x3c0 [ 2070.431386] __kernfs_new_node+0x6f/0x470 [ 2070.435551] kernfs_new_node+0x7b/0xe0 [ 2070.439431] __kernfs_create_file+0x3d/0x320 08:20:04 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async, rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) (async, rerun: 32) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x8c0410, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES16=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC, @ANYBLOB, @ANYRESHEX=r0, @ANYBLOB="5a04"]) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), 0x200800, &(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0xee01, @ANYBLOB="b5ad04a875705f8b4643", @ANYRESDEC, @ANYBLOB=',max_read=0x8000000000000001,allow_other,max_read=0x0000000000000410,max_read=0x0000000000000006,default_permissions,allow_other,blksize=0x0000000000000600,permit_directio,mask=MAY_READ,sync,mask=MAY_APPEND,fowner=', @ANYRES16=r2, @ANYBLOB="2c7375626a5f747970653d2f6465762f66757365002c61707072616973655f747970653d696d617369672c6673636f6e746578743d73797361646d5f752c007ae6e8cb8da7dd887136ae77970e0caecac100cdf8dc"]) [ 2070.443838] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2070.448511] internal_create_group+0x22b/0x710 [ 2070.453093] sysfs_create_groups+0x92/0x130 [ 2070.457413] device_add+0x7e5/0x15c0 [ 2070.461125] ? kfree_const+0x33/0x40 [ 2070.464833] ? device_is_dependent+0x2a0/0x2a0 [ 2070.469408] ? kfree+0x1f0/0x250 [ 2070.472775] device_create_groups_vargs+0x1dc/0x250 [ 2070.477786] device_create_vargs+0x3a/0x50 [ 2070.482026] bdi_register_va.part.0+0x35/0x650 [ 2070.486609] bdi_register_va+0x63/0x80 [ 2070.490497] super_setup_bdi_name+0x123/0x220 08:20:04 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x1) [ 2070.495012] ? kill_block_super+0xe0/0xe0 [ 2070.499158] ? do_raw_spin_unlock+0x164/0x220 [ 2070.503661] fuse_fill_super+0x937/0x15c0 [ 2070.507817] ? fuse_get_root_inode+0xc0/0xc0 [ 2070.512223] ? up_write+0x17/0x60 [ 2070.515673] ? register_shrinker+0x15f/0x220 [ 2070.520086] ? sget_userns+0x768/0xc10 [ 2070.523981] ? get_anon_bdev+0x1c0/0x1c0 [ 2070.528034] ? sget+0xd9/0x110 [ 2070.531221] ? fuse_get_root_inode+0xc0/0xc0 [ 2070.535625] mount_nodev+0x4c/0xf0 [ 2070.539161] mount_fs+0x92/0x2a0 08:20:04 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x1) [ 2070.542525] vfs_kern_mount.part.0+0x5b/0x470 [ 2070.547019] do_mount+0xe65/0x2a30 [ 2070.550595] ? copy_mount_string+0x40/0x40 [ 2070.554830] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2070.559842] ? copy_mnt_ns+0xa30/0xa30 [ 2070.563730] ? copy_mount_options+0x1fa/0x2f0 [ 2070.568229] ? copy_mnt_ns+0xa30/0xa30 [ 2070.572115] SyS_mount+0xa8/0x120 [ 2070.575561] ? copy_mnt_ns+0xa30/0xa30 [ 2070.579453] do_syscall_64+0x1d5/0x640 [ 2070.583340] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2070.588522] RIP: 0033:0x7f80d8a040c9 08:20:04 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 30) 08:20:04 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x1) 08:20:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x2}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x80, &(0x7f0000000240)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) mknodat$loop(r1, &(0x7f0000000380)='./file0/file0\x00', 0x20, 0x1) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000140)) 08:20:04 executing program 3: ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10) 08:20:04 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/8, 0x8) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, 0x0, 0xf09, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000081}, 0x40805) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000000100000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) connect$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @local}, 0x10) [ 2070.592398] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2070.600102] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2070.607365] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2070.614623] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2070.622005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2070.629255] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:04 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @d}}) 08:20:04 executing program 3: ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10) 08:20:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x2}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x80, &(0x7f0000000240)) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) mknodat$loop(r1, &(0x7f0000000380)='./file0/file0\x00', 0x20, 0x1) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000140)) 08:20:04 executing program 4: syz_open_dev$dri(&(0x7f00000003c0), 0x6, 0x200) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="a4000000f800000000000000fba1040110ca411a7194eac28e4dbf7c12050b609646a65dc8d81724fb36858252e8532fd1b92d1451e38e1e875ab123a13ea7ffaf86d7974b28510323a07305047942c03eedfa7bc78720b49d5c2177c3b4d0fbe9a5126d727a27b7f4dbbc6cd2bdd2a012654cf1e62008fb0f0400d187f576d8a939f98ba567c760fd68a5261cad63c3889629c6694599bfa085b15c0dde449bd362e6f9af739ef712e7a5c0"], &(0x7f0000000280), 0x1800) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x60000, 0x10001, 0x7ff, 0x80000000], 0x4, 0x0, 0x0, 0xffffffffffffffff}) utimensat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{}, {0x77359400}}, 0x0) 08:20:04 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/8, 0x8) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, 0x0, 0xf09, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000081}, 0x40805) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000000100000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) connect$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @local}, 0x10) [ 2070.797063] FAULT_INJECTION: forcing a failure. [ 2070.797063] name failslab, interval 1, probability 0, space 0, times 0 [ 2070.833519] CPU: 1 PID: 26237 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2070.841511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2070.850865] Call Trace: [ 2070.853449] dump_stack+0x1b2/0x281 [ 2070.857074] should_fail.cold+0x10a/0x149 [ 2070.861220] should_failslab+0xd6/0x130 [ 2070.865194] kmem_cache_alloc+0x28e/0x3c0 [ 2070.869346] __kernfs_new_node+0x6f/0x470 [ 2070.873496] kernfs_new_node+0x7b/0xe0 [ 2070.877380] __kernfs_create_file+0x3d/0x320 [ 2070.881790] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2070.886463] internal_create_group+0x22b/0x710 [ 2070.891047] sysfs_create_groups+0x92/0x130 [ 2070.895366] device_add+0x7e5/0x15c0 [ 2070.899080] ? kfree_const+0x33/0x40 [ 2070.902797] ? device_is_dependent+0x2a0/0x2a0 [ 2070.907379] ? kfree+0x1f0/0x250 [ 2070.910746] device_create_groups_vargs+0x1dc/0x250 [ 2070.915762] device_create_vargs+0x3a/0x50 [ 2070.920000] bdi_register_va.part.0+0x35/0x650 [ 2070.924842] bdi_register_va+0x63/0x80 [ 2070.928831] super_setup_bdi_name+0x123/0x220 [ 2070.933327] ? kill_block_super+0xe0/0xe0 [ 2070.937478] ? do_raw_spin_unlock+0x164/0x220 [ 2070.941973] fuse_fill_super+0x937/0x15c0 08:20:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x800) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x2}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x80, &(0x7f0000000240)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) mknodat$loop(r1, &(0x7f0000000380)='./file0/file0\x00', 0x20, 0x1) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000140)) syz_open_dev$dri(&(0x7f0000000080), 0x7, 0x800) (async) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x2}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x80, &(0x7f0000000240)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) (async) mknodat$loop(r1, &(0x7f0000000380)='./file0/file0\x00', 0x20, 0x1) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000140)) (async) 08:20:04 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x8, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000080)={@id={0x2, 0x0, @d}}) [ 2070.946120] ? fuse_get_root_inode+0xc0/0xc0 [ 2070.950530] ? up_write+0x17/0x60 [ 2070.953978] ? register_shrinker+0x15f/0x220 [ 2070.958381] ? sget_userns+0x768/0xc10 [ 2070.962271] ? get_anon_bdev+0x1c0/0x1c0 [ 2070.966326] ? sget+0xd9/0x110 [ 2070.969514] ? fuse_get_root_inode+0xc0/0xc0 [ 2070.973915] mount_nodev+0x4c/0xf0 [ 2070.977449] mount_fs+0x92/0x2a0 [ 2070.980822] vfs_kern_mount.part.0+0x5b/0x470 [ 2070.985315] do_mount+0xe65/0x2a30 [ 2070.988866] ? copy_mount_string+0x40/0x40 [ 2070.993101] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2070.998127] ? copy_mnt_ns+0xa30/0xa30 [ 2071.002013] ? copy_mount_options+0x1fa/0x2f0 [ 2071.006506] ? copy_mnt_ns+0xa30/0xa30 [ 2071.010390] SyS_mount+0xa8/0x120 [ 2071.013870] ? copy_mnt_ns+0xa30/0xa30 [ 2071.017753] do_syscall_64+0x1d5/0x640 [ 2071.021644] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2071.026836] RIP: 0033:0x7f80d8a040c9 [ 2071.030538] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2071.038237] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:04 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 31) 08:20:04 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:04 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:04 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/8, 0x8) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, 0x0, 0xf09, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000081}, 0x40805) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0000000100000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r3, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) connect$vsock_stream(r2, &(0x7f00000001c0)={0x28, 0x0, 0x2711, @local}, 0x10) 08:20:04 executing program 3: ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10) 08:20:04 executing program 4: syz_open_dev$dri(&(0x7f00000003c0), 0x6, 0x200) (async) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="a4000000f800000000000000fba1040110ca411a7194eac28e4dbf7c12050b609646a65dc8d81724fb36858252e8532fd1b92d1451e38e1e875ab123a13ea7ffaf86d7974b28510323a07305047942c03eedfa7bc78720b49d5c2177c3b4d0fbe9a5126d727a27b7f4dbbc6cd2bdd2a012654cf1e62008fb0f0400d187f576d8a939f98ba567c760fd68a5261cad63c3889629c6694599bfa085b15c0dde449bd362e6f9af739ef712e7a5c0"], &(0x7f0000000280), 0x1800) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x60000, 0x10001, 0x7ff, 0x80000000], 0x4, 0x0, 0x0, 0xffffffffffffffff}) utimensat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{}, {0x77359400}}, 0x0) [ 2071.045504] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2071.052766] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2071.060032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2071.067286] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:04 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:04 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async, rerun: 32) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) (async, rerun: 32) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:04 executing program 4: syz_open_dev$dri(&(0x7f00000003c0), 0x6, 0x200) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="a4000000f800000000000000fba1040110ca411a7194eac28e4dbf7c12050b609646a65dc8d81724fb36858252e8532fd1b92d1451e38e1e875ab123a13ea7ffaf86d7974b28510323a07305047942c03eedfa7bc78720b49d5c2177c3b4d0fbe9a5126d727a27b7f4dbbc6cd2bdd2a012654cf1e62008fb0f0400d187f576d8a939f98ba567c760fd68a5261cad63c3889629c6694599bfa085b15c0dde449bd362e6f9af739ef712e7a5c0"], &(0x7f0000000280), 0x1800) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x60000, 0x10001, 0x7ff, 0x80000000], 0x4, 0x0, 0x0, 0xffffffffffffffff}) utimensat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{}, {0x77359400}}, 0x0) syz_open_dev$dri(&(0x7f00000003c0), 0x6, 0x200) (async) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="a4000000f800000000000000fba1040110ca411a7194eac28e4dbf7c12050b609646a65dc8d81724fb36858252e8532fd1b92d1451e38e1e875ab123a13ea7ffaf86d7974b28510323a07305047942c03eedfa7bc78720b49d5c2177c3b4d0fbe9a5126d727a27b7f4dbbc6cd2bdd2a012654cf1e62008fb0f0400d187f576d8a939f98ba567c760fd68a5261cad63c3889629c6694599bfa085b15c0dde449bd362e6f9af739ef712e7a5c0"], &(0x7f0000000280), 0x1800) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x8000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000300)={&(0x7f00000002c0)=[0x60000, 0x10001, 0x7ff, 0x80000000], 0x4}) (async) utimensat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{}, {0x77359400}}, 0x0) (async) 08:20:04 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x40a882, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="050700", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:04 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:04 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={r0}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2071.247150] FAULT_INJECTION: forcing a failure. [ 2071.247150] name failslab, interval 1, probability 0, space 0, times 0 [ 2071.293185] CPU: 0 PID: 26289 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2071.301088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2071.310435] Call Trace: [ 2071.313023] dump_stack+0x1b2/0x281 [ 2071.316685] should_fail.cold+0x10a/0x149 [ 2071.320835] should_failslab+0xd6/0x130 [ 2071.324821] kmem_cache_alloc+0x28e/0x3c0 [ 2071.328978] __kernfs_new_node+0x6f/0x470 [ 2071.333135] kernfs_new_node+0x7b/0xe0 [ 2071.337029] __kernfs_create_file+0x3d/0x320 [ 2071.341442] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2071.346148] internal_create_group+0x22b/0x710 [ 2071.350750] sysfs_create_groups+0x92/0x130 [ 2071.355077] device_add+0x7e5/0x15c0 [ 2071.358783] ? kfree_const+0x33/0x40 [ 2071.362489] ? device_is_dependent+0x2a0/0x2a0 [ 2071.367048] ? kfree+0x1f0/0x250 [ 2071.370410] device_create_groups_vargs+0x1dc/0x250 [ 2071.375428] device_create_vargs+0x3a/0x50 [ 2071.379643] bdi_register_va.part.0+0x35/0x650 [ 2071.384206] bdi_register_va+0x63/0x80 [ 2071.388089] super_setup_bdi_name+0x123/0x220 [ 2071.392562] ? kill_block_super+0xe0/0xe0 [ 2071.396785] ? do_raw_spin_unlock+0x164/0x220 [ 2071.401268] fuse_fill_super+0x937/0x15c0 [ 2071.405393] ? fuse_get_root_inode+0xc0/0xc0 [ 2071.409793] ? up_write+0x17/0x60 [ 2071.413236] ? register_shrinker+0x15f/0x220 [ 2071.417624] ? sget_userns+0x768/0xc10 [ 2071.421514] ? get_anon_bdev+0x1c0/0x1c0 [ 2071.425564] ? sget+0xd9/0x110 [ 2071.428749] ? fuse_get_root_inode+0xc0/0xc0 [ 2071.433156] mount_nodev+0x4c/0xf0 [ 2071.436698] mount_fs+0x92/0x2a0 [ 2071.440053] vfs_kern_mount.part.0+0x5b/0x470 [ 2071.444532] do_mount+0xe65/0x2a30 [ 2071.448069] ? copy_mount_string+0x40/0x40 [ 2071.452282] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2071.457292] ? copy_mnt_ns+0xa30/0xa30 [ 2071.461163] ? copy_mount_options+0x1fa/0x2f0 [ 2071.465723] ? copy_mnt_ns+0xa30/0xa30 [ 2071.469586] SyS_mount+0xa8/0x120 [ 2071.473018] ? copy_mnt_ns+0xa30/0xa30 [ 2071.476883] do_syscall_64+0x1d5/0x640 [ 2071.480756] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2071.485923] RIP: 0033:0x7f80d8a040c9 08:20:05 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 32) 08:20:05 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x40a882, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="050700", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:05 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x0, {0x1f, 0x0, 0x1f, 0x7}}, 0x20) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d067e2f9a091b165457135b6f2b397b837fd2f74e20e0676a0c92b243c35c34db9c65b76fbd587b1bf812d36a41c527961191b418d6d8", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='-\x00']) 08:20:05 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={r0}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') (async) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)) (async) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={r0}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:20:05 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (rerun: 32) 08:20:05 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x29, 0x3, 0x0, {0x5, 0x8, 0x0, 'group_id'}}, 0x29) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) socket$inet_udp(0x2, 0x2, 0x0) [ 2071.489608] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2071.497301] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2071.504567] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2071.511827] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2071.519072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2071.526330] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:05 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x29, 0x3, 0x0, {0x5, 0x8, 0x0, 'group_id'}}, 0x29) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) socket$inet_udp(0x2, 0x2, 0x0) 08:20:05 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x0, {0x1f, 0x0, 0x1f, 0x7}}, 0x20) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d067e2f9a091b165457135b6f2b397b837fd2f74e20e0676a0c92b243c35c34db9c65b76fbd587b1bf812d36a41c527961191b418d6d8", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='-\x00']) 08:20:05 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0xcacba0c3ec3e65b, 0x0) renameat2(r1, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x4) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x8, 0x8, 0x5, 0x3a, &(0x7f0000000000)=""/58, 0x59, &(0x7f0000000080)=""/89, 0xb, &(0x7f0000000240)=""/11}) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:05 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x40a882, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB="050700", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:05 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00') ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000200)={r0}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2071.689711] FAULT_INJECTION: forcing a failure. [ 2071.689711] name failslab, interval 1, probability 0, space 0, times 0 [ 2071.739340] CPU: 0 PID: 26326 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2071.747250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2071.756598] Call Trace: [ 2071.759183] dump_stack+0x1b2/0x281 [ 2071.762810] should_fail.cold+0x10a/0x149 [ 2071.766959] should_failslab+0xd6/0x130 [ 2071.770934] kmem_cache_alloc+0x28e/0x3c0 [ 2071.775087] __kernfs_new_node+0x6f/0x470 [ 2071.779245] kernfs_create_dir_ns+0x8c/0x200 [ 2071.783657] internal_create_group+0xe9/0x710 [ 2071.788162] dpm_sysfs_add+0x21/0x1c0 [ 2071.791961] device_add+0x977/0x15c0 [ 2071.795673] ? device_is_dependent+0x2a0/0x2a0 [ 2071.800250] ? kfree+0x1f0/0x250 [ 2071.803614] device_create_groups_vargs+0x1dc/0x250 [ 2071.808630] device_create_vargs+0x3a/0x50 [ 2071.812869] bdi_register_va.part.0+0x35/0x650 [ 2071.817452] bdi_register_va+0x63/0x80 [ 2071.821341] super_setup_bdi_name+0x123/0x220 [ 2071.825833] ? kill_block_super+0xe0/0xe0 [ 2071.829993] ? do_raw_spin_unlock+0x164/0x220 [ 2071.834490] fuse_fill_super+0x937/0x15c0 08:20:05 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x0, {0x1f, 0x0, 0x1f, 0x7}}, 0x20) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c757365725f69643d067e2f9a091b165457135b6f2b397b837fd2f74e20e0676a0c92b243c35c34db9c65b76fbd587b1bf812d36a41c527961191b418d6d8", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='-\x00']) [ 2071.838637] ? fuse_get_root_inode+0xc0/0xc0 [ 2071.843042] ? up_write+0x17/0x60 [ 2071.846487] ? register_shrinker+0x15f/0x220 [ 2071.850889] ? sget_userns+0x768/0xc10 [ 2071.854778] ? get_anon_bdev+0x1c0/0x1c0 [ 2071.858835] ? sget+0xd9/0x110 [ 2071.862019] ? fuse_get_root_inode+0xc0/0xc0 [ 2071.866420] mount_nodev+0x4c/0xf0 [ 2071.869955] mount_fs+0x92/0x2a0 [ 2071.873319] vfs_kern_mount.part.0+0x5b/0x470 [ 2071.877816] do_mount+0xe65/0x2a30 [ 2071.881360] ? copy_mount_string+0x40/0x40 [ 2071.885594] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2071.890608] ? copy_mnt_ns+0xa30/0xa30 [ 2071.894491] ? copy_mount_options+0x1fa/0x2f0 [ 2071.898977] ? copy_mnt_ns+0xa30/0xa30 [ 2071.902851] SyS_mount+0xa8/0x120 [ 2071.906288] ? copy_mnt_ns+0xa30/0xa30 [ 2071.910151] do_syscall_64+0x1d5/0x640 [ 2071.914018] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2071.919185] RIP: 0033:0x7f80d8a040c9 [ 2071.922870] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2071.930575] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:05 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 33) 08:20:05 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_user={'subj_user', 0x3d, '-{[-\'-'}}, {@uid_lt}, {@measure}, {@obj_user={'obj_user', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 08:20:05 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570a2ddf762659e83a4262886d460dd5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:05 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0xcacba0c3ec3e65b, 0x0) renameat2(r1, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x4) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x8, 0x8, 0x5, 0x3a, &(0x7f0000000000)=""/58, 0x59, &(0x7f0000000080)=""/89, 0xb, &(0x7f0000000240)=""/11}) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:05 executing program 5: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$KDMKTONE(r0, 0x4b30, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000200)) ioctl$TCFLSH(r0, 0x540b, 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x49) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000001c0)={0xb5, 0x4, 0x3}) 08:20:05 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)={0x29, 0x3, 0x0, {0x5, 0x8, 0x0, 'group_id'}}, 0x29) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) socket$inet_udp(0x2, 0x2, 0x0) [ 2071.937825] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2071.945096] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2071.952343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2071.959594] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:05 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570a2ddf762659e83a4262886d460dd5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2072.116704] FAULT_INJECTION: forcing a failure. [ 2072.116704] name failslab, interval 1, probability 0, space 0, times 0 [ 2072.128262] CPU: 1 PID: 26377 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2072.136241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2072.145579] Call Trace: [ 2072.148151] dump_stack+0x1b2/0x281 [ 2072.151757] should_fail.cold+0x10a/0x149 [ 2072.155886] should_failslab+0xd6/0x130 [ 2072.159843] kmem_cache_alloc+0x40/0x3c0 [ 2072.163886] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 2072.169492] idr_get_free_cmn+0x595/0x8d0 [ 2072.173620] idr_alloc_cmn+0xe8/0x1e0 [ 2072.177395] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 2072.182215] ? fs_reclaim_release+0xd0/0x110 [ 2072.186600] idr_alloc_cyclic+0xc2/0x1d0 [ 2072.190637] ? idr_alloc_cmn+0x1e0/0x1e0 [ 2072.194674] ? __radix_tree_preload+0x1c3/0x250 [ 2072.199318] __kernfs_new_node+0xaf/0x470 [ 2072.203461] kernfs_create_dir_ns+0x8c/0x200 [ 2072.207847] internal_create_group+0xe9/0x710 [ 2072.212321] dpm_sysfs_add+0x21/0x1c0 [ 2072.216097] device_add+0x977/0x15c0 [ 2072.219790] ? device_is_dependent+0x2a0/0x2a0 [ 2072.224367] ? kfree+0x1f0/0x250 [ 2072.227708] device_create_groups_vargs+0x1dc/0x250 [ 2072.232700] device_create_vargs+0x3a/0x50 [ 2072.236931] bdi_register_va.part.0+0x35/0x650 [ 2072.241505] bdi_register_va+0x63/0x80 [ 2072.245367] super_setup_bdi_name+0x123/0x220 [ 2072.249855] ? kill_block_super+0xe0/0xe0 [ 2072.254002] ? do_raw_spin_unlock+0x164/0x220 [ 2072.258474] fuse_fill_super+0x937/0x15c0 [ 2072.262613] ? fuse_get_root_inode+0xc0/0xc0 [ 2072.266998] ? up_write+0x17/0x60 [ 2072.270429] ? register_shrinker+0x15f/0x220 [ 2072.274827] ? sget_userns+0x768/0xc10 [ 2072.278692] ? get_anon_bdev+0x1c0/0x1c0 [ 2072.282725] ? sget+0xd9/0x110 [ 2072.285906] ? fuse_get_root_inode+0xc0/0xc0 [ 2072.290292] mount_nodev+0x4c/0xf0 [ 2072.293812] mount_fs+0x92/0x2a0 [ 2072.297160] vfs_kern_mount.part.0+0x5b/0x470 [ 2072.301632] do_mount+0xe65/0x2a30 [ 2072.305149] ? tcp_v6_do_rcv+0xb00/0x11d0 [ 2072.309274] ? copy_mount_string+0x40/0x40 [ 2072.313484] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2072.318477] ? copy_mnt_ns+0xa30/0xa30 [ 2072.322342] ? copy_mount_options+0x1fa/0x2f0 [ 2072.326816] ? copy_mnt_ns+0xa30/0xa30 [ 2072.330695] SyS_mount+0xa8/0x120 [ 2072.334230] ? copy_mnt_ns+0xa30/0xa30 [ 2072.338124] do_syscall_64+0x1d5/0x640 [ 2072.342012] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2072.347180] RIP: 0033:0x7f80d8a040c9 [ 2072.350873] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2072.358558] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:05 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0xcacba0c3ec3e65b, 0x0) renameat2(r1, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x4) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x8, 0x8, 0x5, 0x3a, &(0x7f0000000000)=""/58, 0x59, &(0x7f0000000080)=""/89, 0xb, &(0x7f0000000240)=""/11}) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0xcacba0c3ec3e65b, 0x0) (async) renameat2(r1, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x4) (async) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x8, 0x8, 0x5, 0x3a, &(0x7f0000000000)=""/58, 0x59, &(0x7f0000000080)=""/89, 0xb, &(0x7f0000000240)=""/11}) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:05 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x3, 0x80000001, 0x7f], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) renameat(r0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000200)={@desc={0x1, 0x0, @desc3}}) mknodat(r0, &(0x7f0000000300)='./file0\x00', 0x800, 0x5) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="af0d000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000080000000000000005000000070000006675736500000000"], 0x30) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2810a0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67626f75705f69fff09086ee3d", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=group_id,hash,rootcontext=staff_u,subj_user=,\x00']) 08:20:05 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_user={'subj_user', 0x3d, '-{[-\'-'}}, {@uid_lt}, {@measure}, {@obj_user={'obj_user', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 08:20:05 executing program 5: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$KDMKTONE(r0, 0x4b30, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000200)) (async) ioctl$TCFLSH(r0, 0x540b, 0x1) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x49) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000001c0)={0xb5, 0x4, 0x3}) [ 2072.365808] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2072.373054] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2072.380338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2072.387585] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570a2ddf762659e83a4262886d460dd5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:06 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 34) 08:20:06 executing program 5: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$KDMKTONE(r0, 0x4b30, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000200)) ioctl$TCFLSH(r0, 0x540b, 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x49) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000001c0)={0xb5, 0x4, 0x3}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) (async) ioctl$KDMKTONE(r0, 0x4b30, 0x0) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000200)) (async) ioctl$TCFLSH(r0, 0x540b, 0x1) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x49) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) syz_open_dev$tty20(0xc, 0x4, 0x1) (async) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000001c0)={0xb5, 0x4, 0x3}) (async) 08:20:06 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_user={'subj_user', 0x3d, '-{[-\'-'}}, {@uid_lt}, {@measure}, {@obj_user={'obj_user', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) 08:20:06 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x3, 0x80000001, 0x7f], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) renameat(r0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000200)={@desc={0x1, 0x0, @desc3}}) mknodat(r0, &(0x7f0000000300)='./file0\x00', 0x800, 0x5) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="af0d000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000080000000000000005000000070000006675736500000000"], 0x30) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2810a0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67626f75705f69fff09086ee3d", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=group_id,hash,rootcontext=staff_u,subj_user=,\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x3, 0x80000001, 0x7f], 0x3, 0x80000}) (async) renameat(r0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80000}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000200)={@desc={0x1, 0x0, @desc3}}) (async) mknodat(r0, &(0x7f0000000300)='./file0\x00', 0x800, 0x5) (async) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="af0d000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000080000000000000005000000070000006675736500000000"], 0x30) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2810a0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67626f75705f69fff09086ee3d", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=group_id,hash,rootcontext=staff_u,subj_user=,\x00']) (async) 08:20:06 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) renameat(r0, &(0x7f0000000280)='./file0/file0\x00', r1, &(0x7f0000000300)='./file0\x00') r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) fchmodat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x50) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'hsr0\x00'}]}, 0x68}}, 0x4000000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x71, 0x3, 0x10000, 0x8001, 0x7, 0x69f3a3bd], 0x6, 0x0, 0x0, 0xffffffffffffffff}) mknodat$loop(r4, &(0x7f00000000c0)='./file0/file0\x00', 0x1, 0x1) 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10101, &(0x7f0000002340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d3030303030303006000030303030303130303030302c757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,allow_other,max_read=0x0000000000000001,allow_other,obj_user=],fowner<', @ANYRESDEC=r1, @ANYBLOB=',smackfsroot=^=1$(}@!,\x00']) 08:20:06 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x480, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRES16=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',pcr=00000000000000000032,nolazytime,\x00']) 08:20:06 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) renameat(r0, &(0x7f0000000280)='./file0/file0\x00', r1, &(0x7f0000000300)='./file0\x00') (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) fchmodat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x50) (async) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'hsr0\x00'}]}, 0x68}}, 0x4000000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x71, 0x3, 0x10000, 0x8001, 0x7, 0x69f3a3bd], 0x6, 0x0, 0x0, 0xffffffffffffffff}) mknodat$loop(r4, &(0x7f00000000c0)='./file0/file0\x00', 0x1, 0x1) 08:20:06 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x3, 0x80000001, 0x7f], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) renameat(r0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000200)={@desc={0x1, 0x0, @desc3}}) mknodat(r0, &(0x7f0000000300)='./file0\x00', 0x800, 0x5) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="af0d000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000080000000000000005000000070000006675736500000000"], 0x30) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2810a0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67626f75705f69fff09086ee3d", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=group_id,hash,rootcontext=staff_u,subj_user=,\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x3, 0x80000001, 0x7f], 0x3, 0x80000}) (async) renameat(r0, &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00') (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x7], 0x1, 0x80000}) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000200)={@desc={0x1, 0x0, @desc3}}) (async) mknodat(r0, &(0x7f0000000300)='./file0\x00', 0x800, 0x5) (async) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="af0d000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000080000000000000005000000070000006675736500000000"], 0x30) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2810a0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB="2c67626f75705f69fff09086ee3d", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=group_id,hash,rootcontext=staff_u,subj_user=,\x00']) (async) 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10101, &(0x7f0000002340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d3030303030303006000030303030303130303030302c757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,allow_other,max_read=0x0000000000000001,allow_other,obj_user=],fowner<', @ANYRESDEC=r1, @ANYBLOB=',smackfsroot=^=1$(}@!,\x00']) [ 2072.674024] FAULT_INJECTION: forcing a failure. [ 2072.674024] name failslab, interval 1, probability 0, space 0, times 0 [ 2072.712967] CPU: 1 PID: 26419 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:06 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x200}}]}}) [ 2072.720877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2072.730226] Call Trace: [ 2072.732813] dump_stack+0x1b2/0x281 [ 2072.736456] should_fail.cold+0x10a/0x149 [ 2072.736470] should_failslab+0xd6/0x130 [ 2072.736482] kmem_cache_alloc+0x28e/0x3c0 [ 2072.736497] __kernfs_new_node+0x6f/0x470 [ 2072.736508] kernfs_new_node+0x7b/0xe0 [ 2072.736519] __kernfs_create_file+0x3d/0x320 [ 2072.736531] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2072.736546] sysfs_merge_group+0xdc/0x200 [ 2072.736560] dpm_sysfs_add+0x122/0x1c0 [ 2072.736570] device_add+0x977/0x15c0 [ 2072.736583] ? device_is_dependent+0x2a0/0x2a0 [ 2072.736592] ? kfree+0x1f0/0x250 [ 2072.736605] device_create_groups_vargs+0x1dc/0x250 [ 2072.736617] device_create_vargs+0x3a/0x50 [ 2072.736631] bdi_register_va.part.0+0x35/0x650 [ 2072.799299] bdi_register_va+0x63/0x80 [ 2072.803185] super_setup_bdi_name+0x123/0x220 [ 2072.807678] ? kill_block_super+0xe0/0xe0 [ 2072.811822] ? do_raw_spin_unlock+0x164/0x220 [ 2072.816316] fuse_fill_super+0x937/0x15c0 [ 2072.820462] ? fuse_get_root_inode+0xc0/0xc0 08:20:06 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x480, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRES16=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',pcr=00000000000000000032,nolazytime,\x00']) [ 2072.824862] ? up_write+0x17/0x60 [ 2072.828303] ? register_shrinker+0x15f/0x220 [ 2072.832703] ? sget_userns+0x768/0xc10 [ 2072.836597] ? get_anon_bdev+0x1c0/0x1c0 [ 2072.840652] ? sget+0xd9/0x110 [ 2072.843838] ? fuse_get_root_inode+0xc0/0xc0 [ 2072.848242] mount_nodev+0x4c/0xf0 [ 2072.851777] mount_fs+0x92/0x2a0 [ 2072.855141] vfs_kern_mount.part.0+0x5b/0x470 [ 2072.859634] do_mount+0xe65/0x2a30 [ 2072.863181] ? copy_mount_string+0x40/0x40 [ 2072.867413] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2072.872424] ? copy_mnt_ns+0xa30/0xa30 [ 2072.876310] ? copy_mount_options+0x1fa/0x2f0 [ 2072.880797] ? copy_mnt_ns+0xa30/0xa30 [ 2072.884676] SyS_mount+0xa8/0x120 [ 2072.888121] ? copy_mnt_ns+0xa30/0xa30 [ 2072.892004] do_syscall_64+0x1d5/0x640 [ 2072.895893] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2072.901074] RIP: 0033:0x7f80d8a040c9 [ 2072.904774] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2072.912486] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:06 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 35) 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10101, &(0x7f0000002340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d3030303030303006000030303030303130303030302c757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,allow_other,max_read=0x0000000000000001,allow_other,obj_user=],fowner<', @ANYRESDEC=r1, @ANYBLOB=',smackfsroot=^=1$(}@!,\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000240)={0x2020}, 0x2020) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_open_dev$tty1(0xc, 0x4, 0x2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x10101, &(0x7f0000002340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="2c726f6f746d6f64653d3030303030303006000030303030303130303030302c757365725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,allow_other,max_read=0x0000000000000001,allow_other,obj_user=],fowner<', @ANYRESDEC=r1, @ANYBLOB=',smackfsroot=^=1$(}@!,\x00']) (async) 08:20:06 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x480, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRES16=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',pcr=00000000000000000032,nolazytime,\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x480, &(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRES16=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r0, @ANYBLOB=',pcr=00000000000000000032,nolazytime,\x00']) (async) 08:20:06 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x200}}]}}) 08:20:06 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) renameat(r0, &(0x7f0000000280)='./file0/file0\x00', r1, &(0x7f0000000300)='./file0\x00') r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) fchmodat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x50) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'hsr0\x00'}]}, 0x68}}, 0x4000000) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x71, 0x3, 0x10000, 0x8001, 0x7, 0x69f3a3bd], 0x6, 0x0, 0x0, 0xffffffffffffffff}) mknodat$loop(r4, &(0x7f00000000c0)='./file0/file0\x00', 0x1, 0x1) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) renameat(r0, &(0x7f0000000280)='./file0/file0\x00', r1, &(0x7f0000000300)='./file0\x00') (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) fchmodat(r0, &(0x7f0000000240)='./file0/file0\x00', 0x50) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r2, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e20}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'hsr0\x00'}]}, 0x68}}, 0x4000000) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x71, 0x3, 0x10000, 0x8001, 0x7, 0x69f3a3bd], 0x6}) (async) mknodat$loop(r4, &(0x7f00000000c0)='./file0/file0\x00', 0x1, 0x1) (async) [ 2072.919753] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2072.927014] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2072.934280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2072.941548] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:06 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x8], 0x1, 0x0, 0x0, 0xffffffffffffffff}) renameat(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004540)={0xc8, 0x0, r3, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0xffffffffffffffda, r3, {0x2, 0x0, 0x8001}}, 0x20) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="6608bb34c0b300", @ANYRESHEX=r1, @ANYBLOB="2c3d30303030303030303030303030303030303130303030302c757365725f69643d0055ac69a4ba5491f154d478171007e310427383b523944dc47467c06b6a29d9288d4b6f31c81e9a9d6f5808081ab338476c2432e5d3daa05a128e5e1999989734c8dbc7c83bc201a57fc4f4ebc41ee579025bda63f3b5fc400d0ee349e36325d2b476e5046a672a2246c88c629539de6ecc7da3868857f146", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:06 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) mmap$KVM_VCPU(&(0x7f0000ff9000/0x4000)=nil, 0x930, 0x5, 0x40010, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x11) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x18040, 0x0) statx(r4, &(0x7f0000000000)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) 08:20:06 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x200}}]}}) 08:20:06 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x88800, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x8000, 0x9) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='vJV', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000(00101000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) r4 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r4, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000000c0)={0x8}) [ 2073.107328] FAULT_INJECTION: forcing a failure. [ 2073.107328] name failslab, interval 1, probability 0, space 0, times 0 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x8], 0x1, 0x0, 0x0, 0xffffffffffffffff}) renameat(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004540)={0xc8, 0x0, r3, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0xffffffffffffffda, r3, {0x2, 0x0, 0x8001}}, 0x20) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="6608bb34c0b300", @ANYRESHEX=r1, @ANYBLOB="2c3d30303030303030303030303030303030303130303030302c757365725f69643d0055ac69a4ba5491f154d478171007e310427383b523944dc47467c06b6a29d9288d4b6f31c81e9a9d6f5808081ab338476c2432e5d3daa05a128e5e1999989734c8dbc7c83bc201a57fc4f4ebc41ee579025bda63f3b5fc400d0ee349e36325d2b476e5046a672a2246c88c629539de6ecc7da3868857f146", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2073.152435] CPU: 0 PID: 26501 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2073.160341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2073.169702] Call Trace: [ 2073.172290] dump_stack+0x1b2/0x281 [ 2073.175927] should_fail.cold+0x10a/0x149 [ 2073.180076] should_failslab+0xd6/0x130 [ 2073.184051] kmem_cache_alloc+0x28e/0x3c0 [ 2073.188201] __kernfs_new_node+0x6f/0x470 [ 2073.192352] kernfs_new_node+0x7b/0xe0 [ 2073.196242] __kernfs_create_file+0x3d/0x320 08:20:06 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) mmap$KVM_VCPU(&(0x7f0000ff9000/0x4000)=nil, 0x930, 0x5, 0x40010, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x11) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x18040, 0x0) statx(r4, &(0x7f0000000000)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) (async) mmap$KVM_VCPU(&(0x7f0000ff9000/0x4000)=nil, 0x930, 0x5, 0x40010, r0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x11) (async) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x18040, 0x0) (async) statx(r4, &(0x7f0000000000)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) (async) [ 2073.200648] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2073.205314] sysfs_merge_group+0xdc/0x200 [ 2073.209466] dpm_sysfs_add+0x122/0x1c0 [ 2073.213348] device_add+0x977/0x15c0 [ 2073.217058] ? device_is_dependent+0x2a0/0x2a0 [ 2073.221634] ? kfree+0x1f0/0x250 [ 2073.224997] device_create_groups_vargs+0x1dc/0x250 [ 2073.230016] device_create_vargs+0x3a/0x50 [ 2073.234253] bdi_register_va.part.0+0x35/0x650 [ 2073.238834] bdi_register_va+0x63/0x80 [ 2073.242719] super_setup_bdi_name+0x123/0x220 [ 2073.247211] ? kill_block_super+0xe0/0xe0 [ 2073.251362] ? do_raw_spin_unlock+0x164/0x220 [ 2073.255852] fuse_fill_super+0x937/0x15c0 [ 2073.260001] ? fuse_get_root_inode+0xc0/0xc0 [ 2073.264502] ? up_write+0x17/0x60 [ 2073.267951] ? register_shrinker+0x15f/0x220 [ 2073.272356] ? sget_userns+0x768/0xc10 [ 2073.276243] ? get_anon_bdev+0x1c0/0x1c0 [ 2073.280324] ? sget+0xd9/0x110 [ 2073.283514] ? fuse_get_root_inode+0xc0/0xc0 [ 2073.287923] mount_nodev+0x4c/0xf0 [ 2073.291457] mount_fs+0x92/0x2a0 [ 2073.294823] vfs_kern_mount.part.0+0x5b/0x470 [ 2073.299314] do_mount+0xe65/0x2a30 [ 2073.302854] ? copy_mount_string+0x40/0x40 [ 2073.307086] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2073.312146] ? copy_mnt_ns+0xa30/0xa30 [ 2073.316031] ? copy_mount_options+0x1fa/0x2f0 [ 2073.320521] ? copy_mnt_ns+0xa30/0xa30 [ 2073.324680] SyS_mount+0xa8/0x120 [ 2073.328133] ? copy_mnt_ns+0xa30/0xa30 [ 2073.332068] do_syscall_64+0x1d5/0x640 [ 2073.335961] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2073.341585] RIP: 0033:0x7f80d8a040c9 [ 2073.345274] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:20:06 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 36) 08:20:06 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x88800, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x8000, 0x9) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='vJV', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000(00101000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) (async) r4 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r4, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000000c0)={0x8}) 08:20:06 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) mmap$KVM_VCPU(&(0x7f0000ff9000/0x4000)=nil, 0x930, 0x5, 0x40010, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x11) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x18040, 0x0) statx(r4, &(0x7f0000000000)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x4200, 0x0) (async) mmap$KVM_VCPU(&(0x7f0000ff9000/0x4000)=nil, 0x930, 0x5, 0x40010, r0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000180)={0xfffffffffffffffe, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x11) (async) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x18040, 0x0) (async) statx(r4, &(0x7f0000000000)='./file0\x00', 0x800, 0x7ff, &(0x7f00000001c0)) (async) 08:20:06 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x8], 0x1, 0x0, 0x0, 0xffffffffffffffff}) renameat(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004540)={0xc8, 0x0, r3, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0xffffffffffffffda, r3, {0x2, 0x0, 0x8001}}, 0x20) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="6608bb34c0b300", @ANYRESHEX=r1, @ANYBLOB="2c3d30303030303030303030303030303030303130303030302c757365725f69643d0055ac69a4ba5491f154d478171007e310427383b523944dc47467c06b6a29d9288d4b6f31c81e9a9d6f5808081ab338476c2432e5d3daa05a128e5e1999989734c8dbc7c83bc201a57fc4f4ebc41ee579025bda63f3b5fc400d0ee349e36325d2b476e5046a672a2246c88c629539de6ecc7da3868857f146", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x8], 0x1}) (async) renameat(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000002500)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004540)={0xc8, 0x0, r3, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) (async) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0xffffffffffffffda, r3, {0x2, 0x0, 0x8001}}, 0x20) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="6608bb34c0b300", @ANYRESHEX=r1, @ANYBLOB="2c3d30303030303030303030303030303030303130303030302c757365725f69643d0055ac69a4ba5491f154d478171007e310427383b523944dc47467c06b6a29d9288d4b6f31c81e9a9d6f5808081ab338476c2432e5d3daa05a128e5e1999989734c8dbc7c83bc201a57fc4f4ebc41ee579025bda63f3b5fc400d0ee349e36325d2b476e5046a672a2246c88c629539de6ecc7da3868857f146", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:20:06 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2073.352961] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2073.360210] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2073.367472] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2073.374734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2073.381987] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:07 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x198, 0x40, 0x1, 0x6, 0xffffffff, 0x7f], 0x6, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x100, &(0x7f0000000280)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:07 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x88800, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x8000, 0x9) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='vJV', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000(00101000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',\x00']) (async) r4 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r4, 0x0, 0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000000c0)={0x8}) 08:20:07 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2073.522705] FAULT_INJECTION: forcing a failure. [ 2073.522705] name failslab, interval 1, probability 0, space 0, times 0 [ 2073.552506] CPU: 0 PID: 26545 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2073.560562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2073.569912] Call Trace: [ 2073.572498] dump_stack+0x1b2/0x281 [ 2073.576157] should_fail.cold+0x10a/0x149 [ 2073.580306] should_failslab+0xd6/0x130 [ 2073.584284] kmem_cache_alloc+0x28e/0x3c0 [ 2073.588436] __kernfs_new_node+0x6f/0x470 [ 2073.592580] kernfs_new_node+0x7b/0xe0 [ 2073.596459] __kernfs_create_file+0x3d/0x320 [ 2073.600863] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2073.605531] sysfs_merge_group+0xdc/0x200 [ 2073.609677] dpm_sysfs_add+0x122/0x1c0 [ 2073.613561] device_add+0x977/0x15c0 [ 2073.617273] ? device_is_dependent+0x2a0/0x2a0 08:20:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='\x00', r0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x5) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x90b400, &(0x7f0000000740)=ANY=[@ANYRES16=r4, @ANYRESHEX=0x0, @ANYRESHEX=r2, @ANYRES8=r0, @ANYBLOB=',group_id=', @ANYBLOB="6dc17c725dd50f0326478fe138baf89f86f5e6965a8db33d8a42145be1d41729093175cf19e1c5ce09b5eb89f11eeb379c45456c82312634d7a253ed17d99774b3b317593318c6700b4972bdcec4535fca625f0232c911b9ac4216e31711ed7d97d06b54a1496c", @ANYRES8=r3]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xa1b, 0x5, 0xffffff74, 0x2, 0x2], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x6000, 0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="5001000000000000", @ANYRES64=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00040000090000000000000000000000000000000afe00000000000007000000900c0000757365725f696400060000000000000002000000000000008f3a391c000000000400000000000000020000001f0000000300000000000000ffffffffffffffff0800000000000000b400000000000000ffffffffffffffff09000000000000000500000004000000850100000000000003000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYBLOB="04000000ef000000007db1000402000000000000030000000000000004000000f9fdffff275b5d5c00000000"], 0xfffffffffffffdac) 08:20:07 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x34, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303032303030302c75737540917d4d99841a0647c6d92e65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000001a00,\x00']) [ 2073.621851] ? kfree+0x1f0/0x250 [ 2073.625217] device_create_groups_vargs+0x1dc/0x250 [ 2073.630240] device_create_vargs+0x3a/0x50 [ 2073.634512] bdi_register_va.part.0+0x35/0x650 [ 2073.639097] bdi_register_va+0x63/0x80 [ 2073.642989] super_setup_bdi_name+0x123/0x220 [ 2073.647482] ? kill_block_super+0xe0/0xe0 [ 2073.651629] ? do_raw_spin_unlock+0x164/0x220 [ 2073.656129] fuse_fill_super+0x937/0x15c0 [ 2073.660797] ? fuse_get_root_inode+0xc0/0xc0 [ 2073.665200] ? up_write+0x17/0x60 [ 2073.668648] ? register_shrinker+0x15f/0x220 [ 2073.673048] ? sget_userns+0x768/0xc10 [ 2073.676960] ? get_anon_bdev+0x1c0/0x1c0 [ 2073.681016] ? sget+0xd9/0x110 [ 2073.684206] ? fuse_get_root_inode+0xc0/0xc0 [ 2073.688606] mount_nodev+0x4c/0xf0 [ 2073.692138] mount_fs+0x92/0x2a0 [ 2073.695510] vfs_kern_mount.part.0+0x5b/0x470 [ 2073.700470] do_mount+0xe65/0x2a30 [ 2073.704022] ? copy_mount_string+0x40/0x40 [ 2073.708258] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2073.713276] ? copy_mnt_ns+0xa30/0xa30 [ 2073.717164] ? copy_mount_options+0x1fa/0x2f0 08:20:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='\x00', r0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) renameat2(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x5) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r4) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x90b400, &(0x7f0000000740)=ANY=[@ANYRES16=r4, @ANYRESHEX=0x0, @ANYRESHEX=r2, @ANYRES8=r0, @ANYBLOB=',group_id=', @ANYBLOB="6dc17c725dd50f0326478fe138baf89f86f5e6965a8db33d8a42145be1d41729093175cf19e1c5ce09b5eb89f11eeb379c45456c82312634d7a253ed17d99774b3b317593318c6700b4972bdcec4535fca625f0232c911b9ac4216e31711ed7d97d06b54a1496c", @ANYRES8=r3]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xa1b, 0x5, 0xffffff74, 0x2, 0x2], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) (async) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x6000, 0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="5001000000000000", @ANYRES64=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00040000090000000000000000000000000000000afe00000000000007000000900c0000757365725f696400060000000000000002000000000000008f3a391c000000000400000000000000020000001f0000000300000000000000ffffffffffffffff0800000000000000b400000000000000ffffffffffffffff09000000000000000500000004000000850100000000000003000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYBLOB="04000000ef000000007db1000402000000000000030000000000000004000000f9fdffff275b5d5c00000000"], 0xfffffffffffffdac) 08:20:07 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x34, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303032303030302c75737540917d4d99841a0647c6d92e65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000001a00,\x00']) [ 2073.721657] ? copy_mnt_ns+0xa30/0xa30 [ 2073.725542] SyS_mount+0xa8/0x120 [ 2073.728990] ? copy_mnt_ns+0xa30/0xa30 [ 2073.732884] do_syscall_64+0x1d5/0x640 [ 2073.736772] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2073.741960] RIP: 0033:0x7f80d8a040c9 [ 2073.745665] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2073.753366] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2073.760629] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2073.767896] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2073.775272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2073.782536] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:07 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 37) 08:20:07 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xffff], 0x1, 0x800, 0x0, 0xffffffffffffffff}) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x400) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:07 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x198, 0x40, 0x1, 0x6, 0xffffffff, 0x7f], 0x6, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x100, &(0x7f0000000280)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x198, 0x40, 0x1, 0x6, 0xffffffff, 0x7f], 0x6}) (async) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x100, &(0x7f0000000280)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:20:07 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x50008, &(0x7f0000000340)=ANY=[@ANYRES8=r2, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67726f75825f62763d", @ANYRESDEC=0x0, @ANYRESHEX=r2]) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x80000}) 08:20:07 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x34, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303032303030302c75737540917d4d99841a0647c6d92e65725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,blksize=0x0000000000001a00,\x00']) 08:20:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000004c0)='encrypted\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='\x00', r0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) renameat2(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x5) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x90b400, &(0x7f0000000740)=ANY=[@ANYRES16=r4, @ANYRESHEX=0x0, @ANYRESHEX=r2, @ANYRES8=r0, @ANYBLOB=',group_id=', @ANYBLOB="6dc17c725dd50f0326478fe138baf89f86f5e6965a8db33d8a42145be1d41729093175cf19e1c5ce09b5eb89f11eeb379c45456c82312634d7a253ed17d99774b3b317593318c6700b4972bdcec4535fca625f0232c911b9ac4216e31711ed7d97d06b54a1496c", @ANYRES8=r3]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xa1b, 0x5, 0xffffff74, 0x2, 0x2], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) (async, rerun: 64) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x6000, 0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) (rerun: 64) write$FUSE_DIRENTPLUS(r5, &(0x7f0000000840)=ANY=[@ANYBLOB="5001000000000000", @ANYRES64=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00040000090000000000000000000000000000000afe00000000000007000000900c0000757365725f696400060000000000000002000000000000008f3a391c000000000400000000000000020000001f0000000300000000000000ffffffffffffffff0800000000000000b400000000000000ffffffffffffffff09000000000000000500000004000000850100000000000003000000", @ANYRES32=r6, @ANYRES32=0xee01, @ANYBLOB="04000000ef000000007db1000402000000000000030000000000000004000000f9fdffff275b5d5c00000000"], 0xfffffffffffffdac) 08:20:07 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x198, 0x40, 0x1, 0x6, 0xffffffff, 0x7f], 0x6, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x100, &(0x7f0000000280)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x198, 0x40, 0x1, 0x6, 0xffffffff, 0x7f], 0x6}) (async) statx(r0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x100, &(0x7f0000000280)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:20:07 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xffff], 0x1, 0x800, 0x0, 0xffffffffffffffff}) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x400) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xffff], 0x1, 0x800}) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x400) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:07 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000340)={0xc9ac, 0x1, 0x4, 0x9, 0x18, "41eb8f59091d6758"}) socket$vsock_stream(0x28, 0x1, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fanotify_mark(r0, 0x20, 0x80000032, r1, &(0x7f0000000080)='./file0\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00'}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_LSEEK(r0, &(0x7f0000000300)={0x18, 0x0, r4, {0x4}}, 0x18) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d30785cb78ed2303030303030303030303030303030372c6d61785f726561643d3078303030303030303030303030303034312c6d61785f726561643d3078303030303030303030303030306364642c6d61785f726561643d3078303030303030303030303030303037382c64656661756c745f7065726d697373696f6e732c6146476f775f6f746865722c6d61785f726561643d3078303030303030303130303030303030302c616c6c6f775f6f746865722c616c6c6f775f6f746865722c626c6b73697a653d30783030303030303030303030303138"]) r5 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) ioctl$TIOCGETD(r5, 0x5424, &(0x7f00000000c0)) 08:20:07 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 38) [ 2073.984021] FAULT_INJECTION: forcing a failure. [ 2073.984021] name failslab, interval 1, probability 0, space 0, times 0 08:20:07 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x52) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x1000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000=U_id=\x00'/38, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2073.987703] CPU: 1 PID: 26603 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2073.987710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 08:20:07 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xffff], 0x1, 0x800, 0x0, 0xffffffffffffffff}) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000240)='./file0\x00', 0x400) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2073.987713] Call Trace: [ 2073.987729] dump_stack+0x1b2/0x281 [ 2073.987746] should_fail.cold+0x10a/0x149 [ 2073.987761] should_failslab+0xd6/0x130 [ 2073.987774] kmem_cache_alloc+0x28e/0x3c0 [ 2073.987790] __kernfs_new_node+0x6f/0x470 [ 2073.987802] kernfs_new_node+0x7b/0xe0 [ 2073.987813] __kernfs_create_file+0x3d/0x320 [ 2073.987825] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2073.987839] sysfs_merge_group+0xdc/0x200 08:20:07 executing program 5: ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000000000)=[0x0]}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2073.987852] dpm_sysfs_add+0x122/0x1c0 [ 2073.987863] device_add+0x977/0x15c0 [ 2073.987881] ? device_is_dependent+0x2a0/0x2a0 [ 2073.987890] ? kfree+0x1f0/0x250 [ 2073.987905] device_create_groups_vargs+0x1dc/0x250 [ 2073.987921] device_create_vargs+0x3a/0x50 [ 2073.987936] bdi_register_va.part.0+0x35/0x650 [ 2073.987949] bdi_register_va+0x63/0x80 [ 2073.987962] super_setup_bdi_name+0x123/0x220 [ 2073.987973] ? kill_block_super+0xe0/0xe0 [ 2073.987985] ? do_raw_spin_unlock+0x164/0x220 [ 2073.988001] fuse_fill_super+0x937/0x15c0 08:20:07 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x8ef5fda5) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x0, &(0x7f0000000240)) [ 2073.988013] ? fuse_get_root_inode+0xc0/0xc0 [ 2073.988026] ? up_write+0x17/0x60 [ 2073.988035] ? register_shrinker+0x15f/0x220 [ 2073.988048] ? sget_userns+0x768/0xc10 [ 2073.988070] ? get_anon_bdev+0x1c0/0x1c0 [ 2073.988078] ? sget+0xd9/0x110 [ 2073.988086] ? fuse_get_root_inode+0xc0/0xc0 [ 2073.988095] mount_nodev+0x4c/0xf0 [ 2073.988105] mount_fs+0x92/0x2a0 [ 2073.988119] vfs_kern_mount.part.0+0x5b/0x470 [ 2073.988131] do_mount+0xe65/0x2a30 [ 2073.988142] ? do_raw_spin_unlock+0x164/0x220 08:20:07 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000340)={0xc9ac, 0x1, 0x4, 0x9, 0x18, "41eb8f59091d6758"}) (async) socket$vsock_stream(0x28, 0x1, 0x0) (async, rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async, rerun: 64) fanotify_mark(r0, 0x20, 0x80000032, r1, &(0x7f0000000080)='./file0\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00'}) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) read$FUSE(r3, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) (async) write$FUSE_LSEEK(r0, &(0x7f0000000300)={0x18, 0x0, r4, {0x4}}, 0x18) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d30785cb78ed2303030303030303030303030303030372c6d61785f726561643d3078303030303030303030303030303034312c6d61785f726561643d3078303030303030303030303030306364642c6d61785f726561643d3078303030303030303030303030303037382c64656661756c745f7065726d697373696f6e732c6146476f775f6f746865722c6d61785f726561643d3078303030303030303130303030303030302c616c6c6f775f6f746865722c616c6c6f775f6f746865722c626c6b73697a653d30783030303030303030303030303138"]) (async) r5 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) ioctl$TIOCGETD(r5, 0x5424, &(0x7f00000000c0)) [ 2073.988155] ? copy_mount_string+0x40/0x40 [ 2073.988167] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2073.988177] ? copy_mnt_ns+0xa30/0xa30 [ 2073.988187] ? copy_mount_options+0x1fa/0x2f0 [ 2073.988196] ? copy_mnt_ns+0xa30/0xa30 [ 2073.988206] SyS_mount+0xa8/0x120 [ 2073.988215] ? copy_mnt_ns+0xa30/0xa30 [ 2073.988226] do_syscall_64+0x1d5/0x640 [ 2073.988241] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2073.988249] RIP: 0033:0x7f80d8a040c9 [ 2073.988254] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2073.988264] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2073.988270] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2073.988275] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2073.988280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2073.988285] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2074.160067] FAULT_INJECTION: forcing a failure. [ 2074.160067] name failslab, interval 1, probability 0, space 0, times 0 08:20:07 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$VT_DISALLOCATE(r0, 0x5608) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x50008, &(0x7f0000000340)=ANY=[@ANYRES8=r2, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67726f75825f62763d", @ANYRESDEC=0x0, @ANYRESHEX=r2]) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x80000}) 08:20:07 executing program 5: ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000000000)=[0x0]}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2074.388214] CPU: 1 PID: 26637 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2074.396089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2074.405444] Call Trace: [ 2074.408029] dump_stack+0x1b2/0x281 [ 2074.411655] should_fail.cold+0x10a/0x149 [ 2074.415803] should_failslab+0xd6/0x130 [ 2074.419775] kmem_cache_alloc+0x28e/0x3c0 [ 2074.423920] __kernfs_new_node+0x6f/0x470 [ 2074.428067] kernfs_new_node+0x7b/0xe0 [ 2074.431950] __kernfs_create_file+0x3d/0x320 [ 2074.436360] sysfs_add_file_mode_ns+0x1e1/0x450 08:20:08 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x8ef5fda5) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x0, &(0x7f0000000240)) [ 2074.441028] sysfs_merge_group+0xdc/0x200 [ 2074.445172] dpm_sysfs_add+0x122/0x1c0 [ 2074.449059] device_add+0x977/0x15c0 [ 2074.453029] ? device_is_dependent+0x2a0/0x2a0 [ 2074.457607] ? kfree+0x1f0/0x250 [ 2074.460971] device_create_groups_vargs+0x1dc/0x250 [ 2074.465982] device_create_vargs+0x3a/0x50 [ 2074.470215] bdi_register_va.part.0+0x35/0x650 [ 2074.474792] bdi_register_va+0x63/0x80 [ 2074.478676] super_setup_bdi_name+0x123/0x220 [ 2074.483174] ? kill_block_super+0xe0/0xe0 [ 2074.487317] ? do_raw_spin_unlock+0x164/0x220 08:20:08 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x40000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000340)={0xc9ac, 0x1, 0x4, 0x9, 0x18, "41eb8f59091d6758"}) (async) socket$vsock_stream(0x28, 0x1, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) fanotify_mark(r0, 0x20, 0x80000032, r1, &(0x7f0000000080)='./file0\x00') (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00'}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_LSEEK(r0, &(0x7f0000000300)={0x18, 0x0, r4, {0x4}}, 0x18) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB="2c6d61785f726561643d30785cb78ed2303030303030303030303030303030372c6d61785f726561643d3078303030303030303030303030303034312c6d61785f726561643d3078303030303030303030303030306364642c6d61785f726561643d3078303030303030303030303030303037382c64656661756c745f7065726d697373696f6e732c6146476f775f6f746865722c6d61785f726561643d3078303030303030303130303030303030302c616c6c6f775f6f746865722c616c6c6f775f6f746865722c626c6b73697a653d30783030303030303030303030303138"]) (async) r5 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) ioctl$TIOCGETD(r5, 0x5424, &(0x7f00000000c0)) 08:20:08 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x52) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x1000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000=U_id=\x00'/38, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) (async) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) fchmodat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x52) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x1000, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000200)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000=U_id=\x00'/38, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) [ 2074.491816] fuse_fill_super+0x937/0x15c0 [ 2074.495968] ? fuse_get_root_inode+0xc0/0xc0 [ 2074.500372] ? up_write+0x17/0x60 [ 2074.503818] ? register_shrinker+0x15f/0x220 [ 2074.508307] ? sget_userns+0x768/0xc10 [ 2074.512196] ? get_anon_bdev+0x1c0/0x1c0 [ 2074.516260] ? sget+0xd9/0x110 08:20:08 executing program 5: ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000000000)=[0x0]}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2074.516271] ? fuse_get_root_inode+0xc0/0xc0 [ 2074.516280] mount_nodev+0x4c/0xf0 [ 2074.516290] mount_fs+0x92/0x2a0 [ 2074.516304] vfs_kern_mount.part.0+0x5b/0x470 [ 2074.516317] do_mount+0xe65/0x2a30 [ 2074.516328] ? do_raw_spin_unlock+0x164/0x220 [ 2074.516347] ? copy_mount_string+0x40/0x40 [ 2074.516361] ? rcu_read_lock_sched_held+0x16c/0x1d0 08:20:08 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 39) 08:20:08 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00') r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x8ef5fda5) (async) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x100, 0x0, &(0x7f0000000240)) 08:20:08 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x9, 0x7], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'vxcan1\x00'}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8000}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c012) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x5565dd21) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000380)={0x0}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400), 0x325002, 0x0) fchmodat(r3, &(0x7f0000000440)='./file0\x00', 0x8) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000003c0)={r2, 0x2}) 08:20:08 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x0) (async) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x52) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x1000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000200)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000=U_id=\x00'/38, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:08 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grkup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x10000, 0x4, 0x1, 0x5, 0x0, 0x5, 0x3, 0x6, 0x3, 0x100], 0xa, 0x80800, 0x0, 0xffffffffffffffff}) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/77, 0x4d) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x1, 0x3f, 0xe7, 0x6, 0x8, "c0894a9dc9738a9b"}) [ 2074.516371] ? copy_mnt_ns+0xa30/0xa30 [ 2074.516382] ? copy_mount_options+0x1fa/0x2f0 [ 2074.516392] ? copy_mnt_ns+0xa30/0xa30 [ 2074.516403] SyS_mount+0xa8/0x120 [ 2074.516412] ? copy_mnt_ns+0xa30/0xa30 [ 2074.516424] do_syscall_64+0x1d5/0x640 [ 2074.516441] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2074.516449] RIP: 0033:0x7f80d8a040c9 [ 2074.516454] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2074.516464] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:08 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x2, 0xfffffffc, 0x80000001, 0x910, 0x50], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x9], 0x1}) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x4) statx(r0, &(0x7f0000000080)='./file0/file0\x00', 0x100, 0x100, &(0x7f0000000140)) [ 2074.516470] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2074.516476] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2074.516481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2074.516487] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2074.806205] FAULT_INJECTION: forcing a failure. [ 2074.806205] name failslab, interval 1, probability 0, space 0, times 0 [ 2074.806217] CPU: 1 PID: 26710 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2074.806223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2074.806227] Call Trace: [ 2074.806240] dump_stack+0x1b2/0x281 [ 2074.806255] should_fail.cold+0x10a/0x149 [ 2074.806270] should_failslab+0xd6/0x130 [ 2074.806283] kmem_cache_alloc+0x28e/0x3c0 [ 2074.806297] __kernfs_new_node+0x6f/0x470 [ 2074.806308] kernfs_new_node+0x7b/0xe0 [ 2074.806326] __kernfs_create_file+0x3d/0x320 [ 2074.806338] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2074.806352] sysfs_merge_group+0xdc/0x200 [ 2074.806365] dpm_sysfs_add+0x122/0x1c0 [ 2074.806377] device_add+0x977/0x15c0 [ 2074.806389] ? device_is_dependent+0x2a0/0x2a0 [ 2074.806397] ? kfree+0x1f0/0x250 [ 2074.806411] device_create_groups_vargs+0x1dc/0x250 [ 2074.806423] device_create_vargs+0x3a/0x50 [ 2074.806437] bdi_register_va.part.0+0x35/0x650 [ 2074.806450] bdi_register_va+0x63/0x80 [ 2074.806462] super_setup_bdi_name+0x123/0x220 [ 2074.806473] ? kill_block_super+0xe0/0xe0 [ 2074.806485] ? do_raw_spin_unlock+0x164/0x220 [ 2074.806500] fuse_fill_super+0x937/0x15c0 [ 2074.806512] ? fuse_get_root_inode+0xc0/0xc0 [ 2074.806522] ? up_write+0x17/0x60 [ 2074.806530] ? register_shrinker+0x15f/0x220 [ 2074.806539] ? sget_userns+0x768/0xc10 [ 2074.806556] ? get_anon_bdev+0x1c0/0x1c0 [ 2074.806563] ? sget+0xd9/0x110 [ 2074.806571] ? fuse_get_root_inode+0xc0/0xc0 [ 2074.806580] mount_nodev+0x4c/0xf0 [ 2074.806590] mount_fs+0x92/0x2a0 [ 2074.806603] vfs_kern_mount.part.0+0x5b/0x470 [ 2074.806616] do_mount+0xe65/0x2a30 [ 2074.806629] ? retint_kernel+0x2d/0x2d [ 2074.806640] ? copy_mount_string+0x40/0x40 [ 2074.806652] ? copy_mount_options+0x185/0x2f0 [ 2074.806663] ? copy_mount_options+0x18b/0x2f0 [ 2074.806673] ? copy_mount_options+0x1fa/0x2f0 [ 2074.806682] ? copy_mnt_ns+0xa30/0xa30 [ 2074.806692] SyS_mount+0xa8/0x120 [ 2074.806699] ? copy_mnt_ns+0xa30/0xa30 [ 2074.806709] do_syscall_64+0x1d5/0x640 08:20:08 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x50008, &(0x7f0000000340)=ANY=[@ANYRES8=r2, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67726f75825f62763d", @ANYRESDEC=0x0, @ANYRESHEX=r2]) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x80000}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) ioctl$TCFLSH(r0, 0x540b, 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$VT_DISALLOCATE(r0, 0x5608) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x50008, &(0x7f0000000340)=ANY=[@ANYRES8=r2, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2c67726f75825f62763d", @ANYRESDEC=0x0, @ANYRESHEX=r2]) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r3, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080), 0x0, 0x80000}) (async) 08:20:08 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x9, 0x7], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'vxcan1\x00'}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8000}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c012) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x5565dd21) (async) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000380)={0x0}) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400), 0x325002, 0x0) fchmodat(r3, &(0x7f0000000440)='./file0\x00', 0x8) (async) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000003c0)={r2, 0x2}) 08:20:08 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x2, 0xfffffffc, 0x80000001, 0x910, 0x50], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x9], 0x1}) (async) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x4) statx(r0, &(0x7f0000000080)='./file0/file0\x00', 0x100, 0x100, &(0x7f0000000140)) 08:20:08 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x23, 0x3, 0x0, {0x2, 0x2, 0x0, 'fd'}}, 0x23) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:08 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grkup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x10000, 0x4, 0x1, 0x5, 0x0, 0x5, 0x3, 0x6, 0x3, 0x100], 0xa, 0x80800, 0x0, 0xffffffffffffffff}) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/77, 0x4d) (async) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x1, 0x3f, 0xe7, 0x6, 0x8, "c0894a9dc9738a9b"}) 08:20:08 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 40) [ 2074.806723] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2074.806731] RIP: 0033:0x7f80d8a040c9 [ 2074.806736] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2075.042155] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2075.049407] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2075.056663] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2075.063913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2075.071166] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:08 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x2, 0xfffffffc, 0x80000001, 0x910, 0x50], 0x5, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000280)={&(0x7f0000000240)=[0x9], 0x1}) (async) fchmodat(r0, &(0x7f0000000100)='./file0\x00', 0x4) (async) statx(r0, &(0x7f0000000080)='./file0/file0\x00', 0x100, 0x100, &(0x7f0000000140)) 08:20:08 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2a01040, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsfloor}, {@obj_type={'obj_type', 0x3d, 'user_id'}}, {@flag='ro'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x38, 0x64, 0x53, 0x61, 0x32, 0x30, 0x34], 0x2d, [0x37, 0x38, 0x0, 0x35], 0x2d, [0x65, 0x9, 0x33, 0x61], 0x2d, [0x65, 0x38, 0x34, 0x64], 0x2d, [0x64, 0x7, 0x61, 0x61, 0x33, 0x66, 0x31, 0x62]}}}]}}) 08:20:08 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x9, 0x7], 0x2, 0x80000, 0x0, 0xffffffffffffffff}) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'vxcan1\x00'}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8000}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c012) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x5565dd21) (async) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000380)={0x0}) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400), 0x325002, 0x0) fchmodat(r3, &(0x7f0000000440)='./file0\x00', 0x8) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000003c0)={r2, 0x2}) 08:20:08 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grkup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x10000, 0x4, 0x1, 0x5, 0x0, 0x5, 0x3, 0x6, 0x3, 0x100], 0xa, 0x80800, 0x0, 0xffffffffffffffff}) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/77, 0x4d) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x1, 0x3f, 0xe7, 0x6, 0x8, "c0894a9dc9738a9b"}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grkup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x10000, 0x4, 0x1, 0x5, 0x0, 0x5, 0x3, 0x6, 0x3, 0x100], 0xa, 0x80800}) (async) readlinkat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)=""/77, 0x4d) (async) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x1, 0x3f, 0xe7, 0x6, 0x8, "c0894a9dc9738a9b"}) (async) 08:20:08 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x23, 0x3, 0x0, {0x2, 0x2, 0x0, 'fd'}}, 0x23) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x23, 0x3, 0x0, {0x2, 0x2, 0x0, 'fd'}}, 0x23) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) [ 2075.236507] FAULT_INJECTION: forcing a failure. [ 2075.236507] name failslab, interval 1, probability 0, space 0, times 0 [ 2075.296242] CPU: 0 PID: 26749 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2075.304151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2075.313501] Call Trace: [ 2075.316089] dump_stack+0x1b2/0x281 [ 2075.319715] should_fail.cold+0x10a/0x149 [ 2075.323860] should_failslab+0xd6/0x130 [ 2075.327832] kmem_cache_alloc+0x28e/0x3c0 [ 2075.331984] __kernfs_new_node+0x6f/0x470 [ 2075.336137] kernfs_new_node+0x7b/0xe0 [ 2075.340017] __kernfs_create_file+0x3d/0x320 [ 2075.344508] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2075.349171] sysfs_merge_group+0xdc/0x200 [ 2075.353319] dpm_sysfs_add+0x122/0x1c0 [ 2075.357200] device_add+0x977/0x15c0 [ 2075.360907] ? device_is_dependent+0x2a0/0x2a0 [ 2075.365486] ? kfree+0x1f0/0x250 [ 2075.368850] device_create_groups_vargs+0x1dc/0x250 [ 2075.373866] device_create_vargs+0x3a/0x50 [ 2075.378101] bdi_register_va.part.0+0x35/0x650 [ 2075.382683] bdi_register_va+0x63/0x80 [ 2075.386572] super_setup_bdi_name+0x123/0x220 [ 2075.391063] ? kill_block_super+0xe0/0xe0 [ 2075.395210] ? do_raw_spin_unlock+0x164/0x220 [ 2075.399712] fuse_fill_super+0x937/0x15c0 [ 2075.403866] ? fuse_get_root_inode+0xc0/0xc0 [ 2075.408270] ? up_write+0x17/0x60 [ 2075.411994] ? register_shrinker+0x15f/0x220 [ 2075.416387] ? sget_userns+0x768/0xc10 [ 2075.420255] ? get_anon_bdev+0x1c0/0x1c0 [ 2075.424303] ? sget+0xd9/0x110 [ 2075.427473] ? fuse_get_root_inode+0xc0/0xc0 [ 2075.431859] mount_nodev+0x4c/0xf0 [ 2075.435384] mount_fs+0x92/0x2a0 [ 2075.438758] vfs_kern_mount.part.0+0x5b/0x470 [ 2075.443261] do_mount+0xe65/0x2a30 [ 2075.446963] ? do_raw_spin_unlock+0x164/0x220 [ 2075.451443] ? copy_mount_string+0x40/0x40 [ 2075.455658] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2075.460664] ? copy_mnt_ns+0xa30/0xa30 [ 2075.464538] ? copy_mount_options+0x1fa/0x2f0 [ 2075.469010] ? copy_mnt_ns+0xa30/0xa30 [ 2075.473022] SyS_mount+0xa8/0x120 [ 2075.476480] ? copy_mnt_ns+0xa30/0xa30 [ 2075.480359] do_syscall_64+0x1d5/0x640 [ 2075.484295] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2075.489491] RIP: 0033:0x7f80d8a040c9 08:20:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x4, 0x5, 0x1ff], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) utimensat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000540)={{r1, r2/1000+60000}, {r3, r4/1000+10000}}, 0x100) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280), 0x8080, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000440)={0x20, 0x0, 0x3, 0x8a, &(0x7f00000002c0)=""/138, 0x70, &(0x7f0000000380)=""/112, 0x2e, &(0x7f0000000400)=""/46}) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:09 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2a01040, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsfloor}, {@obj_type={'obj_type', 0x3d, 'user_id'}}, {@flag='ro'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x38, 0x64, 0x53, 0x61, 0x32, 0x30, 0x34], 0x2d, [0x37, 0x38, 0x0, 0x35], 0x2d, [0x65, 0x9, 0x33, 0x61], 0x2d, [0x65, 0x38, 0x34, 0x64], 0x2d, [0x64, 0x7, 0x61, 0x61, 0x33, 0x66, 0x31, 0x62]}}}]}}) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000000), 0x24008, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1800}}]}}) 08:20:09 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x23, 0x3, 0x0, {0x2, 0x2, 0x0, 'fd'}}, 0x23) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2075.493185] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2075.500887] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2075.508142] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2075.515401] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2075.522649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2075.529902] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:09 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000000), 0x24008, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1800}}]}}) 08:20:09 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 41) 08:20:09 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x10, 0x2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0xffffffffffffffe1}}, 0x18) 08:20:09 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2a01040, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsfloor}, {@obj_type={'obj_type', 0x3d, 'user_id'}}, {@flag='ro'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x38, 0x64, 0x53, 0x61, 0x32, 0x30, 0x34], 0x2d, [0x37, 0x38, 0x0, 0x35], 0x2d, [0x65, 0x9, 0x33, 0x61], 0x2d, [0x65, 0x38, 0x34, 0x64], 0x2d, [0x64, 0x7, 0x61, 0x61, 0x33, 0x66, 0x31, 0x62]}}}]}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x2a01040, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@smackfsfloor}, {@obj_type={'obj_type', 0x3d, 'user_id'}}, {@flag='ro'}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x38, 0x64, 0x53, 0x61, 0x32, 0x30, 0x34], 0x2d, [0x37, 0x38, 0x0, 0x35], 0x2d, [0x65, 0x9, 0x33, 0x61], 0x2d, [0x65, 0x38, 0x34, 0x64], 0x2d, [0x64, 0x7, 0x61, 0x61, 0x33, 0x66, 0x31, 0x62]}}}]}}) (async) 08:20:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x4, 0x5, 0x1ff], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) (async) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) (async) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) utimensat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000540)={{r1, r2/1000+60000}, {r3, r4/1000+10000}}, 0x100) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280), 0x8080, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000440)={0x20, 0x0, 0x3, 0x8a, &(0x7f00000002c0)=""/138, 0x70, &(0x7f0000000380)=""/112, 0x2e, &(0x7f0000000400)=""/46}) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:09 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000000), 0x24008, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1800}}]}}) 08:20:09 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x10, 0x2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0xffffffffffffffe1}}, 0x18) 08:20:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x4, 0x5, 0x1ff], 0x3, 0x80000, 0x0, 0xffffffffffffffff}) (async) clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) (async) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) utimensat(r0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000540)={{r1, r2/1000+60000}, {r3, r4/1000+10000}}, 0x100) (async) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) (async) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280), 0x8080, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000440)={0x20, 0x0, 0x3, 0x8a, &(0x7f00000002c0)=""/138, 0x70, &(0x7f0000000380)=""/112, 0x2e, &(0x7f0000000400)=""/46}) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:09 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x8001, 0x5, 0x8], 0x4, 0x1000, 0x0, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x8, 0x6) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x82c04, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2075.846958] FAULT_INJECTION: forcing a failure. [ 2075.846958] name failslab, interval 1, probability 0, space 0, times 0 [ 2075.884276] CPU: 1 PID: 26820 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2075.892186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2075.901536] Call Trace: [ 2075.904124] dump_stack+0x1b2/0x281 [ 2075.907761] should_fail.cold+0x10a/0x149 [ 2075.911910] should_failslab+0xd6/0x130 [ 2075.915883] kmem_cache_alloc+0x28e/0x3c0 [ 2075.920033] __kernfs_new_node+0x6f/0x470 [ 2075.924197] kernfs_new_node+0x7b/0xe0 [ 2075.928079] __kernfs_create_file+0x3d/0x320 [ 2075.932503] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2075.937183] sysfs_merge_group+0xdc/0x200 [ 2075.941332] dpm_sysfs_add+0x122/0x1c0 08:20:09 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) (async, rerun: 64) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x8001, 0x5, 0x8], 0x4, 0x1000, 0x0, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x8, 0x6) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x82c04, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10, 0x7) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2075.945238] device_add+0x977/0x15c0 [ 2075.948951] ? device_is_dependent+0x2a0/0x2a0 [ 2075.953532] ? kfree+0x1f0/0x250 [ 2075.956901] device_create_groups_vargs+0x1dc/0x250 [ 2075.961913] device_create_vargs+0x3a/0x50 [ 2075.966148] bdi_register_va.part.0+0x35/0x650 [ 2075.970735] bdi_register_va+0x63/0x80 [ 2075.974625] super_setup_bdi_name+0x123/0x220 [ 2075.979117] ? kill_block_super+0xe0/0xe0 [ 2075.983270] ? do_raw_spin_unlock+0x164/0x220 [ 2075.987764] fuse_fill_super+0x937/0x15c0 [ 2075.991908] ? fuse_get_root_inode+0xc0/0xc0 [ 2075.996312] ? up_write+0x17/0x60 [ 2075.999755] ? register_shrinker+0x15f/0x220 [ 2076.004157] ? sget_userns+0x768/0xc10 [ 2076.008049] ? get_anon_bdev+0x1c0/0x1c0 [ 2076.012101] ? sget+0xd9/0x110 [ 2076.015289] ? fuse_get_root_inode+0xc0/0xc0 [ 2076.019689] mount_nodev+0x4c/0xf0 [ 2076.023221] mount_fs+0x92/0x2a0 [ 2076.026673] vfs_kern_mount.part.0+0x5b/0x470 [ 2076.031171] do_mount+0xe65/0x2a30 [ 2076.034706] ? do_raw_spin_unlock+0x164/0x220 [ 2076.039198] ? copy_mount_string+0x40/0x40 [ 2076.043464] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2076.048475] ? copy_mnt_ns+0xa30/0xa30 [ 2076.052362] ? copy_mount_options+0x1fa/0x2f0 [ 2076.056853] ? copy_mnt_ns+0xa30/0xa30 [ 2076.060914] SyS_mount+0xa8/0x120 [ 2076.064359] ? copy_mnt_ns+0xa30/0xa30 [ 2076.068245] do_syscall_64+0x1d5/0x640 [ 2076.072133] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2076.077318] RIP: 0033:0x7f80d8a040c9 [ 2076.081018] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2076.088725] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:09 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 42) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:09 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x0, 0x8001, 0x5, 0x8], 0x4, 0x1000, 0x0, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x8, 0x6) (async, rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x82c04, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (rerun: 64) 08:20:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10, 0x7) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10, 0x7) (async) 08:20:09 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:09 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x10, 0x2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) write$FUSE_LSEEK(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0xffffffffffffffe1}}, 0x18) [ 2076.095993] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2076.103257] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2076.110634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2076.117898] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:09 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x23) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:20:09 executing program 3: ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)={0x0, 0x2}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4041}, 0x20000818) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}}) socket$l2tp6(0xa, 0x2, 0x73) 08:20:09 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10, 0x7) 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) [ 2076.281138] FAULT_INJECTION: forcing a failure. [ 2076.281138] name failslab, interval 1, probability 0, space 0, times 0 08:20:09 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async, rerun: 32) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) (rerun: 32) [ 2076.357514] CPU: 1 PID: 26872 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2076.365424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2076.374770] Call Trace: [ 2076.377358] dump_stack+0x1b2/0x281 [ 2076.380989] should_fail.cold+0x10a/0x149 [ 2076.385140] should_failslab+0xd6/0x130 [ 2076.389119] __kmalloc+0x2c1/0x400 [ 2076.392655] ? kobject_get_path+0xb5/0x230 [ 2076.396882] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2076.402334] kobject_get_path+0xb5/0x230 [ 2076.406395] kobject_uevent_env+0x230/0xf30 [ 2076.410719] ? wait_for_completion_io+0x10/0x10 [ 2076.415382] device_add+0xa47/0x15c0 [ 2076.419091] ? device_is_dependent+0x2a0/0x2a0 [ 2076.423669] ? kfree+0x1f0/0x250 [ 2076.427031] device_create_groups_vargs+0x1dc/0x250 [ 2076.432053] device_create_vargs+0x3a/0x50 [ 2076.436288] bdi_register_va.part.0+0x35/0x650 [ 2076.440867] bdi_register_va+0x63/0x80 [ 2076.444924] super_setup_bdi_name+0x123/0x220 [ 2076.449411] ? kill_block_super+0xe0/0xe0 [ 2076.453554] ? do_raw_spin_unlock+0x164/0x220 [ 2076.458041] fuse_fill_super+0x937/0x15c0 [ 2076.462173] ? fuse_get_root_inode+0xc0/0xc0 [ 2076.466564] ? up_write+0x17/0x60 [ 2076.469993] ? register_shrinker+0x15f/0x220 [ 2076.474373] ? sget_userns+0x768/0xc10 [ 2076.478241] ? get_anon_bdev+0x1c0/0x1c0 [ 2076.482282] ? sget+0xd9/0x110 [ 2076.485459] ? fuse_get_root_inode+0xc0/0xc0 [ 2076.489971] mount_nodev+0x4c/0xf0 [ 2076.493505] mount_fs+0x92/0x2a0 [ 2076.496857] vfs_kern_mount.part.0+0x5b/0x470 [ 2076.501347] do_mount+0xe65/0x2a30 [ 2076.504884] ? retint_kernel+0x2d/0x2d [ 2076.508755] ? copy_mount_string+0x40/0x40 [ 2076.512975] ? copy_mount_options+0x185/0x2f0 [ 2076.517462] ? copy_mount_options+0x18f/0x2f0 [ 2076.521956] ? copy_mount_options+0x1fa/0x2f0 [ 2076.526443] ? copy_mnt_ns+0xa30/0xa30 [ 2076.530313] SyS_mount+0xa8/0x120 [ 2076.533767] ? copy_mnt_ns+0xa30/0xa30 [ 2076.537744] do_syscall_64+0x1d5/0x640 [ 2076.541627] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2076.546821] RIP: 0033:0x7f80d8a040c9 [ 2076.550510] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:20:10 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 43) 08:20:10 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x3, 0x10001, 0x6c], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r2, 0x0, 0x0) r3 = geteuid() statx(r1, &(0x7f0000002840)='./file0\x00', 0x800, 0x100, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000000340)="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", 0x2000, &(0x7f0000002a80)={&(0x7f00000001c0)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x26, 0x7, 0x2203002, 0x3ff, 0x9, 0xb5b9, 0x80000001}}, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x7}}, &(0x7f0000000280)={0x18, 0x0, 0x8001, {0x7fffffffffffffff}}, &(0x7f0000002340)={0x18, 0x0, 0x7, {0xfa48}}, &(0x7f0000002380)={0x18, 0x0, 0xfffffffffffffc00, {0x8}}, &(0x7f00000023c0)={0x28, 0x0, 0x13, {{0x1, 0x7fffffff, 0x0, r2}}}, &(0x7f0000002400)={0x60, 0x0, 0x100, {{0xcce, 0xfc784c9, 0x63525005, 0x0, 0x9, 0x100, 0x5, 0x5}}}, &(0x7f0000002480)={0x18, 0x0, 0x4, {0x9}}, &(0x7f00000024c0)={0x13, 0xfffffffffffffff5, 0x6, {'*\x0e\x00'}}, &(0x7f0000002500)={0x20, 0x0, 0x0, {0x0, 0x5}}, &(0x7f0000002540)={0x78, 0x0, 0x80, {0xffffffffffff5ad0, 0x8, 0x0, {0x3, 0xffffffffffffffff, 0x10000, 0x6, 0x3, 0x20, 0x800, 0x1, 0xc00, 0x1000, 0x8, 0xee00, 0xffffffffffffffff, 0x2, 0x100}}}, &(0x7f00000025c0)={0x90, 0x0, 0x5, {0x5, 0x3, 0x5d8, 0x1ff, 0xaad5, 0x3, {0x4, 0x7f, 0x6, 0x3f, 0x2, 0x2, 0x2, 0x6, 0xffff, 0x4000, 0x5, r3, 0x0, 0x7, 0x1}}}, &(0x7f0000002680)={0x10, 0x0, 0x7}, &(0x7f00000026c0)={0x148, 0x0, 0x3, [{{0x2, 0x1, 0x101, 0x5, 0x3, 0x9, {0x1, 0x2, 0xf8, 0x9, 0xfffffffffffffff8, 0x5, 0x9, 0x3, 0x5, 0x1000, 0x7, 0xee00, 0xffffffffffffffff, 0x3, 0x1}}, {0x3, 0x5, 0x0, 0x7}}, {{0x6, 0x2, 0x7, 0x8000000000000000, 0x1, 0x5, {0x4, 0x8, 0x5, 0x9, 0x2, 0x7, 0x0, 0x4, 0x4, 0xc000, 0x8, 0xee00, 0xffffffffffffffff, 0xc462, 0x19c3f7dd}}, {0x3, 0x3, 0x8, 0x7, ';\'*/@\\\xb6,'}}]}, &(0x7f0000002980)={0xa0, 0x0, 0x8000000000000000, {{0x0, 0x0, 0x6, 0xff, 0x8, 0x633b31ac, {0x0, 0x3, 0x8, 0x6, 0xbcc8, 0x7ff, 0x7f, 0x4, 0x9, 0x0, 0x8, 0x0, r4, 0xffffffff, 0x81}}, {0x0, 0xc}}}, &(0x7f0000002a40)={0x20, 0x0, 0xfa6a, {0x9, 0x4, 0x0, 0x80000001}}}) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20, 0x0, 0x0, {0x8, 0x4, 0xffffffc0, 0xfffffffd}}, 0x20) [ 2076.558211] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2076.565468] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2076.572831] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2076.580083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2076.587356] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:10 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x23) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x23) (async) 08:20:10 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000), 0x8) 08:20:10 executing program 3: ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)={0x0, 0x2}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) (rerun: 32) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1}, 0x14}}, 0x0) (async, rerun: 64) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4041}, 0x20000818) (async, rerun: 64) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async, rerun: 64) socket$l2tp6(0xa, 0x2, 0x73) (rerun: 64) 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x40, 0x6d], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f0000000140)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040000}, 0x40014) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000240)={r3, 0x1}) [ 2076.635232] FAULT_INJECTION: forcing a failure. [ 2076.635232] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.664605] CPU: 1 PID: 26914 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2076.672523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2076.681869] Call Trace: 08:20:10 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) statx(r2, &(0x7f0000000180)='./file0\x00', 0x1000, 0x800, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6d000000a7b4fc3592b4dcf12eca138a0a482304000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:10 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) statx(r2, &(0x7f0000000180)='./file0\x00', 0x1000, 0x800, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6d000000a7b4fc3592b4dcf12eca138a0a482304000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) statx(r2, &(0x7f0000000180)='./file0\x00', 0x1000, 0x800, &(0x7f0000000280)) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6d000000a7b4fc3592b4dcf12eca138a0a482304000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) [ 2076.684453] dump_stack+0x1b2/0x281 [ 2076.688081] should_fail.cold+0x10a/0x149 [ 2076.692232] should_failslab+0xd6/0x130 [ 2076.696207] kmem_cache_alloc_node+0x263/0x410 [ 2076.700797] __alloc_skb+0x5c/0x510 [ 2076.704429] kobject_uevent_env+0x882/0xf30 [ 2076.708760] device_add+0xa47/0x15c0 [ 2076.712479] ? device_is_dependent+0x2a0/0x2a0 [ 2076.717061] ? kfree+0x1f0/0x250 [ 2076.720431] device_create_groups_vargs+0x1dc/0x250 [ 2076.725445] device_create_vargs+0x3a/0x50 [ 2076.729681] bdi_register_va.part.0+0x35/0x650 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x40, 0x6d], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f0000000140)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040000}, 0x40014) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000240)={r3, 0x1}) 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x40, 0x6d], 0x2, 0x0, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000100)='./file0\x00', 0x100, 0x2, &(0x7f0000000140)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), r0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r2, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x8}, @L2TP_ATTR_PW_TYPE={0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040000}, 0x40014) (async) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000240)={r3, 0x1}) [ 2076.734267] bdi_register_va+0x63/0x80 [ 2076.738158] super_setup_bdi_name+0x123/0x220 [ 2076.742654] ? kill_block_super+0xe0/0xe0 [ 2076.746807] ? do_raw_spin_unlock+0x164/0x220 [ 2076.751304] fuse_fill_super+0x937/0x15c0 [ 2076.755455] ? fuse_get_root_inode+0xc0/0xc0 [ 2076.759867] ? up_write+0x17/0x60 [ 2076.763313] ? register_shrinker+0x15f/0x220 [ 2076.767719] ? sget_userns+0x768/0xc10 [ 2076.771608] ? get_anon_bdev+0x1c0/0x1c0 [ 2076.775664] ? sget+0xd9/0x110 [ 2076.779028] ? fuse_get_root_inode+0xc0/0xc0 08:20:10 executing program 1: r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='-&-!\xef}\x00', 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x4, 0xffffffffffff7515, r0) r1 = request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='#^}\x8f\x00', 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2076.783436] mount_nodev+0x4c/0xf0 [ 2076.786969] mount_fs+0x92/0x2a0 [ 2076.790336] vfs_kern_mount.part.0+0x5b/0x470 [ 2076.794830] do_mount+0xe65/0x2a30 [ 2076.798371] ? retint_kernel+0x2d/0x2d [ 2076.802258] ? copy_mount_string+0x40/0x40 [ 2076.806492] ? copy_mount_options+0x185/0x2f0 [ 2076.810978] ? copy_mount_options+0x188/0x2f0 [ 2076.815471] ? copy_mount_options+0x1fa/0x2f0 [ 2076.819963] ? copy_mnt_ns+0xa30/0xa30 [ 2076.823850] SyS_mount+0xa8/0x120 [ 2076.827299] ? copy_mnt_ns+0xa30/0xa30 [ 2076.831182] do_syscall_64+0x1d5/0x640 08:20:10 executing program 1: r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='-&-!\xef}\x00', 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x4, 0xffffffffffff7515, r0) r1 = request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='#^}\x8f\x00', 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2076.835079] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2076.840267] RIP: 0033:0x7f80d8a040c9 [ 2076.843977] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2076.851851] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2076.859112] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2076.866375] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2076.873640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2076.880929] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:10 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 44) 08:20:10 executing program 3: ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000080)={0x0, 0x2}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4041}, 0x20000818) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) socket$l2tp6(0xa, 0x2, 0x73) 08:20:10 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x23) 08:20:10 executing program 1: r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='-&-!\xef}\x00', 0xfffffffffffffff8) keyctl$reject(0x13, 0x0, 0x4, 0xffffffffffff7515, r0) r1 = request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='#^}\x8f\x00', 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='-&-!\xef}\x00', 0xfffffffffffffff8) (async) keyctl$reject(0x13, 0x0, 0x4, 0xffffffffffff7515, r0) (async) request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='#^}\x8f\x00', 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:10 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x3, 0x10001, 0x6c], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r2, 0x0, 0x0) (async) r3 = geteuid() (async) statx(r1, &(0x7f0000002840)='./file0\x00', 0x800, 0x100, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000000340)="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", 0x2000, &(0x7f0000002a80)={&(0x7f00000001c0)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x26, 0x7, 0x2203002, 0x3ff, 0x9, 0xb5b9, 0x80000001}}, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x7}}, &(0x7f0000000280)={0x18, 0x0, 0x8001, {0x7fffffffffffffff}}, &(0x7f0000002340)={0x18, 0x0, 0x7, {0xfa48}}, &(0x7f0000002380)={0x18, 0x0, 0xfffffffffffffc00, {0x8}}, &(0x7f00000023c0)={0x28, 0x0, 0x13, {{0x1, 0x7fffffff, 0x0, r2}}}, &(0x7f0000002400)={0x60, 0x0, 0x100, {{0xcce, 0xfc784c9, 0x63525005, 0x0, 0x9, 0x100, 0x5, 0x5}}}, &(0x7f0000002480)={0x18, 0x0, 0x4, {0x9}}, &(0x7f00000024c0)={0x13, 0xfffffffffffffff5, 0x6, {'*\x0e\x00'}}, &(0x7f0000002500)={0x20, 0x0, 0x0, {0x0, 0x5}}, &(0x7f0000002540)={0x78, 0x0, 0x80, {0xffffffffffff5ad0, 0x8, 0x0, {0x3, 0xffffffffffffffff, 0x10000, 0x6, 0x3, 0x20, 0x800, 0x1, 0xc00, 0x1000, 0x8, 0xee00, 0xffffffffffffffff, 0x2, 0x100}}}, &(0x7f00000025c0)={0x90, 0x0, 0x5, {0x5, 0x3, 0x5d8, 0x1ff, 0xaad5, 0x3, {0x4, 0x7f, 0x6, 0x3f, 0x2, 0x2, 0x2, 0x6, 0xffff, 0x4000, 0x5, r3, 0x0, 0x7, 0x1}}}, &(0x7f0000002680)={0x10, 0x0, 0x7}, &(0x7f00000026c0)={0x148, 0x0, 0x3, [{{0x2, 0x1, 0x101, 0x5, 0x3, 0x9, {0x1, 0x2, 0xf8, 0x9, 0xfffffffffffffff8, 0x5, 0x9, 0x3, 0x5, 0x1000, 0x7, 0xee00, 0xffffffffffffffff, 0x3, 0x1}}, {0x3, 0x5, 0x0, 0x7}}, {{0x6, 0x2, 0x7, 0x8000000000000000, 0x1, 0x5, {0x4, 0x8, 0x5, 0x9, 0x2, 0x7, 0x0, 0x4, 0x4, 0xc000, 0x8, 0xee00, 0xffffffffffffffff, 0xc462, 0x19c3f7dd}}, {0x3, 0x3, 0x8, 0x7, ';\'*/@\\\xb6,'}}]}, &(0x7f0000002980)={0xa0, 0x0, 0x8000000000000000, {{0x0, 0x0, 0x6, 0xff, 0x8, 0x633b31ac, {0x0, 0x3, 0x8, 0x6, 0xbcc8, 0x7ff, 0x7f, 0x4, 0x9, 0x0, 0x8, 0x0, r4, 0xffffffff, 0x81}}, {0x0, 0xc}}}, &(0x7f0000002a40)={0x20, 0x0, 0xfa6a, {0x9, 0x4, 0x0, 0x80000001}}}) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20, 0x0, 0x0, {0x8, 0x4, 0xffffffc0, 0xfffffffd}}, 0x20) 08:20:10 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000000)={@desc={0x1, 0x0, @desc3}}) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) statx(r2, &(0x7f0000000180)='./file0\x00', 0x1000, 0x800, &(0x7f0000000280)) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="6d000000a7b4fc3592b4dcf12eca138a0a482304000000643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:10 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x3, 0x10001, 0x6c], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) (async, rerun: 64) r2 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r2, 0x0, 0x0) r3 = geteuid() statx(r1, &(0x7f0000002840)='./file0\x00', 0x800, 0x100, &(0x7f0000002880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000000340)="292972ec3950555d8ab25db35489a7ac170983103748fc9dea06140e033d1616e660d14bb99e7b6a4b3240c486ca8f1c7ec5de7c520ffb6e0163daa002253bb80ca3aa0fa516f0df550314074fc4fc4365b43054dabb9c30ec563024707f35975490900e12da56530b52796c3b42211898028fe62cab1339696ff1698ef5d88add7be80cecd3be48614a932428a60382ec0b671f7d9dbbe38bbd74533889cb7f0f4215055356b96c91ccf5ae992bc5c76b78e3af2a6530cfae088e81855923c485d7d6924c31e5e40663f991b956db4b246bd12df60181da9ea3b1345b82ccda9a620d3c0847499a6cb525a39a4855c9e3fdfcc3c907bca02df56d6bc87810f5ea27c993e7a0d0139ea61a4cd8890cd9184b9a043fb9c7f78c3094aba47b5d02ec7c0d60d7c0464df3b36ea00b69a85a79e025ae42f0d09800ba974e872d1577a92cdb599174cab727213aa5009b69b6d1e4edbb226082cd9bf64f568d27be711434102010e51e847920ee6fdb959c42d1bb2e184dc2d169e71da23ec6b67e5e5b8c6d1a7660a45364fa416febbfc99b42c9244c66b6efb7cfbfda0f055c554105861e4251fd7aed88c9130b2c44f8eb279d94eee441c0b37c00b5c6b87733897a2c6fdacb4401f751b15ab7bbcbd36d37a5516e7d8c902f6b1ffa5700c454a09495dfe1a0cafdb6bd8e99123c8ee97820a52bf87133ed86361031e911a13f221fc095cb23d27553471b54087b10419543605eb3aa91194c35a7bc36504b1cc7521eb9885942560c0e12aa90d299ecca508d4389b4f3091fdd9c819b544ddcc54041b57e75ed34716a466ba300df1e4fac2ab3019f3ce7d5056f00a4d0915d92df43d0270b78bd0d80f8aaa3df34d3d67b984547690d83088b8e2ff1adf1ab82a3a206e7b6c92d1d9b28e2280956d2fc233a09c02972cfa6b73e9b44952678d53eecd8c963579545bbe3c72ad4019fbbf536dbf8fdee2e6643b8ed838b62dc4d7bb7aba7c93a94cb05f66cf008d990cb8b09129b86de7d6a67431ae8ad9356b1e920b23e413cd5f179fe4423fd044740abfcb55d7f5bad887431e1d19c070ef8bb35ab7e4e2a9f7f522cbecb14d769ab9a036fc03053a2245bd59cda629ed5c66c1af2abe5907520b02e39758d2b964032244cb08ada1df5afc04606129f74862d5dca4cd1fe8d75d402401ce4aa16c0c23d057e85328e6267d7b1331c10d5097775be9ba26f50867b20bbd82edd6a75de7a4810e0d36f4a3e14a34e1e3c37c05289f91c08af5a76bbfa2e3a5b554c2463c85149d887622dd833766a551ecd7c28fe939a34f429f7c7f1e49bdffedd49ba2ca8fa2ae625303b0a3a54529273b4ef0557ebde1b72a8873228c91827a4ad08aad0f8699aa47ce8a73533a78637eb58f92489fc2a32e164a8b306a8762f987a0e6c18f431f3a4b1540e497f53454dc6c93e065bf9483652873d0e1694f335964f2490bf0edd1c8008f276434760e3d70ade3b05314bf4d5b68d58a5360c0d6cbe88703775bfe140aa86393ae1cb2ad61206ec7b8791da8349d28294fb17942c58563c7fbf84c48606eb51be24cc368158082951fa85d57ebbe02d445da61869d629692cbcbc852d37560b244aa5bd949802a25337df7e5de9a476e80b07874d9612ad1011cf38123d968387381b8c661846c6370cf8cc7443d67749746e7aa7db0032d61bc92f66c896b52d3d91bd8d8b53b373e7f3a629e6ae19882669ee4d354cc0f96123fe37b623d6bac4aa47500f9287c297b83fa5cacf3f8979825b2561b94dfbccd0e920ffec482d204c6e8553d7d0708a76af88787fe24b1f0e3b83a1c23bf489608cef3f0bc870f2e16fed41f6edca54d9e312ecf9fa50d413ecedeaa6641a829cb237f09f3aecfbe7f52e1ffdcaac0c6739df85ce843e822177278b6f8548290f060c641b6e8aa3f4d2cad8d7a4671f3fd7f044d2002827cf673af119387cf31fe1aa1b9542cb192413335c810ef9a2dd6cb466ade437ba8bd7e1e0498c7c702c8e3ea3efb7155c9134e518e3e3ab9e87a33b52597b2d9ef8dec96c97ccf9c56e60a32676f2881f7ee6ef6577a3a227a1454f21a1c59298b27037d59b3487e23231bacd35cc56c0e6bc774651557054d8def865f07f2b07e90d0fa2586a0e24c590721c35255e56f6ab59b9fced4225c398db059bcc470a69069a2d4d01b695bbb2bac2ccd175bfd4fe40da8da0566732e7be180823ef15a0ea19bd3a60886fd1c28b4720a08188c06be61174a28f4c64015aeaf647b11b9462039a37f2fba0b1188deecf4dd783cfe8406592ca7f915f618d497331037dd88a21ee6897b3453bbfdfe3bb1647890ba771182c1e6ac7e7f49838733b79d72791d2bbcdb884b8831d163aa0e7c502e562eae7ccc4130e4ab0d8112584b32df1be8d3b5463a230620daa27a4179ffad57a36d295e8c77e9aec1b8453ba4f2e38e8bc18cea45f5eaccf7da62dc50f375546083a78ee6b66618f1a5f441ed75d4834538af462663f8cea1c8ee978b747934f2656698f7707f039d348937f99ccd19d875aecd2090c55296072bbc809d9c7f791eee1c1e9a93be59868db55f8dead21338d9b86027a65699ee2eec3e8995cf0f9ab44fcf740ae768d5b86a91a04e3e5cc9f5f706f5f36850147332367fe8919b5db6aa87c714f3a900dd01a6ce5be528a02a08754e01d4fa19811e324e5ecc6cc18db33ec8d284dacd9de0cea5a76f891187d47a006791fe43773603761cd55b0cf8679c5ebf163a3e5bede69e7790cee596d14ed23145715f380b027a7ffbb9665e0bb82e10753527c27cd3f6e610f6b4f0a12dbe6604508b1c71fd474426b453d27c8463cca60362a8a647f9b0f372652c6f45f98f5a0330a16597b69922d4c366ea000eee3c73d75091716b0255dbcbd226254e567945f4a3b1c9e17b3c002fefd8ffaab51a54b01374d60bc49ffcd2d2268a41cdbf6b2cd353215de9b256785e20bdada595ece8e611acad1a76c9351165321bcd02092c280e50010af3d9fc88da19632f7118b9d147b2dd104244603dd213e372409fc5ddf45d940e3ff2d18a3f7ef86c8dc67aabc01f8c4cf0683077863a2bd50b495cc795f94aac65c0a06ba0c930508d409db7e247bcbc3d1f0e8c1811977047f517232966239d0ba718023eca54d85a2a08824832d003221aafefc9400bda1e7360e936e564a15d328986e74d9c3dbf97d7bed40f7fb05142712f6ab81ca5ae19bd612506665fdf91ef316da03a948cdb1598eca866c282069a09910d062fc8defe28da811eb2a5c3051a6e9e1eed28318b3048b4bd6006fd9d1a25deda67acf4b78c64785b6025139451c8ecf05acf656f6eb0c905e12eeaf5ce7494a67c475ecb80619615e21cec2fce18d5a11f6a46926411ab1d1ae36978c9b96adeb5c588346651e54f5c8961228c4c7ca7a1dbc71d8b3d7248762178dc89fa57154ef66bf556ea49b55b5c9b2c80470a45034dd0f1c759364779093fb69762a6cc98b091c3dfee62205e579ad5b903ef368b1958d218d9f7b218c5abc120778ccc39c273ab26c48681ac6ff398631e921290b4dc0151a7dc9cd42a7eba5df0e7b53e2c030f1db24a1c451b5e4ad8bbc97732dfdc75ab57c37e071eb538c0804fd17005dc03109b6718628bf85495c1bf2d8b54e0a16afcc1772fb96ab3a6381d04134da35dfd2d8ff8d4145ad019ae999b807b0fad6dd46e295ed29a3ff397b26c4a5df006d506676228b5e251efce7382e2f02ebf6cf1dc986bcdd8ce55e3573c1a556eea543df326591b135951b9641ff90a859ba94c6da9df595c4359068e3a670cf8aa60ac8b5bfadca9c70d47a7fcab3bef42070397643c1481bc81b252d7571c6a0900175a413b5305c880a0c5d64db16a630b82cb7272a2b7d8a7cce761772aef36c6767e05f21b9726009f6fe949f04d2f7b3650c38214906b2ead3a672dda1193a75af288f294cada6b173148428ec9bae1657f06596419da62fa4339cf37e6ff9f017b5079ae36c7778ad5183b9a1e5e5b437b6a4a7d2bd82de5dd993c0ec5d9d8506172d45232f19af3d45ab3ab256221fc9d404a26857a4ac1bb3f49aa3870d2644abe08f0c1cbada3d256e9256398f37d7d39f42f5ffbe2fcc4a34bb1ee5789fe109f4e2ec2f32cf3f244645be0af3308eb632d56b83d8f3093cbccfdc2020011a7dddef2edae0c35f6e909cc7c676b39b27c8ae5d2684b91fe144409f76fb3ad19897128445fc5675362319dbede1aab346524a4dbcf81fb8f7b9bc5f5c0c4e0c2280be3d544151464893d4e386a6438bee4377ae8211057b4bedfb5f5a409c4fbac202d3120a228e24da4fedbd8eced927b82324b624d01d3d9f8e44299995385dd5de439c2ee4230de53180a0fc996c39426257f574ef4571eeaaf453512e1d527ca4e158ef6bff87e5e18102771b4ed35ad530c80f282b91276b6ba33247c18e25ba8616e260448ee0f161fd3c895e241dcce29824bed85426cc53884245a95dfb5ec83f5cda21a50083c6349445b653058b8e2793b49f8158217a9ddccc2f1cf777826c1dc18cc2446cc9b2fe67e4af6a06932e145ce92413709d3416dd2abdb326d37b226bf24d11472b964619045754759e6aa331c937dc7a088030c1dc19d8037fe2d78e61b888621619f0d329aa17158272e4aa35edb9635f8a916ef94b9b0d131e568c8445ffabef7fca7912927c0a1d9c2d30500395a1ef7dbf0472ecdce97fadc1302d8118b53575e2c64c6087015cce18fc5a3b7f9324ec08637acb5afbd5b7fe6bedda11f37dec07b63b5673c6aa9342c312716486fabb772743defca783d67a823dafba13061ab98a37262567582c468794e1815f605bed543f65bf00385a11d2105b0ec7b1393d7afc4e04ce1c4a1db9b4b565ece064b99b5ce49928baa8d6d1f94abc0a789dbda6a033bf60cf27193875805ce8f4d6d94212c43f77234d08518158b76aa92c6bedb0ca00a82692aaefb526092f2ca4352723f83941a4d139e355107c9a84fbb0bf770fee448757d5e0cb1d886582361b0b51069945f063364318c5898029d53e2d96c1faf93397d8756dc8859f22ebba9b12aaa4014f19f2a366741d718ed127734ac53729a577cd7928e73e771242c4eee8cc1ec5559d205f45ee10631aca309452bd43097ee7bd7ab7dbd5704ebd885771fd5947d8b5b6d1e8edc152448989504efc01215da7a798bfdd3dfe3da0aff2e70d05690386116994791201005df55a8e81c817f5ad495744fe06021b03675bcc79f2e5270cb61d409996e6ef587f086fb7b9caf1cad1026221b527adaae47e35c6ee4577b1875ec75672bee5316037672f902210480ce1a6a7240af2ec72144bac28c8e7836ccc94b5aacf64c1e9eb7b2884c7683786d865ae31f73861c7dfdb6f8771b0a41962a20f8a5117819e00babc0d2c7405bf1f682c3627b440b368ea49e8ce745603cac27f10b1356905bef3661f436bf34bbcda43ee25f1bf93048c23c9b60c7c052e32b04954910315ed99ffe2a1373948554dff516feeac392ae0eeca5727d47341bfb687c5f018379beaed0876e306e506d47e8eb1cf048efc3d2ae581cf1ed7d41ad89373741f66fb526f0e62371c836ca4140d37ee08c16f26e87d9dcff418373255f283ef23baa2b2403f9d796ad0c88fa52091a2667fc3e76c5e3ca06c4c0eb21c34bc4167341ca55b2d4672bd381c3f48b6d21ad386a09d2730c97c211b1c3cb46fd64430666e62507b4512053d2081f9a28a331e5c46d014503f703f08802221b8a994f50868139bd05698cadc8ee3fff87e28f0c3b0c4fa33307a7c5740781f96df54202e6332ebf10f601e45b9f1ccae3c556a9028b72ca8c315a4d7a1cc57dd7321a17e0b147a67500ee25dd04cba15cc8bad0e66f33245d3046d7d601bd77f7b452cd9d0ebdae7feef004ae10a4555a9b1aab449458fef5790d6a94c7af2ef1d83f777d8c275548bf89c98ffbc5850a5b5380e4ec8713463ff577cc95ab47728021f9d132d69f2fb848c6ed01307c64041777a2b9f0b8818522f3bb8b550f8641b2cb7cebfe98dbbe348040cebf01b715cf0591c29abc431cd8426cd96524ab6300f2d1422653e2576c6795f1b43b78ad9ab8b33e75536a251c9227eba18e091e3b327ccfd89df420941416ba1d849665379743d2f01e047072028a4e455beddb088282ae0551c4378875dfde89c2a89cbc63579105bb3d992ccead96f9c9b13fd3e560c503bf410fb9c7d3c4ffd4e16d4e9815a7a9beb18f4284500e0d70c2d4d29adc923005fb9d8c48de58c51fe34bbf895c419d4a85b54f2cb0d601af68a12b668a7b065d25a4bdc92838f6818e0dd16fc03fc8c2b6007fecbcbb005ace1a9cb25a74eab126c9d47acc9c8ac2465d43c497d01f8c019d0f7ce2e879acdb65979136419a7826c1f383510374402c769a929f4f8a56a5ddabb1c1fe57e638f91c2ecac8c380dfb4e50f0cbe1a38a39bff17f53fd9f020e198ffeabb50ec7a6ae944e3d7427f2af0d2291b123daaa83f863760e385cc680ae5550f388d6948ace88961a985d485304403c68ec9b28d8b13629c551101e996594a49ab257736eba323598c98ba0c6decfed6cd31127cf315a852621a17a644f031ca05d08a7e30bdc5194f54bf184e2d1b728ffd956341e11d972c35631da363005060423305254ea5cc8af0be308799aacbdd90e574bf5a3df20d45828e8ff227d5fdb6ddc39825b22107e63dc3a4365cf1886c6d1378fb73119d9937f17da1ba8c8a048276992ae0c3557e8f6af1a1ad8d974dc447e610dc259f309ff1242c885b003266285bfe082eb694c3063f972bbd877352418c79f11b51dc19c0d53cb1a4a8059cb8d595c04adbcef9b869b886011b37b4e091e28c0ee48fc4044df49da47011b3fc5afaf3136f8c617aac8b3623be3a347f17b28a5c0c65d8e16d72b0ed2ba375159e8de4a4b2a90369560dff3bfde6ae14c1a45661ced002ef28f004da885b4a30a83582683b000e383a6916fbd78a76ffb5d801a8196d692f9a40a769c7ebdb606bd463bbac8e09aaa61942deda22fadfc188a646c2363e475d564731b597522548a4baf2f5bc96923847c5ecd5c2a84b02303b69dac6a7bd1638865b0ef92f41f603d805519394c58db680035199f7ce3612773250aff444ba2e62838f46a675634cab573bec6634befd54c14191b073f9cbbe47e7795ad3862c53e6bde2417cde3ed465f61302e39550095e2f6a4bea0c9a2d906a57d086c7d69b7e7ab8031a782318dda96ca695f7d155a118b03e3a86fd8a429dc6323f265e4d247ba4733d9b468d431f8d358dd67c7f6ef764571114a683247eb2c9f50255e8aa8cda61190e16883db44dfaf3c1421b171832f379b6dfa675edf778092d9f685f7930d323d83f49ab3dedf2a963ae1736237a796683ce70b8dcbe77a003e052fe044169d672f4e222ef8c429c345c3d0472d804453ae1072d1d1d52eb927a11cbcd6030d8f8d7498abe89eee5ea31ab1658945c712303ab044ab4b138388e06e05584af1d1cdbdef2230ed08bee54ea301474bb65cfa13ea8acce7af636d6d342782f555899bbecc62e254d0f09e31ddc432b05ba685150620f3e0470854fdc8352a1e0d504fd6d831ef9c2c238656432bc3effe93b4458b81e396ddac2802c55d38ee89a289f1c40e760dc71d6520bd4a7cdf5ffb78c51ef1f295e1aba88112764841d2ca6e4f15ef3687b23ad885703d231caf2fb8a156ccd885248e85ef68b38cc2f5e64b9f306024f72148463b32699bdbffad6528b460106df502c248b42e9a88007e468632351e017cdadf32c40d4a2662b7ad966b0f2e27b7b9c3926b56fbd08bc8acd49422d1b459d44a965e956346ff6b10a8f62e827a97936919b62f22404b85586cf5782545f57417b6ce113406470a5b322a13851563de225969fc76699f41a8aa434553350b34dfcc3a915107a5788d515b78cc5e26337803e2cd5626cfbce3066a2059403923705532e1d5a7016e77c2fce33133e8ce09ae8f37962b46335d6ab8494847e1cc817517de783f2d255e6d703ba4234629e2a38c9b6e93ad43e8bf257f2220ce36ab3d63091b07e29c6d4755ba6c3ff330a48f6c1cbe55c33161467bec9641e5a1a4e001f4b7706b64bfefc90dc347e9872d1983ecb0ceb4b3163a5aad34694a5cc9b8372a730b9a4ae679cd1e61bd52a2396ada92b45bb6441f3071afeede64cbda7503ef85336cf9c213337399514732cbd08ef2a29684825faa5bd40eac11d275dc7cedd6b9a8886c64fac05f9f45347946961227d26e76587e6023d7afd8a8a1f3a1967dbbbd4e521a7b141b82ee33d5fc8911955f9633ed25fd4417bbbcca4e29686b131e3800f7934b166b6cc3c104de5b8b2cc678cf2c67e42dd039f1ce1cadb0d7824c87414747f48430f7aa4e39b69d9ad3cec9c8e42ad052907414e45bc067bf4cca3a3258eedf18606a29233474738e27285831724579455699627a87e7bb300bbce87877ecc75e8274ed0da3693d3ae24013f55683fd3f1a8b654ea8ea63ffcc10ca2d79342c4d431615f3dddc2f806c45d5089afb6804a514f72b28aaa7feae648b6fe576fc4934136deabb432990b27b1ab798f274586bbb998d6efd3929cea243eaab140b6c4103aed31a290a1776d638ef0e9e9919c2dc7a25663e54e1388a891b0cc38d8f4a8e689c3a0d499d6708836923e63c4cc9745639c93491ed5794cba7dbe3547fbfae4f25e304598bab5fa3916cec0c705b60e1da77d2ef909273d1d401567a6a423418142786aa2640228e30eb8b8d48ba3c2c891b7447eea17946561940a39cb1b6a88de83d8ebee51b861e38c20e3958998d9a79675648352997d0f36e28aa783e686c29161f515b52f046e22f3610a564416f83bb47b67a0f667162c6bfa16360b447f23586d2937953b2ec9fb44e6e124dc13141e54a874ee14250efb6d54398459bbb94c666537295ecb56163938b1ab411cabd37e1011edfd9a7610038a05542c6a6f1eaeaf882555a2406c240d58b5f788c52537d2211211f68dcbcfbd6147eb48f40d1083defcea94c7e737c6daf5a42123efdcfd0d301457d565ad69e10a7220958263483dc172b5137b7622cd181c40260f22f4553e70ff567ad6b10a1955a200ee5176200ea2952627952191bdcba07c91c27e1fe70e14a679fa8caa86f0186a486dd4e38ac337c1684ba586d80f6b651a9a1dc1d1c7eb283d87aa51c5a9278d4f3820faef8c437d89bf9e4690c8419d9eda19ee393378ed7b4670850b27b2520551b8443d84a9c32195016784410085af4d29ccdababa1ccb814b897358135a4cf0d73df805488c9350d6ea613cc8376c5d2223cea0dd97dc0e5087928587a08f71a221413355da5a11ac305a4eab10af1b6fac2b0ce8f50530656ea7f3c55bbd2c0c3f819bb1bd1e0620fce40a65e373f806cc85eb31f49c8a88fda9916853cceaf4aea8b9a38f1aec591379e161f4382f4d6c7c6c3405da3f865dba59bee0c7768067d43f6ae8e8070488bc7fb9974ef1ea1ec1cf7ede0f2c4e181b717c751668430656793c787b3691d21e139351792de7119df8816d0964369a89364fb10dd540080af896abef434db86f6d265686485f5e083fa1ab142de2dfc7d340bc3002ec42c147fc31b1f6ea334daceef6d0ff694ca9af18a40cfca06bf052d4d9618d9ee23ebe46eb00511ae4631afe98bed05360baf74c2b173ad4bd6133ce3a2c721251383cd3c0f8d664949e8ab13c2bf7129888575fb1c46057b784d961f38dc842f4d759d6e439fc118a3abb07e3b065a0fa43b69abd1a624fb556afb3b259d93f202b5141482dc54c243eb63d3bd1dcfcd29c433fb38294e1ad3fe4508092d7a772c21eac9039d7884c45431ed428a9a79289cabd26b895784c740563c6a7d2c0d6f956875605d5f733cc4ca55c520375831aae4ea215d517ac543eb915b4c15ba894531bfcd32c315ea6c95c5ed4022a8e88fa4f0172a04d670e117e04b7fc786e00ad65d94045cf90ab685fe28ebe22c350d5ee662c4e91612356073764b5d2e41fe16080ffb283787b6bc7ef638f5f70aa19d68472bab2d08d9aa83dd0efdb42fcfe74d5eab5717585b2d16d1446505b84b11a4f17795b6fcc40ecb68dd43b502d322a8146c5d7dc08855f0130a7852dbf91769265857594d25e0554d487a3a8ff9c332e0de14cb0e21ed7101f7c0d0dd0f8f91d568e5cdea9c666bcbd73fe4e05f21d89c52ed53bebeb04ff9bf273d27fbb03b1c09f4630301a9edc0024d9393e4b77cb3cd9926c56e9f8e7beaeaf56c22b5b13e09ec3a0c524a0624746a21e3cce2d698e7ef8918dc622e135023dc804c858e62c6979eba865ba23d5646a0ebde3d33718772909d6b7a8bd06920b3a2d7f8b74f59e5deb1217ed664ac1b4794c9d5e59acce20af84b6a780554bd770dc914e69f5365d0cbecb1cc5b4b3976a6930b5c5c7c063223db3f13e86204dd3729ea998f3dd854958d66f116ff089219380e2dc35f1ac990cbb47bda5e720e4ff35d6278df731c82edd6ec09edf99b3ec067c86f37069d8afd0f6c42537f86ea04bb75a68e2aebde4a059038221cd353aa4c9f1f3bb22fb596af282a3c01c769565b3e1fa2cd65a155dde82b7eef74b3c469f4dade21980eb380e4f41b11f2cefd8f8923d8c8ef90c0a9c42b0eddecaa8037388e92cb302570260823f44194e517c71a00e702c3885ee46c5b8ec74ffe6b15882cdb4a5cf3ec749d2cd8d06f3c97b1a9bdc80c39d0f4a7e409fc7790490b4d5814aecd21a27b7643f79b044df178b3f743ec46a84ee4ddc6c41a0e46bc3f88e11962684f3d61b19e0c7ef421054b842386605376133abb8a92afe9e4e80e867f9dec37e20a1a8b8edcf82c3da0771e71f1ad762dfff03e2ac6388db30c66fc6c5da016fbd23e6bcc24ffe4033ddc28aff31b640f773580ec7a3f07ae56d1511a20fea582460b61d6d49e27d51e644f3d16b4f1aff3c36217066ef2039a8cfe70aa7c1f8dedf645f1f3a4d0cb6ecb2e8f4d31376fbeef08cd2d6f56a1eb9230706737a3d6107e31abbcebdebafc39110ca1735fb6cc8cdcf1df62d822f407ef646ded3bc08139addd2b82cbef4aafa63291203e4e5e9cd935a07a6b6453f414657657eed1a76f8223cff3f2e3b3ffbc8b6100e9da73ed829bb762bde819d44f4cde32765e84b012f116e8f78f9241cdeaa7b00122d69803eff5531ee000437ef5abf8f1f1e28ec68cf3b3638bbbe0c5d5d982cae80489f1f03bf840c006755db83dd4b76f796969437f83af9b7c214d9bc0c270e2e7840ac7185e758a974938842cfa4d87ebb648694f7e1d3fd7416be158f9523a10adfc77d6dd30410d2d92129d307e817aa83f3c76797d41f7f8ee774f1e99a27ac3e24fdeec400e8bd6939ec653cfc16ccd5c4b21acf540a6a708d6fe91238221160e6acdd9bf316549d9314854a2154c7bb5072ee12a42784f450e063b52dc155f22d95b1bf77fb4b3a38110b2b94d01de81ce50b26c3a61e27d373d3f467f915134ae", 0x2000, &(0x7f0000002a80)={&(0x7f00000001c0)={0x50, 0xfffffffffffffff5, 0x3, {0x7, 0x26, 0x7, 0x2203002, 0x3ff, 0x9, 0xb5b9, 0x80000001}}, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x7}}, &(0x7f0000000280)={0x18, 0x0, 0x8001, {0x7fffffffffffffff}}, &(0x7f0000002340)={0x18, 0x0, 0x7, {0xfa48}}, &(0x7f0000002380)={0x18, 0x0, 0xfffffffffffffc00, {0x8}}, &(0x7f00000023c0)={0x28, 0x0, 0x13, {{0x1, 0x7fffffff, 0x0, r2}}}, &(0x7f0000002400)={0x60, 0x0, 0x100, {{0xcce, 0xfc784c9, 0x63525005, 0x0, 0x9, 0x100, 0x5, 0x5}}}, &(0x7f0000002480)={0x18, 0x0, 0x4, {0x9}}, &(0x7f00000024c0)={0x13, 0xfffffffffffffff5, 0x6, {'*\x0e\x00'}}, &(0x7f0000002500)={0x20, 0x0, 0x0, {0x0, 0x5}}, &(0x7f0000002540)={0x78, 0x0, 0x80, {0xffffffffffff5ad0, 0x8, 0x0, {0x3, 0xffffffffffffffff, 0x10000, 0x6, 0x3, 0x20, 0x800, 0x1, 0xc00, 0x1000, 0x8, 0xee00, 0xffffffffffffffff, 0x2, 0x100}}}, &(0x7f00000025c0)={0x90, 0x0, 0x5, {0x5, 0x3, 0x5d8, 0x1ff, 0xaad5, 0x3, {0x4, 0x7f, 0x6, 0x3f, 0x2, 0x2, 0x2, 0x6, 0xffff, 0x4000, 0x5, r3, 0x0, 0x7, 0x1}}}, &(0x7f0000002680)={0x10, 0x0, 0x7}, &(0x7f00000026c0)={0x148, 0x0, 0x3, [{{0x2, 0x1, 0x101, 0x5, 0x3, 0x9, {0x1, 0x2, 0xf8, 0x9, 0xfffffffffffffff8, 0x5, 0x9, 0x3, 0x5, 0x1000, 0x7, 0xee00, 0xffffffffffffffff, 0x3, 0x1}}, {0x3, 0x5, 0x0, 0x7}}, {{0x6, 0x2, 0x7, 0x8000000000000000, 0x1, 0x5, {0x4, 0x8, 0x5, 0x9, 0x2, 0x7, 0x0, 0x4, 0x4, 0xc000, 0x8, 0xee00, 0xffffffffffffffff, 0xc462, 0x19c3f7dd}}, {0x3, 0x3, 0x8, 0x7, ';\'*/@\\\xb6,'}}]}, &(0x7f0000002980)={0xa0, 0x0, 0x8000000000000000, {{0x0, 0x0, 0x6, 0xff, 0x8, 0x633b31ac, {0x0, 0x3, 0x8, 0x6, 0xbcc8, 0x7ff, 0x7f, 0x4, 0x9, 0x0, 0x8, 0x0, r4, 0xffffffff, 0x81}}, {0x0, 0xc}}}, &(0x7f0000002a40)={0x20, 0x0, 0xfa6a, {0x9, 0x4, 0x0, 0x80000001}}}) (async) write$FUSE_IOCTL(r1, &(0x7f0000000180)={0x20, 0x0, 0x0, {0x8, 0x4, 0xffffffc0, 0xfffffffd}}, 0x20) 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f00000000c0)=0x200, 0x8) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x188) 08:20:10 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:10 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200500, 0x0) linkat(r1, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1400) 08:20:10 executing program 4: ptrace$setsig(0x4203, 0x0, 0x65f, &(0x7f0000000080)={0x32, 0x9, 0x981}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB="7504d9edb3e1e400", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000200,default_permissions,blksize=0x0000000000000200,blksize=0x0000000000001400,max_read=0x0000000000000003,subj_role=]\\{(+*](,\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) [ 2076.997266] FAULT_INJECTION: forcing a failure. [ 2076.997266] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.027581] CPU: 0 PID: 26996 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2077.035517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.044857] Call Trace: [ 2077.047437] dump_stack+0x1b2/0x281 [ 2077.051167] should_fail.cold+0x10a/0x149 [ 2077.055314] should_failslab+0xd6/0x130 [ 2077.059278] kmem_cache_alloc_node+0x263/0x410 [ 2077.063842] __alloc_skb+0x5c/0x510 [ 2077.067450] kobject_uevent_env+0x882/0xf30 [ 2077.071759] device_add+0xa47/0x15c0 [ 2077.075469] ? device_is_dependent+0x2a0/0x2a0 [ 2077.080027] ? kfree+0x1f0/0x250 [ 2077.083374] device_create_groups_vargs+0x1dc/0x250 [ 2077.088720] device_create_vargs+0x3a/0x50 [ 2077.093117] bdi_register_va.part.0+0x35/0x650 [ 2077.097680] bdi_register_va+0x63/0x80 [ 2077.101549] super_setup_bdi_name+0x123/0x220 [ 2077.106021] ? kill_block_super+0xe0/0xe0 [ 2077.110147] ? do_raw_spin_unlock+0x164/0x220 [ 2077.114625] fuse_fill_super+0x937/0x15c0 [ 2077.118762] ? fuse_get_root_inode+0xc0/0xc0 [ 2077.123146] ? up_write+0x17/0x60 [ 2077.126577] ? register_shrinker+0x15f/0x220 [ 2077.130973] ? sget_userns+0x768/0xc10 [ 2077.134844] ? get_anon_bdev+0x1c0/0x1c0 [ 2077.138879] ? sget+0xd9/0x110 [ 2077.142064] ? fuse_get_root_inode+0xc0/0xc0 [ 2077.146447] mount_nodev+0x4c/0xf0 [ 2077.149965] mount_fs+0x92/0x2a0 [ 2077.153310] vfs_kern_mount.part.0+0x5b/0x470 [ 2077.157784] do_mount+0xe65/0x2a30 [ 2077.161317] ? do_raw_spin_unlock+0x164/0x220 [ 2077.165810] ? copy_mount_string+0x40/0x40 [ 2077.170059] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2077.175059] ? copy_mnt_ns+0xa30/0xa30 [ 2077.178929] ? copy_mount_options+0x1fa/0x2f0 [ 2077.183502] ? copy_mnt_ns+0xa30/0xa30 [ 2077.187368] SyS_mount+0xa8/0x120 [ 2077.190800] ? copy_mnt_ns+0xa30/0xa30 [ 2077.194684] do_syscall_64+0x1d5/0x640 [ 2077.198573] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2077.203752] RIP: 0033:0x7f80d8a040c9 [ 2077.207461] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2077.215160] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2077.222425] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2077.229672] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2077.236921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f00000000c0)=0x200, 0x8) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x188) [ 2077.244169] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:10 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 45) 08:20:10 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f00000000c0)=0x200, 0x8) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x188) 08:20:10 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200500, 0x0) linkat(r1, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1400) 08:20:10 executing program 4: ptrace$setsig(0x4203, 0x0, 0x65f, &(0x7f0000000080)={0x32, 0x9, 0x981}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB="7504d9edb3e1e400", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000200,default_permissions,blksize=0x0000000000000200,blksize=0x0000000000001400,max_read=0x0000000000000003,subj_role=]\\{(+*](,\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) 08:20:10 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) [ 2077.362778] FAULT_INJECTION: forcing a failure. [ 2077.362778] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.378231] CPU: 1 PID: 27040 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2077.386161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.395509] Call Trace: [ 2077.398105] dump_stack+0x1b2/0x281 [ 2077.401746] should_fail.cold+0x10a/0x149 [ 2077.405907] should_failslab+0xd6/0x130 [ 2077.409885] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2077.414993] __kmalloc_node_track_caller+0x38/0x70 [ 2077.419922] __alloc_skb+0x96/0x510 [ 2077.423551] kobject_uevent_env+0x882/0xf30 [ 2077.427880] device_add+0xa47/0x15c0 [ 2077.431576] ? device_is_dependent+0x2a0/0x2a0 [ 2077.436157] ? kfree+0x1f0/0x250 [ 2077.439521] device_create_groups_vargs+0x1dc/0x250 [ 2077.444542] device_create_vargs+0x3a/0x50 [ 2077.448767] bdi_register_va.part.0+0x35/0x650 [ 2077.453332] bdi_register_va+0x63/0x80 [ 2077.458505] super_setup_bdi_name+0x123/0x220 [ 2077.462981] ? kill_block_super+0xe0/0xe0 [ 2077.467135] ? do_raw_spin_unlock+0x164/0x220 [ 2077.471621] fuse_fill_super+0x937/0x15c0 [ 2077.475758] ? fuse_get_root_inode+0xc0/0xc0 [ 2077.480422] ? up_write+0x17/0x60 [ 2077.483867] ? register_shrinker+0x15f/0x220 [ 2077.488256] ? sget_userns+0x768/0xc10 [ 2077.492132] ? get_anon_bdev+0x1c0/0x1c0 [ 2077.496279] ? sget+0xd9/0x110 [ 2077.499465] ? fuse_get_root_inode+0xc0/0xc0 [ 2077.503867] mount_nodev+0x4c/0xf0 [ 2077.507388] mount_fs+0x92/0x2a0 [ 2077.510756] vfs_kern_mount.part.0+0x5b/0x470 [ 2077.515248] do_mount+0xe65/0x2a30 [ 2077.518773] ? do_raw_spin_unlock+0x164/0x220 [ 2077.523255] ? copy_mount_string+0x40/0x40 [ 2077.527489] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2077.532489] ? copy_mnt_ns+0xa30/0xa30 [ 2077.536355] ? copy_mount_options+0x1fa/0x2f0 [ 2077.540829] ? copy_mnt_ns+0xa30/0xa30 [ 2077.544698] SyS_mount+0xa8/0x120 [ 2077.548150] ? copy_mnt_ns+0xa30/0xa30 [ 2077.552018] do_syscall_64+0x1d5/0x640 [ 2077.555890] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2077.561059] RIP: 0033:0x7f80d8a040c9 [ 2077.564761] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2077.572460] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2077.579833] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2077.587096] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2077.594356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2077.601610] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:11 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:11 executing program 4: ptrace$setsig(0x4203, 0x0, 0x65f, &(0x7f0000000080)={0x32, 0x9, 0x981}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB="7504d9edb3e1e400", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000200,default_permissions,blksize=0x0000000000000200,blksize=0x0000000000001400,max_read=0x0000000000000003,subj_role=]\\{(+*](,\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ptrace$setsig(0x4203, 0x0, 0x65f, &(0x7f0000000080)={0x32, 0x9, 0x981}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB="7504d9edb3e1e400", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000200,default_permissions,blksize=0x0000000000000200,blksize=0x0000000000001400,max_read=0x0000000000000003,subj_role=]\\{(+*](,\x00']) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) (async) 08:20:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:11 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200500, 0x0) linkat(r1, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1400) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x200500, 0x0) (async) linkat(r1, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1400) (async) 08:20:11 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 46) 08:20:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @b}}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYBLOB=',group_Yd=', @ANYRESDEC=0x0, @ANYBLOB="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"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r1, &(0x7f0000000200)='./file0\x00', 0xd0) r2 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r3, 0x100, 0x0) prlimit64(0xffffffffffffffff, 0xc, &(0x7f0000000100)={0xffff, 0x179f}, &(0x7f0000000140)) r4 = getpgrp(r3) ptrace$getsig(0x4202, r4, 0x6, &(0x7f0000000400)) getpgrp(r2) 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000140)) (rerun: 64) 08:20:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @b}}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYBLOB=',group_Yd=', @ANYRESDEC=0x0, @ANYBLOB="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"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fchmodat(r1, &(0x7f0000000200)='./file0\x00', 0xd0) r2 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r2, 0x0, 0x0) r3 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r3, 0x100, 0x0) prlimit64(0xffffffffffffffff, 0xc, &(0x7f0000000100)={0xffff, 0x179f}, &(0x7f0000000140)) r4 = getpgrp(r3) ptrace$getsig(0x4202, r4, 0x6, &(0x7f0000000400)) getpgrp(r2) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @b}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYBLOB=',group_Yd=', @ANYRESDEC=0x0, @ANYBLOB="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"]) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) fchmodat(r1, &(0x7f0000000200)='./file0\x00', 0xd0) (async) getpgrp(0xffffffffffffffff) (async) ptrace$getenv(0x4201, r2, 0x0, 0x0) (async) getpgrp(0xffffffffffffffff) (async) ptrace$getenv(0x4201, r3, 0x100, 0x0) (async) prlimit64(0xffffffffffffffff, 0xc, &(0x7f0000000100)={0xffff, 0x179f}, &(0x7f0000000140)) (async) getpgrp(r3) (async) ptrace$getsig(0x4202, r4, 0x6, &(0x7f0000000400)) (async) getpgrp(r2) (async) 08:20:11 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:11 executing program 4: sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1f}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4804) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000380)={@id={0x2, 0x0, @auto="42275ccbabdfffe1143a7af2af23ea3a"}}) name_to_handle_at(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="a44637f9c573c46a7572a3daf2857d3e08d0042e7cb1c76f2f83746602a816163cfafe0b7bd9483984e807c5106b1fecb6ee102cadb108db666e721a1c68a3fde8d219cf99f74edb4a"], &(0x7f0000000340), 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=@raw={0xbc, 0x71, {"091908ec02399a4ff7608b01709606e823d69d70112f1ce7aaaa60f7f4b12ab292d1d5818efdf63884931ceffdd91f673dc2b850223b461a5834434f9574a7891711fb7c604562b461ef16e2ebc2214427af409790f1b9998caee6ff4ad5978aa135cd395dca662c55f2495c2ff6c66555e7abcb1cbe85cb6864049bbea03323f87eb13e0d26747304b3ca087d1dfa0a6254a07b88ae2537372f47bbd61bcf6bb3f7b0c14072ae9141573a000e4616abf11c186f94df5b1cea80d8b5"}}, &(0x7f0000000300), 0x400) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0059ac31b243dc7c9337bbbf4343cc75aac1b4090274f7af2a1d9c32182e65"]) [ 2077.898381] FAULT_INJECTION: forcing a failure. [ 2077.898381] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.936726] CPU: 0 PID: 27184 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2077.944651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2077.954032] Call Trace: [ 2077.956620] dump_stack+0x1b2/0x281 [ 2077.960257] should_fail.cold+0x10a/0x149 [ 2077.964410] should_failslab+0xd6/0x130 [ 2077.968387] kmem_cache_alloc_node+0x263/0x410 [ 2077.972968] __alloc_skb+0x5c/0x510 [ 2077.976596] kobject_uevent_env+0x882/0xf30 [ 2077.980937] device_add+0xa47/0x15c0 [ 2077.984648] ? device_is_dependent+0x2a0/0x2a0 [ 2077.989240] ? kfree+0x1f0/0x250 [ 2077.992606] device_create_groups_vargs+0x1dc/0x250 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0xc0000}) 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) (async) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0xc0000}) 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0xc0000}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) (async) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0xd, 0xc0000}) (async) 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x2], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x2f) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x0, &(0x7f0000000140)) [ 2077.997624] device_create_vargs+0x3a/0x50 [ 2078.001860] bdi_register_va.part.0+0x35/0x650 [ 2078.006442] bdi_register_va+0x63/0x80 [ 2078.010331] super_setup_bdi_name+0x123/0x220 [ 2078.014823] ? kill_block_super+0xe0/0xe0 [ 2078.018967] ? do_raw_spin_unlock+0x164/0x220 [ 2078.023467] fuse_fill_super+0x937/0x15c0 [ 2078.027616] ? fuse_get_root_inode+0xc0/0xc0 [ 2078.032026] ? up_write+0x17/0x60 [ 2078.035488] ? register_shrinker+0x15f/0x220 [ 2078.039900] ? sget_userns+0x768/0xc10 [ 2078.043797] ? get_anon_bdev+0x1c0/0x1c0 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x2], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x2f) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x0, &(0x7f0000000140)) [ 2078.047855] ? sget+0xd9/0x110 [ 2078.051046] ? fuse_get_root_inode+0xc0/0xc0 [ 2078.055488] mount_nodev+0x4c/0xf0 [ 2078.059042] mount_fs+0x92/0x2a0 [ 2078.062409] vfs_kern_mount.part.0+0x5b/0x470 [ 2078.066907] do_mount+0xe65/0x2a30 [ 2078.070450] ? do_raw_spin_unlock+0x164/0x220 [ 2078.074951] ? copy_mount_string+0x40/0x40 [ 2078.079183] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2078.084198] ? copy_mnt_ns+0xa30/0xa30 [ 2078.088074] ? copy_mount_options+0x1fa/0x2f0 [ 2078.092546] ? copy_mnt_ns+0xa30/0xa30 [ 2078.096416] SyS_mount+0xa8/0x120 [ 2078.099870] ? copy_mnt_ns+0xa30/0xa30 [ 2078.103746] do_syscall_64+0x1d5/0x640 [ 2078.107618] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2078.112788] RIP: 0033:0x7f80d8a040c9 [ 2078.116475] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2078.124157] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2078.131406] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2078.138656] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:11 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xc75e, 0x0, 0x6, 0x6, 0x2, 0x1], 0x6, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x81, 0x81, 0x5, 0x20, 0x5, 0x271], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000280)=[0xffffffff, 0x33, 0x1221de3d], 0x3, 0x180800, 0x0, 0xffffffffffffffff}) read$FUSE(r1, &(0x7f0000000380)={0x2020}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f00000023c0)={0x50, 0x0, 0x0, [{0x3, 0x0, 0x5, 0x2, 'fuse\x00'}, {0x2, 0x6, 0x2, 0x9, '\\\x00'}]}, 0x50) 08:20:11 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x2], 0x2, 0x80800, 0x0, 0xffffffffffffffff}) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x2f) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000)=[0x7, 0x2], 0x2, 0x80800}) (async) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x2f) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x800, 0x0, &(0x7f0000000140)) (async) 08:20:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000180)={@id={0x2, 0x0, @b}}) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRESHEX=0x0, @ANYBLOB=',group_Yd=', @ANYRESDEC=0x0, @ANYBLOB="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"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) fchmodat(r1, &(0x7f0000000200)='./file0\x00', 0xd0) r2 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r2, 0x0, 0x0) (async) r3 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r3, 0x100, 0x0) prlimit64(0xffffffffffffffff, 0xc, &(0x7f0000000100)={0xffff, 0x179f}, &(0x7f0000000140)) (async) r4 = getpgrp(r3) ptrace$getsig(0x4202, r4, 0x6, &(0x7f0000000400)) (async) getpgrp(r2) 08:20:11 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (rerun: 64) 08:20:11 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 47) 08:20:11 executing program 4: sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1f}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4804) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000380)={@id={0x2, 0x0, @auto="42275ccbabdfffe1143a7af2af23ea3a"}}) name_to_handle_at(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="a44637f9c573c46a7572a3daf2857d3e08d0042e7cb1c76f2f83746602a816163cfafe0b7bd9483984e807c5106b1fecb6ee102cadb108db666e721a1c68a3fde8d219cf99f74edb4a"], &(0x7f0000000340), 0x0) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=@raw={0xbc, 0x71, {"091908ec02399a4ff7608b01709606e823d69d70112f1ce7aaaa60f7f4b12ab292d1d5818efdf63884931ceffdd91f673dc2b850223b461a5834434f9574a7891711fb7c604562b461ef16e2ebc2214427af409790f1b9998caee6ff4ad5978aa135cd395dca662c55f2495c2ff6c66555e7abcb1cbe85cb6864049bbea03323f87eb13e0d26747304b3ca087d1dfa0a6254a07b88ae2537372f47bbd61bcf6bb3f7b0c14072ae9141573a000e4616abf11c186f94df5b1cea80d8b5"}}, &(0x7f0000000300), 0x400) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0059ac31b243dc7c9337bbbf4343cc75aac1b4090274f7af2a1d9c32182e65"]) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1f}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4804) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000380)={@id={0x2, 0x0, @auto="42275ccbabdfffe1143a7af2af23ea3a"}}) (async) name_to_handle_at(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="a44637f9c573c46a7572a3daf2857d3e08d0042e7cb1c76f2f83746602a816163cfafe0b7bd9483984e807c5106b1fecb6ee102cadb108db666e721a1c68a3fde8d219cf99f74edb4a"], &(0x7f0000000340), 0x0) (async) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=@raw={0xbc, 0x71, {"091908ec02399a4ff7608b01709606e823d69d70112f1ce7aaaa60f7f4b12ab292d1d5818efdf63884931ceffdd91f673dc2b850223b461a5834434f9574a7891711fb7c604562b461ef16e2ebc2214427af409790f1b9998caee6ff4ad5978aa135cd395dca662c55f2495c2ff6c66555e7abcb1cbe85cb6864049bbea03323f87eb13e0d26747304b3ca087d1dfa0a6254a07b88ae2537372f47bbd61bcf6bb3f7b0c14072ae9141573a000e4616abf11c186f94df5b1cea80d8b5"}}, &(0x7f0000000300), 0x400) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0059ac31b243dc7c9337bbbf4343cc75aac1b4090274f7af2a1d9c32182e65"]) (async) [ 2078.145904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2078.153152] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x2, 0xffff], 0x2, 0x80000}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000300)={&(0x7f0000000280)=[0x2, 0x3, 0x9, 0x35, 0x1, 0x3, 0x3, 0x7, 0x21, 0xffffff00], 0xa, 0x0, 0x0, 0xffffffffffffffff}) futimesat(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {r1, r2/1000+60000}}) 08:20:11 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:11 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x2, 0xffff], 0x2, 0x80000}) (async) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000300)={&(0x7f0000000280)=[0x2, 0x3, 0x9, 0x35, 0x1, 0x3, 0x3, 0x7, 0x21, 0xffffff00], 0xa, 0x0, 0x0, 0xffffffffffffffff}) futimesat(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {r1, r2/1000+60000}}) 08:20:11 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:11 executing program 4: sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1f}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x4804) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000380)={@id={0x2, 0x0, @auto="42275ccbabdfffe1143a7af2af23ea3a"}}) name_to_handle_at(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="a44637f9c573c46a7572a3daf2857d3e08d0042e7cb1c76f2f83746602a816163cfafe0b7bd9483984e807c5106b1fecb6ee102cadb108db666e721a1c68a3fde8d219cf99f74edb4a"], &(0x7f0000000340), 0x0) (async) name_to_handle_at(r1, &(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)=@raw={0xbc, 0x71, {"091908ec02399a4ff7608b01709606e823d69d70112f1ce7aaaa60f7f4b12ab292d1d5818efdf63884931ceffdd91f673dc2b850223b461a5834434f9574a7891711fb7c604562b461ef16e2ebc2214427af409790f1b9998caee6ff4ad5978aa135cd395dca662c55f2495c2ff6c66555e7abcb1cbe85cb6864049bbea03323f87eb13e0d26747304b3ca087d1dfa0a6254a07b88ae2537372f47bbd61bcf6bb3f7b0c14072ae9141573a000e4616abf11c186f94df5b1cea80d8b5"}}, &(0x7f0000000300), 0x400) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000400), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0059ac31b243dc7c9337bbbf4343cc75aac1b4090274f7af2a1d9c32182e65"]) [ 2078.292527] FAULT_INJECTION: forcing a failure. [ 2078.292527] name failslab, interval 1, probability 0, space 0, times 0 [ 2078.313196] CPU: 1 PID: 27270 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2078.321106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2078.330565] Call Trace: [ 2078.333147] dump_stack+0x1b2/0x281 [ 2078.336758] should_fail.cold+0x10a/0x149 [ 2078.340893] should_failslab+0xd6/0x130 [ 2078.344855] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2078.349951] __kmalloc_node_track_caller+0x38/0x70 [ 2078.354876] __alloc_skb+0x96/0x510 [ 2078.358525] kobject_uevent_env+0x882/0xf30 [ 2078.362833] device_add+0xa47/0x15c0 [ 2078.366534] ? device_is_dependent+0x2a0/0x2a0 [ 2078.371114] ? kfree+0x1f0/0x250 [ 2078.374469] device_create_groups_vargs+0x1dc/0x250 [ 2078.379473] device_create_vargs+0x3a/0x50 [ 2078.383690] bdi_register_va.part.0+0x35/0x650 [ 2078.388252] bdi_register_va+0x63/0x80 [ 2078.392129] super_setup_bdi_name+0x123/0x220 [ 2078.396626] ? kill_block_super+0xe0/0xe0 [ 2078.400752] ? do_raw_spin_unlock+0x164/0x220 [ 2078.405235] fuse_fill_super+0x937/0x15c0 [ 2078.409442] ? fuse_get_root_inode+0xc0/0xc0 [ 2078.413857] ? up_write+0x17/0x60 [ 2078.417291] ? register_shrinker+0x15f/0x220 [ 2078.421682] ? sget_userns+0x768/0xc10 [ 2078.425571] ? get_anon_bdev+0x1c0/0x1c0 [ 2078.429614] ? sget+0xd9/0x110 [ 2078.432797] ? fuse_get_root_inode+0xc0/0xc0 [ 2078.437196] mount_nodev+0x4c/0xf0 [ 2078.440736] mount_fs+0x92/0x2a0 [ 2078.444109] vfs_kern_mount.part.0+0x5b/0x470 [ 2078.448588] do_mount+0xe65/0x2a30 [ 2078.452116] ? do_raw_spin_unlock+0x164/0x220 [ 2078.456606] ? copy_mount_string+0x40/0x40 [ 2078.460822] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2078.465816] ? copy_mnt_ns+0xa30/0xa30 [ 2078.469693] ? copy_mount_options+0x1fa/0x2f0 [ 2078.474194] ? copy_mnt_ns+0xa30/0xa30 [ 2078.478070] SyS_mount+0xa8/0x120 [ 2078.481531] ? copy_mnt_ns+0xa30/0xa30 [ 2078.485404] do_syscall_64+0x1d5/0x640 08:20:12 executing program 2: socketpair(0x5, 0x1, 0x3, &(0x7f0000000080)) socketpair(0x3, 0xa, 0x8, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x1c}}, 0x40080) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2078.489290] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2078.494498] RIP: 0033:0x7f80d8a040c9 [ 2078.498186] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2078.505877] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2078.513127] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2078.520394] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2078.527651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2078.534939] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xc75e, 0x0, 0x6, 0x6, 0x2, 0x1], 0x6, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x81, 0x81, 0x5, 0x20, 0x5, 0x271], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000280)=[0xffffffff, 0x33, 0x1221de3d], 0x3, 0x180800, 0x0, 0xffffffffffffffff}) read$FUSE(r1, &(0x7f0000000380)={0x2020}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f00000023c0)={0x50, 0x0, 0x0, [{0x3, 0x0, 0x5, 0x2, 'fuse\x00'}, {0x2, 0x6, 0x2, 0x9, '\\\x00'}]}, 0x50) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xc75e, 0x0, 0x6, 0x6, 0x2, 0x1], 0x6, 0x800}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x81, 0x81, 0x5, 0x20, 0x5, 0x271], 0x6, 0x80400}) (async) renameat2(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00', 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000280)=[0xffffffff, 0x33, 0x1221de3d], 0x3, 0x180800}) (async) read$FUSE(r1, &(0x7f0000000380)={0x2020}, 0x2020) (async) write$FUSE_DIRENT(r3, &(0x7f00000023c0)={0x50, 0x0, 0x0, [{0x3, 0x0, 0x5, 0x2, 'fuse\x00'}, {0x2, 0x6, 0x2, 0x9, '\\\x00'}]}, 0x50) (async) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x2, 0xffff], 0x2, 0x80000}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000300)={&(0x7f0000000280)=[0x2, 0x3, 0x9, 0x35, 0x1, 0x3, 0x3, 0x7, 0x21, 0xffffff00], 0xa, 0x0, 0x0, 0xffffffffffffffff}) futimesat(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {r1, r2/1000+60000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x2, 0xffff], 0x2, 0x80000}) (async) clock_gettime(0x0, &(0x7f0000000200)) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000300)={&(0x7f0000000280)=[0x2, 0x3, 0x9, 0x35, 0x1, 0x3, 0x3, 0x7, 0x21, 0xffffff00], 0xa}) (async) futimesat(r3, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {r1, r2/1000+60000}}) (async) 08:20:12 executing program 1: statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:12 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 48) 08:20:12 executing program 1: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x8800, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000240)) 08:20:12 executing program 4: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x2e) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67816f767064eabde8eb40866c8512f5e5230a9091b8a93800"/36, @ANYRESDEC=0x0, @ANYBLOB="2caf12e70063147984ff"]) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x37040, &(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYRESHEX=r0, @ANYRES32=r3, @ANYRESHEX=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRES32=r2]) [ 2078.646006] FAULT_INJECTION: forcing a failure. [ 2078.646006] name failslab, interval 1, probability 0, space 0, times 0 [ 2078.667839] CPU: 1 PID: 27311 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2078.675752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2078.685103] Call Trace: [ 2078.687691] dump_stack+0x1b2/0x281 [ 2078.691323] should_fail.cold+0x10a/0x149 [ 2078.695475] should_failslab+0xd6/0x130 [ 2078.699454] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2078.704564] __kmalloc_node_track_caller+0x38/0x70 [ 2078.709497] __alloc_skb+0x96/0x510 [ 2078.713125] kobject_uevent_env+0x882/0xf30 [ 2078.717451] device_add+0xa47/0x15c0 [ 2078.721172] ? device_is_dependent+0x2a0/0x2a0 [ 2078.725749] ? kfree+0x1f0/0x250 [ 2078.729118] device_create_groups_vargs+0x1dc/0x250 [ 2078.734136] device_create_vargs+0x3a/0x50 [ 2078.738377] bdi_register_va.part.0+0x35/0x650 [ 2078.742960] bdi_register_va+0x63/0x80 [ 2078.746848] super_setup_bdi_name+0x123/0x220 [ 2078.751341] ? kill_block_super+0xe0/0xe0 [ 2078.755495] ? do_raw_spin_unlock+0x164/0x220 [ 2078.759996] fuse_fill_super+0x937/0x15c0 [ 2078.764144] ? fuse_get_root_inode+0xc0/0xc0 [ 2078.768549] ? up_write+0x17/0x60 [ 2078.772000] ? register_shrinker+0x15f/0x220 [ 2078.776409] ? sget_userns+0x768/0xc10 [ 2078.780307] ? get_anon_bdev+0x1c0/0x1c0 [ 2078.784364] ? sget+0xd9/0x110 [ 2078.787554] ? fuse_get_root_inode+0xc0/0xc0 [ 2078.791958] mount_nodev+0x4c/0xf0 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x37040, &(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYRESHEX=r0, @ANYRES32=r3, @ANYRESHEX=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRES32=r2]) 08:20:12 executing program 1: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x8800, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000240)) 08:20:12 executing program 1: ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) (async, rerun: 64) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x8800, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000240)) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async, rerun: 32) r3 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async, rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) (async, rerun: 32) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x37040, &(0x7f0000000280)=ANY=[@ANYRES16=r1, @ANYRESHEX=r0, @ANYRES32=r3, @ANYRESHEX=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRES32=r2]) [ 2078.795498] mount_fs+0x92/0x2a0 [ 2078.798864] vfs_kern_mount.part.0+0x5b/0x470 [ 2078.803357] do_mount+0xe65/0x2a30 [ 2078.806893] ? do_raw_spin_unlock+0x164/0x220 [ 2078.811388] ? copy_mount_string+0x40/0x40 [ 2078.815623] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2078.820634] ? copy_mnt_ns+0xa30/0xa30 [ 2078.824523] ? copy_mount_options+0x1fa/0x2f0 [ 2078.829017] ? copy_mnt_ns+0xa30/0xa30 [ 2078.832911] SyS_mount+0xa8/0x120 [ 2078.836367] ? copy_mnt_ns+0xa30/0xa30 [ 2078.840249] do_syscall_64+0x1d5/0x640 08:20:12 executing program 2: socketpair(0x5, 0x1, 0x3, &(0x7f0000000080)) socketpair(0x3, 0xa, 0x8, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x1c}}, 0x40080) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) socketpair(0x5, 0x1, 0x3, &(0x7f0000000080)) (async) socketpair(0x3, 0xa, 0x8, &(0x7f0000000180)) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x1c}}, 0x40080) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) [ 2078.844129] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2078.849303] RIP: 0033:0x7f80d8a040c9 [ 2078.853089] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2078.860784] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2078.868040] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2078.875309] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2078.882568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2078.889841] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xc75e, 0x0, 0x6, 0x6, 0x2, 0x1], 0x6, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x81, 0x81, 0x5, 0x20, 0x5, 0x271], 0x6, 0x80400, 0x0, 0xffffffffffffffff}) renameat2(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000240)='./file1\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000340)={&(0x7f0000000280)=[0xffffffff, 0x33, 0x1221de3d], 0x3, 0x180800, 0x0, 0xffffffffffffffff}) (async) read$FUSE(r1, &(0x7f0000000380)={0x2020}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f00000023c0)={0x50, 0x0, 0x0, [{0x3, 0x0, 0x5, 0x2, 'fuse\x00'}, {0x2, 0x6, 0x2, 0x9, '\\\x00'}]}, 0x50) 08:20:12 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x50040, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x4000, 0xbdf, &(0x7f0000000240)) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x280, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:12 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 49) 08:20:12 executing program 4: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x2e) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67816f767064eabde8eb40866c8512f5e5230a9091b8a93800"/36, @ANYRESDEC=0x0, @ANYBLOB="2caf12e70063147984ff"]) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x2e) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67816f767064eabde8eb40866c8512f5e5230a9091b8a93800"/36, @ANYRESDEC=0x0, @ANYBLOB="2caf12e70063147984ff"]) (async) 08:20:12 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x50040, 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x4000, 0xbdf, &(0x7f0000000240)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x50040, 0x0) (async) statx(r0, &(0x7f0000000080)='./file0\x00', 0x4000, 0xbdf, &(0x7f0000000240)) (async) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x280, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c759959789269643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2078.981212] FAULT_INJECTION: forcing a failure. [ 2078.981212] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.014516] CPU: 1 PID: 27375 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c759959789269643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x280, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2079.022468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2079.031826] Call Trace: [ 2079.034415] dump_stack+0x1b2/0x281 [ 2079.038045] should_fail.cold+0x10a/0x149 [ 2079.042193] should_failslab+0xd6/0x130 [ 2079.046169] kmem_cache_alloc_node+0x263/0x410 [ 2079.050751] __alloc_skb+0x5c/0x510 [ 2079.054409] kobject_uevent_env+0x882/0xf30 [ 2079.058738] device_add+0xa47/0x15c0 [ 2079.062455] ? device_is_dependent+0x2a0/0x2a0 [ 2079.067031] ? kfree+0x1f0/0x250 [ 2079.070402] device_create_groups_vargs+0x1dc/0x250 [ 2079.075416] device_create_vargs+0x3a/0x50 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c759959789269643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303130303030302c759959789269643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) [ 2079.079653] bdi_register_va.part.0+0x35/0x650 [ 2079.084240] bdi_register_va+0x63/0x80 [ 2079.088126] super_setup_bdi_name+0x123/0x220 [ 2079.092621] ? kill_block_super+0xe0/0xe0 [ 2079.096765] ? do_raw_spin_unlock+0x164/0x220 [ 2079.101264] fuse_fill_super+0x937/0x15c0 [ 2079.105411] ? fuse_get_root_inode+0xc0/0xc0 [ 2079.109817] ? up_write+0x17/0x60 [ 2079.113264] ? register_shrinker+0x15f/0x220 [ 2079.117670] ? sget_userns+0x768/0xc10 [ 2079.121672] ? get_anon_bdev+0x1c0/0x1c0 [ 2079.125730] ? sget+0xd9/0x110 [ 2079.128925] ? fuse_get_root_inode+0xc0/0xc0 [ 2079.133318] mount_nodev+0x4c/0xf0 [ 2079.136840] mount_fs+0x92/0x2a0 [ 2079.140212] vfs_kern_mount.part.0+0x5b/0x470 [ 2079.144699] do_mount+0xe65/0x2a30 [ 2079.148224] ? copy_mount_string+0x40/0x40 [ 2079.152456] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2079.157461] ? copy_mnt_ns+0xa30/0xa30 [ 2079.161330] ? copy_mount_options+0x1fa/0x2f0 [ 2079.165817] ? copy_mnt_ns+0xa30/0xa30 [ 2079.169692] SyS_mount+0xa8/0x120 [ 2079.173130] ? copy_mnt_ns+0xa30/0xa30 [ 2079.176997] do_syscall_64+0x1d5/0x640 [ 2079.180885] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2079.186052] RIP: 0033:0x7f80d8a040c9 [ 2079.189743] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2079.197442] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2079.204719] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2079.211977] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2079.219251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2079.226497] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:12 executing program 2: socketpair(0x5, 0x1, 0x3, &(0x7f0000000080)) socketpair(0x3, 0xa, 0x8, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x1c}}, 0x40080) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) socketpair(0x5, 0x1, 0x3, &(0x7f0000000080)) (async) socketpair(0x3, 0xa, 0x8, &(0x7f0000000180)) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}]}, 0x1c}}, 0x40080) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0, 0xffff, 0xfffffe01, 0x6, 0x1, 0x101, 0x20, 0xfff], 0x8, 0x80000, 0x0, 0xffffffffffffffff}) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00', 0x1000, 0x10, &(0x7f0000000340)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x8c800, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)='./file0/file0\x00', 0x2400) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f7f746d6f64651d30303030303030303030303030303061303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:12 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async, rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x50040, 0x0) (rerun: 32) statx(r0, &(0x7f0000000080)='./file0\x00', 0x4000, 0xbdf, &(0x7f0000000240)) 08:20:12 executing program 4: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x2e) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67816f767064eabde8eb40866c8512f5e5230a9091b8a93800"/36, @ANYRESDEC=0x0, @ANYBLOB="2caf12e70063147984ff"]) 08:20:12 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 50) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:12 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0, 0xffff, 0xfffffe01, 0x6, 0x1, 0x101, 0x20, 0xfff], 0x8, 0x80000, 0x0, 0xffffffffffffffff}) (async) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00', 0x1000, 0x10, &(0x7f0000000340)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x8c800, 0x0) (async) linkat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)='./file0/file0\x00', 0x2400) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f7f746d6f64651d30303030303030303030303030303061303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:12 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 08:20:12 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}]}}) [ 2079.327068] FAULT_INJECTION: forcing a failure. [ 2079.327068] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.347013] CPU: 1 PID: 27448 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2079.354917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2079.364262] Call Trace: [ 2079.366853] dump_stack+0x1b2/0x281 [ 2079.370486] should_fail.cold+0x10a/0x149 08:20:12 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}]}}) 08:20:12 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2079.374641] should_failslab+0xd6/0x130 [ 2079.378616] kmem_cache_alloc_node+0x263/0x410 [ 2079.383201] __alloc_skb+0x5c/0x510 [ 2079.386831] kobject_uevent_env+0x882/0xf30 [ 2079.391157] device_add+0xa47/0x15c0 [ 2079.394994] ? device_is_dependent+0x2a0/0x2a0 [ 2079.399573] ? kfree+0x1f0/0x250 [ 2079.402936] device_create_groups_vargs+0x1dc/0x250 [ 2079.407959] device_create_vargs+0x3a/0x50 [ 2079.412204] bdi_register_va.part.0+0x35/0x650 [ 2079.416791] bdi_register_va+0x63/0x80 [ 2079.420852] super_setup_bdi_name+0x123/0x220 [ 2079.425360] ? kill_block_super+0xe0/0xe0 [ 2079.429505] ? do_raw_spin_unlock+0x164/0x220 [ 2079.433999] fuse_fill_super+0x937/0x15c0 [ 2079.438145] ? fuse_get_root_inode+0xc0/0xc0 [ 2079.442549] ? up_write+0x17/0x60 [ 2079.446000] ? register_shrinker+0x15f/0x220 [ 2079.450405] ? sget_userns+0x768/0xc10 [ 2079.454301] ? get_anon_bdev+0x1c0/0x1c0 [ 2079.458356] ? sget+0xd9/0x110 [ 2079.461545] ? fuse_get_root_inode+0xc0/0xc0 [ 2079.465950] mount_nodev+0x4c/0xf0 [ 2079.469482] mount_fs+0x92/0x2a0 [ 2079.472835] vfs_kern_mount.part.0+0x5b/0x470 [ 2079.477310] do_mount+0xe65/0x2a30 [ 2079.480948] ? copy_mount_string+0x40/0x40 [ 2079.485196] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2079.490203] ? copy_mnt_ns+0xa30/0xa30 [ 2079.494076] ? copy_mount_options+0x1fa/0x2f0 [ 2079.498571] ? copy_mnt_ns+0xa30/0xa30 [ 2079.502442] SyS_mount+0xa8/0x120 [ 2079.505883] ? copy_mnt_ns+0xa30/0xa30 [ 2079.509778] do_syscall_64+0x1d5/0x640 [ 2079.513658] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2079.518830] RIP: 0033:0x7f80d8a040c9 08:20:13 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c47726f75003db190dc6bfc48fb75f4043aa203f704d951eb174737e224a9470c6a514b86110008a8e1ef57daeeede5e54a95714f89d989ec5751542b3cffc48e1aecf2eb1536d331dd5bc1b3e1d491ffd09fdebebc7eea9400a9e634dc2f962963ccc12f4deac1990eb8b69a89dd283905cbd32123855b402d33ae07d1d5018078cbc5ef7fc6e0a0422a1ef74d486edb6c28bf", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x5}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions}]}}) 08:20:13 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:13 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0, 0xffff, 0xfffffe01, 0x6, 0x1, 0x101, 0x20, 0xfff], 0x8, 0x80000, 0x0, 0xffffffffffffffff}) statx(0xffffffffffffff9c, &(0x7f0000000240)='./file0/file0\x00', 0x1000, 0x10, &(0x7f0000000340)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0), 0x8c800, 0x0) (async) linkat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000200)='./file0/file0\x00', 0x2400) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f7f746d6f64651d30303030303030303030303030303061303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (rerun: 64) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async, rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) [ 2079.522537] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2079.530226] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2079.537496] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2079.544742] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2079.551995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2079.559266] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:13 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 51) 08:20:13 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:13 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="8935726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c47726f75003db190dc6bfc48fb75f4043aa203f704d951eb174737e224a9470c6a514b86110008a8e1ef57daeeede5e54a95714f89d989ec5751542b3cffc48e1aecf2eb1536d331dd5bc1b3e1d491ffd09fdebebc7eea9400a9e634dc2f962963ccc12f4deac1990eb8b69a89dd283905cbd32123855b402d33ae07d1d5018078cbc5ef7fc6e0a0422a1ef74d486edb6c28bf", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c47726f75003db190dc6bfc48fb75f4043aa203f704d951eb174737e224a9470c6a514b86110008a8e1ef57daeeede5e54a95714f89d989ec5751542b3cffc48e1aecf2eb1536d331dd5bc1b3e1d491ffd09fdebebc7eea9400a9e634dc2f962963ccc12f4deac1990eb8b69a89dd283905cbd32123855b402d33ae07d1d5018078cbc5ef7fc6e0a0422a1ef74d486edb6c28bf", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) [ 2079.653260] FAULT_INJECTION: forcing a failure. [ 2079.653260] name failslab, interval 1, probability 0, space 0, times 0 [ 2079.692467] CPU: 1 PID: 27499 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:13 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r1, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40005}, 0x24000081) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r4) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8d0}, 0x300008c0) fanotify_mark(r3, 0x10, 0x8000008, 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r6, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xc0000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r6, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x8000) name_to_handle_at(r3, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000200), 0x1400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 08:20:13 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="8935726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2079.700385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2079.709736] Call Trace: [ 2079.712324] dump_stack+0x1b2/0x281 [ 2079.715956] should_fail.cold+0x10a/0x149 [ 2079.720106] should_failslab+0xd6/0x130 [ 2079.724079] kmem_cache_alloc_node+0x263/0x410 [ 2079.728663] __alloc_skb+0x5c/0x510 [ 2079.732292] kobject_uevent_env+0x882/0xf30 [ 2079.736621] device_add+0xa47/0x15c0 [ 2079.740336] ? device_is_dependent+0x2a0/0x2a0 [ 2079.744912] ? kfree+0x1f0/0x250 [ 2079.748280] device_create_groups_vargs+0x1dc/0x250 08:20:13 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="8935726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x3, 0x0, 0x7ff], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) fanotify_mark(r1, 0x20, 0x8000009, r2, &(0x7f0000000180)='./file0\x00') mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2079.753296] device_create_vargs+0x3a/0x50 [ 2079.757533] bdi_register_va.part.0+0x35/0x650 [ 2079.762115] bdi_register_va+0x63/0x80 [ 2079.766006] super_setup_bdi_name+0x123/0x220 [ 2079.770496] ? kill_block_super+0xe0/0xe0 [ 2079.774641] ? do_raw_spin_unlock+0x164/0x220 [ 2079.779140] fuse_fill_super+0x937/0x15c0 [ 2079.783283] ? fuse_get_root_inode+0xc0/0xc0 [ 2079.787792] ? up_write+0x17/0x60 [ 2079.791242] ? register_shrinker+0x15f/0x220 [ 2079.795648] ? sget_userns+0x768/0xc10 [ 2079.799545] ? get_anon_bdev+0x1c0/0x1c0 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x3, 0x0, 0x7ff], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) fanotify_mark(r1, 0x20, 0x8000009, r2, &(0x7f0000000180)='./file0\x00') (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2079.803611] ? sget+0xd9/0x110 [ 2079.806799] ? fuse_get_root_inode+0xc0/0xc0 [ 2079.811204] mount_nodev+0x4c/0xf0 [ 2079.814744] mount_fs+0x92/0x2a0 [ 2079.818109] vfs_kern_mount.part.0+0x5b/0x470 [ 2079.822605] do_mount+0xe65/0x2a30 [ 2079.826145] ? do_raw_spin_unlock+0x164/0x220 [ 2079.830642] ? copy_mount_string+0x40/0x40 [ 2079.834878] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2079.839897] ? copy_mnt_ns+0xa30/0xa30 [ 2079.843822] ? copy_mount_options+0x1fa/0x2f0 [ 2079.848573] ? copy_mnt_ns+0xa30/0xa30 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 64) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async, rerun: 64) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) (rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x3, 0x0, 0x7ff], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) fanotify_mark(r1, 0x20, 0x8000009, r2, &(0x7f0000000180)='./file0\x00') (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2079.852465] SyS_mount+0xa8/0x120 [ 2079.855914] ? copy_mnt_ns+0xa30/0xa30 [ 2079.859806] do_syscall_64+0x1d5/0x640 [ 2079.863692] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2079.868878] RIP: 0033:0x7f80d8a040c9 [ 2079.872584] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2079.880286] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2079.887552] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2079.894823] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:13 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 52) 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) name_to_handle_at(r3, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x800, 0x5, 0x9, 0x280, 0x80, 0x7fff}}, &(0x7f0000000440), 0x1600) mknodat$loop(r2, &(0x7f0000000380)='./file0\x00', 0x1000, 0x0) r4 = fanotify_init(0x87e72f18753bdf8a, 0x800) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x6c, r7, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_team\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040080) fanotify_mark(r4, 0x638, 0x1, r5, &(0x7f0000000240)='./file0\x00') 08:20:13 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x78], 0x1, 0x0, 0x0, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x1000, 0x1) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xc000, 0x400) 08:20:13 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c47726f75003db190dc6bfc48fb75f4043aa203f704d951eb174737e224a9470c6a514b86110008a8e1ef57daeeede5e54a95714f89d989ec5751542b3cffc48e1aecf2eb1536d331dd5bc1b3e1d491ffd09fdebebc7eea9400a9e634dc2f962963ccc12f4deac1990eb8b69a89dd283905cbd32123855b402d33ae07d1d5018078cbc5ef7fc6e0a0422a1ef74d486edb6c28bf", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = geteuid() ioprio_set$uid(0x0, r1, 0x4007) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x81005, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '^'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!-['}}, {@pcr={'pcr', 0x3d, 0x3a}}]}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\a\x00\x00\x00S<_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004440)={0x508, 0x0, r3, [{{0x0, 0x1, 0x80000000, 0x0, 0x3f, 0x3, {0x3, 0x0, 0x2, 0x102, 0x639e8831, 0x0, 0x3800, 0x80000001, 0x67, 0x2000, 0xfffff800, r1, 0xee00, 0xffffffff, 0x2}}, {0x4, 0x0, 0x0, 0xce}}, {{0x1, 0x0, 0x2, 0x3, 0x9, 0x80000000, {0x4, 0xb6, 0x1f, 0x4, 0x27, 0x6, 0x1f, 0xa55, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x6, 0xfff}}, {0x6, 0xf5c, 0x7, 0x7, 'blksize'}}, {{0x2, 0x0, 0xffffffffffffffff, 0x6, 0x5, 0x3f, {0x1, 0x6, 0x5, 0x9, 0x4, 0x3, 0xd9, 0x800, 0x10001, 0xa000, 0x1f, r1, 0xee00, 0x2, 0x492}}, {0x5, 0x1, 0xc, 0x7fff, 'smackfsfloor'}}, {{0x5, 0x3, 0x1, 0x19, 0x7f, 0x6, {0x6, 0x81, 0x0, 0x1c9415dd, 0x9, 0x20, 0x6, 0x20, 0x0, 0x6000, 0x1, r1, 0x0, 0x7}}, {0x0, 0x80000001, 0x0, 0xff}}, {{0x6, 0x0, 0x280, 0x2, 0x5, 0x2, {0x4, 0x3, 0xf89, 0x14bd9f87, 0x0, 0x7, 0x0, 0xe989, 0x9, 0x6000, 0x1000, r1, 0x0, 0x8, 0x2}}, {0xfffffffffffffffe, 0x80, 0x0, 0xffffffe0}}, {{0x4, 0x2, 0xfff, 0xffffffff, 0x8, 0xc0, {0x4, 0x678, 0xfffffffffffffff7, 0x10000, 0x5, 0x20008001, 0x5, 0x3, 0x71, 0xe000, 0x5, r1, 0x0, 0x80000001, 0xffffd7e6}}, {0x1, 0x5, 0xb, 0x5, '\\%}%\xb2*\xb3$:@/'}}, {{0x2, 0x1, 0x9, 0x1, 0x80000000, 0xfff, {0x0, 0x8, 0x8000000000000000, 0x400, 0x3, 0x4, 0x3, 0x6, 0x81, 0xa000, 0x6, r1, r4, 0x10001, 0x4}}, {0x5, 0x7, 0x1, 0x8001, ']'}}, {{0x5, 0x2, 0xffffffff, 0x2e3, 0xffff, 0x2, {0x2, 0x400, 0x80000000, 0x2, 0x8, 0x72a57d08, 0x2, 0x3f, 0xfffffffb, 0x8000, 0x5, r1, 0xee00, 0xffff, 0x5}}, {0x0, 0x3, 0x2, 0xff4b, 'fd'}}]}, 0x508) 08:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async, rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) (async, rerun: 32) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r1, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40005}, 0x24000081) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r4) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8d0}, 0x300008c0) (async, rerun: 32) fanotify_mark(r3, 0x10, 0x8000008, 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') (async, rerun: 32) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r6, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xc0000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r6, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x8000) name_to_handle_at(r3, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000200), 0x1400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) [ 2079.902255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2079.909515] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async, rerun: 64) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async, rerun: 32) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1000) (async, rerun: 32) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) name_to_handle_at(r3, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x800, 0x5, 0x9, 0x280, 0x80, 0x7fff}}, &(0x7f0000000440), 0x1600) mknodat$loop(r2, &(0x7f0000000380)='./file0\x00', 0x1000, 0x0) r4 = fanotify_init(0x87e72f18753bdf8a, 0x800) (async) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) (async, rerun: 64) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) (rerun: 64) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x6c, r7, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_team\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) (async, rerun: 64) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040080) (async, rerun: 64) fanotify_mark(r4, 0x638, 0x1, r5, &(0x7f0000000240)='./file0\x00') 08:20:13 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x78], 0x1, 0x0, 0x0, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x1000, 0x1) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xc000, 0x400) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x78], 0x1}) (async) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x1000, 0x1) (async) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xc000, 0x400) (async) 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = geteuid() ioprio_set$uid(0x0, r1, 0x4007) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x81005, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '^'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!-['}}, {@pcr={'pcr', 0x3d, 0x3a}}]}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\a\x00\x00\x00S<_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004440)={0x508, 0x0, r3, [{{0x0, 0x1, 0x80000000, 0x0, 0x3f, 0x3, {0x3, 0x0, 0x2, 0x102, 0x639e8831, 0x0, 0x3800, 0x80000001, 0x67, 0x2000, 0xfffff800, r1, 0xee00, 0xffffffff, 0x2}}, {0x4, 0x0, 0x0, 0xce}}, {{0x1, 0x0, 0x2, 0x3, 0x9, 0x80000000, {0x4, 0xb6, 0x1f, 0x4, 0x27, 0x6, 0x1f, 0xa55, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x6, 0xfff}}, {0x6, 0xf5c, 0x7, 0x7, 'blksize'}}, {{0x2, 0x0, 0xffffffffffffffff, 0x6, 0x5, 0x3f, {0x1, 0x6, 0x5, 0x9, 0x4, 0x3, 0xd9, 0x800, 0x10001, 0xa000, 0x1f, r1, 0xee00, 0x2, 0x492}}, {0x5, 0x1, 0xc, 0x7fff, 'smackfsfloor'}}, {{0x5, 0x3, 0x1, 0x19, 0x7f, 0x6, {0x6, 0x81, 0x0, 0x1c9415dd, 0x9, 0x20, 0x6, 0x20, 0x0, 0x6000, 0x1, r1, 0x0, 0x7}}, {0x0, 0x80000001, 0x0, 0xff}}, {{0x6, 0x0, 0x280, 0x2, 0x5, 0x2, {0x4, 0x3, 0xf89, 0x14bd9f87, 0x0, 0x7, 0x0, 0xe989, 0x9, 0x6000, 0x1000, r1, 0x0, 0x8, 0x2}}, {0xfffffffffffffffe, 0x80, 0x0, 0xffffffe0}}, {{0x4, 0x2, 0xfff, 0xffffffff, 0x8, 0xc0, {0x4, 0x678, 0xfffffffffffffff7, 0x10000, 0x5, 0x20008001, 0x5, 0x3, 0x71, 0xe000, 0x5, r1, 0x0, 0x80000001, 0xffffd7e6}}, {0x1, 0x5, 0xb, 0x5, '\\%}%\xb2*\xb3$:@/'}}, {{0x2, 0x1, 0x9, 0x1, 0x80000000, 0xfff, {0x0, 0x8, 0x8000000000000000, 0x400, 0x3, 0x4, 0x3, 0x6, 0x81, 0xa000, 0x6, r1, r4, 0x10001, 0x4}}, {0x5, 0x7, 0x1, 0x8001, ']'}}, {{0x5, 0x2, 0xffffffff, 0x2e3, 0xffff, 0x2, {0x2, 0x400, 0x80000000, 0x2, 0x8, 0x72a57d08, 0x2, 0x3f, 0xfffffffb, 0x8000, 0x5, r1, 0xee00, 0xffff, 0x5}}, {0x0, 0x3, 0x2, 0xff4b, 'fd'}}]}, 0x508) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4, 0x1) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) geteuid() (async) ioprio_set$uid(0x0, r1, 0x4007) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x81005, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '^'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!-['}}, {@pcr={'pcr', 0x3d, 0x3a}}]}}) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\a\x00\x00\x00S<_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) read$FUSE(r0, &(0x7f00000003c0)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002400)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004440)={0x508, 0x0, r3, [{{0x0, 0x1, 0x80000000, 0x0, 0x3f, 0x3, {0x3, 0x0, 0x2, 0x102, 0x639e8831, 0x0, 0x3800, 0x80000001, 0x67, 0x2000, 0xfffff800, r1, 0xee00, 0xffffffff, 0x2}}, {0x4, 0x0, 0x0, 0xce}}, {{0x1, 0x0, 0x2, 0x3, 0x9, 0x80000000, {0x4, 0xb6, 0x1f, 0x4, 0x27, 0x6, 0x1f, 0xa55, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x6, 0xfff}}, {0x6, 0xf5c, 0x7, 0x7, 'blksize'}}, {{0x2, 0x0, 0xffffffffffffffff, 0x6, 0x5, 0x3f, {0x1, 0x6, 0x5, 0x9, 0x4, 0x3, 0xd9, 0x800, 0x10001, 0xa000, 0x1f, r1, 0xee00, 0x2, 0x492}}, {0x5, 0x1, 0xc, 0x7fff, 'smackfsfloor'}}, {{0x5, 0x3, 0x1, 0x19, 0x7f, 0x6, {0x6, 0x81, 0x0, 0x1c9415dd, 0x9, 0x20, 0x6, 0x20, 0x0, 0x6000, 0x1, r1, 0x0, 0x7}}, {0x0, 0x80000001, 0x0, 0xff}}, {{0x6, 0x0, 0x280, 0x2, 0x5, 0x2, {0x4, 0x3, 0xf89, 0x14bd9f87, 0x0, 0x7, 0x0, 0xe989, 0x9, 0x6000, 0x1000, r1, 0x0, 0x8, 0x2}}, {0xfffffffffffffffe, 0x80, 0x0, 0xffffffe0}}, {{0x4, 0x2, 0xfff, 0xffffffff, 0x8, 0xc0, {0x4, 0x678, 0xfffffffffffffff7, 0x10000, 0x5, 0x20008001, 0x5, 0x3, 0x71, 0xe000, 0x5, r1, 0x0, 0x80000001, 0xffffd7e6}}, {0x1, 0x5, 0xb, 0x5, '\\%}%\xb2*\xb3$:@/'}}, {{0x2, 0x1, 0x9, 0x1, 0x80000000, 0xfff, {0x0, 0x8, 0x8000000000000000, 0x400, 0x3, 0x4, 0x3, 0x6, 0x81, 0xa000, 0x6, r1, r4, 0x10001, 0x4}}, {0x5, 0x7, 0x1, 0x8001, ']'}}, {{0x5, 0x2, 0xffffffff, 0x2e3, 0xffff, 0x2, {0x2, 0x400, 0x80000000, 0x2, 0x8, 0x72a57d08, 0x2, 0x3f, 0xfffffffb, 0x8000, 0x5, r1, 0xee00, 0xffff, 0x5}}, {0x0, 0x3, 0x2, 0xff4b, 'fd'}}]}, 0x508) (async) [ 2080.004785] FAULT_INJECTION: forcing a failure. [ 2080.004785] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.042188] CPU: 1 PID: 27553 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2080.050098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2080.059627] Call Trace: [ 2080.062217] dump_stack+0x1b2/0x281 [ 2080.065847] should_fail.cold+0x10a/0x149 [ 2080.070085] should_failslab+0xd6/0x130 [ 2080.074062] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2080.079175] __kmalloc_node_track_caller+0x38/0x70 [ 2080.084114] __alloc_skb+0x96/0x510 [ 2080.087840] kobject_uevent_env+0x882/0xf30 [ 2080.092169] device_add+0xa47/0x15c0 [ 2080.095886] ? device_is_dependent+0x2a0/0x2a0 [ 2080.100465] ? kfree+0x1f0/0x250 08:20:13 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) ioctl$TIOCGPTPEER(r0, 0x5441, 0x9) (async, rerun: 64) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000000)=[0x78], 0x1, 0x0, 0x0, 0xffffffffffffffff}) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x1000, 0x1) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xc000, 0x400) [ 2080.103836] device_create_groups_vargs+0x1dc/0x250 [ 2080.108853] device_create_vargs+0x3a/0x50 [ 2080.113109] bdi_register_va.part.0+0x35/0x650 [ 2080.117699] bdi_register_va+0x63/0x80 [ 2080.121588] super_setup_bdi_name+0x123/0x220 [ 2080.126083] ? kill_block_super+0xe0/0xe0 [ 2080.130229] ? do_raw_spin_unlock+0x164/0x220 [ 2080.134737] fuse_fill_super+0x937/0x15c0 [ 2080.138883] ? fuse_get_root_inode+0xc0/0xc0 [ 2080.143288] ? up_write+0x17/0x60 [ 2080.146739] ? register_shrinker+0x15f/0x220 [ 2080.151143] ? sget_userns+0x768/0xc10 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x1000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) name_to_handle_at(r3, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x800, 0x5, 0x9, 0x280, 0x80, 0x7fff}}, &(0x7f0000000440), 0x1600) (async) mknodat$loop(r2, &(0x7f0000000380)='./file0\x00', 0x1000, 0x0) (async) r4 = fanotify_init(0x87e72f18753bdf8a, 0x800) (async) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) (async) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x6c, r7, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x2}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @loopback}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_to_team\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r7, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040080) (async) fanotify_mark(r4, 0x638, 0x1, r5, &(0x7f0000000240)='./file0\x00') 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 2080.155034] ? get_anon_bdev+0x1c0/0x1c0 [ 2080.159092] ? sget+0xd9/0x110 [ 2080.162282] ? fuse_get_root_inode+0xc0/0xc0 [ 2080.166687] mount_nodev+0x4c/0xf0 [ 2080.170223] mount_fs+0x92/0x2a0 [ 2080.173597] vfs_kern_mount.part.0+0x5b/0x470 [ 2080.178092] do_mount+0xe65/0x2a30 [ 2080.181635] ? copy_mount_string+0x40/0x40 [ 2080.185869] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2080.190881] ? copy_mnt_ns+0xa30/0xa30 [ 2080.194775] ? copy_mount_options+0x1fa/0x2f0 [ 2080.199273] ? copy_mnt_ns+0xa30/0xa30 [ 2080.203159] SyS_mount+0xa8/0x120 [ 2080.206611] ? copy_mnt_ns+0xa30/0xa30 [ 2080.210506] do_syscall_64+0x1d5/0x640 [ 2080.214397] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2080.219581] RIP: 0033:0x7f80d8a040c9 [ 2080.223289] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2080.231000] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2080.238260] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2080.245519] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:13 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 53) 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4, 0x1) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 64) r1 = geteuid() ioprio_set$uid(0x0, r1, 0x4007) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x81005, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffc00}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '^'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '!-['}}, {@pcr={'pcr', 0x3d, 0x3a}}]}}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\a\x00\x00\x00S<_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async, rerun: 64) read$FUSE(r0, &(0x7f00000003c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) read$FUSE(r0, &(0x7f0000002400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r2, &(0x7f0000004440)={0x508, 0x0, r3, [{{0x0, 0x1, 0x80000000, 0x0, 0x3f, 0x3, {0x3, 0x0, 0x2, 0x102, 0x639e8831, 0x0, 0x3800, 0x80000001, 0x67, 0x2000, 0xfffff800, r1, 0xee00, 0xffffffff, 0x2}}, {0x4, 0x0, 0x0, 0xce}}, {{0x1, 0x0, 0x2, 0x3, 0x9, 0x80000000, {0x4, 0xb6, 0x1f, 0x4, 0x27, 0x6, 0x1f, 0xa55, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x6, 0xfff}}, {0x6, 0xf5c, 0x7, 0x7, 'blksize'}}, {{0x2, 0x0, 0xffffffffffffffff, 0x6, 0x5, 0x3f, {0x1, 0x6, 0x5, 0x9, 0x4, 0x3, 0xd9, 0x800, 0x10001, 0xa000, 0x1f, r1, 0xee00, 0x2, 0x492}}, {0x5, 0x1, 0xc, 0x7fff, 'smackfsfloor'}}, {{0x5, 0x3, 0x1, 0x19, 0x7f, 0x6, {0x6, 0x81, 0x0, 0x1c9415dd, 0x9, 0x20, 0x6, 0x20, 0x0, 0x6000, 0x1, r1, 0x0, 0x7}}, {0x0, 0x80000001, 0x0, 0xff}}, {{0x6, 0x0, 0x280, 0x2, 0x5, 0x2, {0x4, 0x3, 0xf89, 0x14bd9f87, 0x0, 0x7, 0x0, 0xe989, 0x9, 0x6000, 0x1000, r1, 0x0, 0x8, 0x2}}, {0xfffffffffffffffe, 0x80, 0x0, 0xffffffe0}}, {{0x4, 0x2, 0xfff, 0xffffffff, 0x8, 0xc0, {0x4, 0x678, 0xfffffffffffffff7, 0x10000, 0x5, 0x20008001, 0x5, 0x3, 0x71, 0xe000, 0x5, r1, 0x0, 0x80000001, 0xffffd7e6}}, {0x1, 0x5, 0xb, 0x5, '\\%}%\xb2*\xb3$:@/'}}, {{0x2, 0x1, 0x9, 0x1, 0x80000000, 0xfff, {0x0, 0x8, 0x8000000000000000, 0x400, 0x3, 0x4, 0x3, 0x6, 0x81, 0xa000, 0x6, r1, r4, 0x10001, 0x4}}, {0x5, 0x7, 0x1, 0x8001, ']'}}, {{0x5, 0x2, 0xffffffff, 0x2e3, 0xffff, 0x2, {0x2, 0x400, 0x80000000, 0x2, 0x8, 0x72a57d08, 0x2, 0x3f, 0xfffffffb, 0x8000, 0x5, r1, 0xee00, 0xffff, 0x5}}, {0x0, 0x3, 0x2, 0xff4b, 'fd'}}]}, 0x508) 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:20:13 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x100}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) 08:20:13 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, r1, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40005}, 0x24000081) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r4) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r4, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r1, 0x200, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8d0}, 0x300008c0) fanotify_mark(r3, 0x10, 0x8000008, 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r5, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r6, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xc0000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r6, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x8000) (async) name_to_handle_at(r3, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000200), 0x1400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) [ 2080.252794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2080.260135] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:13 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d92f3fa175299e3dffb575838c88b07102abb60ba08fc9bf2e58482befa4d6491af4372ae6af0fa4d8e691f5600"/65, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x88000, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc8726f75705f69a43d9479cd30987f6f569a420d707d40d1f49b0e79c0e8670aa4a98f25acedddbd21cd6611d850b3a5c87f28f1a30ac3eeff319cfc4347b082d84c0dd90a2fc77b3330fc4d2200c65c0d58c9f090eea18eeab0be25ac2b1d8e4d4dd35c2c0847ce06e68a227da097382f51e2e6ce1fc1b8aff8134467abdbb086ab897e5ca371a7fc8a3c9fa7f5447f1d806551e5090e3a90ecab9f314c41bcab5cab1f02047a3172ea231d9cb753b6", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:20:13 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d92f3fa175299e3dffb575838c88b07102abb60ba08fc9bf2e58482befa4d6491af4372ae6af0fa4d8e691f5600"/65, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:13 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x1) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2080.417974] FAULT_INJECTION: forcing a failure. [ 2080.417974] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.438310] CPU: 1 PID: 27624 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2080.446220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2080.455592] Call Trace: [ 2080.458169] dump_stack+0x1b2/0x281 [ 2080.461782] should_fail.cold+0x10a/0x149 [ 2080.465908] should_failslab+0xd6/0x130 [ 2080.469880] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2080.474972] __kmalloc_node_track_caller+0x38/0x70 [ 2080.479889] __alloc_skb+0x96/0x510 [ 2080.483502] kobject_uevent_env+0x882/0xf30 [ 2080.487826] device_add+0xa47/0x15c0 [ 2080.491526] ? device_is_dependent+0x2a0/0x2a0 [ 2080.496086] ? kfree+0x1f0/0x250 [ 2080.499444] device_create_groups_vargs+0x1dc/0x250 [ 2080.504447] device_create_vargs+0x3a/0x50 [ 2080.508670] bdi_register_va.part.0+0x35/0x650 [ 2080.513241] bdi_register_va+0x63/0x80 [ 2080.517119] super_setup_bdi_name+0x123/0x220 [ 2080.521599] ? kill_block_super+0xe0/0xe0 [ 2080.525735] ? do_raw_spin_unlock+0x164/0x220 [ 2080.530219] fuse_fill_super+0x937/0x15c0 [ 2080.534356] ? fuse_get_root_inode+0xc0/0xc0 [ 2080.538769] ? up_write+0x17/0x60 [ 2080.542211] ? register_shrinker+0x15f/0x220 [ 2080.546600] ? sget_userns+0x768/0xc10 [ 2080.550473] ? get_anon_bdev+0x1c0/0x1c0 [ 2080.554513] ? sget+0xd9/0x110 [ 2080.557684] ? fuse_get_root_inode+0xc0/0xc0 [ 2080.562097] mount_nodev+0x4c/0xf0 [ 2080.565617] mount_fs+0x92/0x2a0 [ 2080.568973] vfs_kern_mount.part.0+0x5b/0x470 [ 2080.573455] do_mount+0xe65/0x2a30 [ 2080.576974] ? do_raw_spin_unlock+0x164/0x220 [ 2080.581462] ? copy_mount_string+0x40/0x40 [ 2080.585685] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2080.590680] ? copy_mnt_ns+0xa30/0xa30 [ 2080.594556] ? copy_mount_options+0x1fa/0x2f0 [ 2080.599043] ? copy_mnt_ns+0xa30/0xa30 [ 2080.602917] SyS_mount+0xa8/0x120 [ 2080.606348] ? copy_mnt_ns+0xa30/0xa30 [ 2080.610235] do_syscall_64+0x1d5/0x640 08:20:14 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 54) 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xdc0c298905e765b3, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x44, 0x0, 0x600, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7ff}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xc6f}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xfffb}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000001) 08:20:14 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x88000, 0x0) (async) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) (async) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc8726f75705f69a43d9479cd30987f6f569a420d707d40d1f49b0e79c0e8670aa4a98f25acedddbd21cd6611d850b3a5c87f28f1a30ac3eeff319cfc4347b082d84c0dd90a2fc77b3330fc4d2200c65c0d58c9f090eea18eeab0be25ac2b1d8e4d4dd35c2c0847ce06e68a227da097382f51e2e6ce1fc1b8aff8134467abdbb086ab897e5ca371a7fc8a3c9fa7f5447f1d806551e5090e3a90ecab9f314c41bcab5cab1f02047a3172ea231d9cb753b6", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:14 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x100}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x100}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) (async) 08:20:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d92f3fa175299e3dffb575838c88b07102abb60ba08fc9bf2e58482befa4d6491af4372ae6af0fa4d8e691f5600"/65, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:14 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="31f0241fc565502b618f9ff444c7ae1256ca46e67e850391db4a03d455bdce8c3040dd012ae5033283b9d03f0cda56c9b772ebcccc6955d54279e60c3c39fdb7a192c326f97b2e36a9a3569e16d76b96f8eb1462f4587f690f9e1700004aa31d250d897832098ce0ad9790fb8db0608905b358360395b46bdad8bd03fdd8bccd558da1314d4429bc4521df1c12e902a8c9f7c07547f3b284d7f29207fac31da59998cdc7791d60ebf0e2d0c7a4f9db0aa6d8782439833f68782bd7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x4000, 0x80, &(0x7f0000001340)) [ 2080.614121] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2080.619296] RIP: 0033:0x7f80d8a040c9 [ 2080.622993] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2080.630696] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2080.637948] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2080.645369] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2080.652664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2080.659916] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xdc0c298905e765b3, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x44, 0x0, 0x600, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7ff}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xc6f}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xfffb}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000001) 08:20:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2e00e123eabb3fe24acbdab7294a31b8c2788bc7ffbfac9e17831db95eb378e6cc4e490b50663e4aad99d7f97fce1bc2cd9827833832737f18e0f9810e230cf7e336ced9e980cc66cd8e6d3b693a57b6ef078a3b91ea7b97f6d752c2b6ae949c994e8ffb069fbe4161a1832d16f34749d99c2726058bb3cb654121684eaefbb1f518f9c9758ec0dd2c3de974abbe57665921e14a1715bef5c69b384c1c6e15de9b16f44b6f09c22560163387dcf8111814a747736d13a4557497c090218c8a1d379f803763d45b554cd309d9523d4c128508f796d13af4a5ea11993e0f0ae1a91fd8b76c3e32d97fab3a4d879df11c99879d9cc6896077"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x7f], 0x1, 0x0, 0x0, 0xffffffffffffffff}) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/164, 0xa4) 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0xdc0c298905e765b3, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x44, 0x0, 0x600, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xe5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x7ff}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x2}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xc6f}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0xfffb}]}, 0x44}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000001) 08:20:14 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x100}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x100}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}}) (async) 08:20:14 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="31f0241fc565502b618f9ff444c7ae1256ca46e67e850391db4a03d455bdce8c3040dd012ae5033283b9d03f0cda56c9b772ebcccc6955d54279e60c3c39fdb7a192c326f97b2e36a9a3569e16d76b96f8eb1462f4587f690f9e1700004aa31d250d897832098ce0ad9790fb8db0608905b358360395b46bdad8bd03fdd8bccd558da1314d4429bc4521df1c12e902a8c9f7c07547f3b284d7f29207fac31da59998cdc7791d60ebf0e2d0c7a4f9db0aa6d8782439833f68782bd7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x4000, 0x80, &(0x7f0000001340)) 08:20:14 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x88000, 0x0) (async) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cc8726f75705f69a43d9479cd30987f6f569a420d707d40d1f49b0e79c0e8670aa4a98f25acedddbd21cd6611d850b3a5c87f28f1a30ac3eeff319cfc4347b082d84c0dd90a2fc77b3330fc4d2200c65c0d58c9f090eea18eeab0be25ac2b1d8e4d4dd35c2c0847ce06e68a227da097382f51e2e6ce1fc1b8aff8134467abdbb086ab897e5ca371a7fc8a3c9fa7f5447f1d806551e5090e3a90ecab9f314c41bcab5cab1f02047a3172ea231d9cb753b6", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2080.780171] FAULT_INJECTION: forcing a failure. [ 2080.780171] name failslab, interval 1, probability 0, space 0, times 0 [ 2080.810190] CPU: 1 PID: 27659 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2080.818106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2080.827460] Call Trace: [ 2080.830053] dump_stack+0x1b2/0x281 [ 2080.833682] should_fail.cold+0x10a/0x149 [ 2080.837807] should_failslab+0xd6/0x130 [ 2080.841761] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2080.846405] ? kobj_ns_drop+0x80/0x80 [ 2080.850191] call_usermodehelper_setup+0x73/0x2e0 [ 2080.855033] kobject_uevent_env+0xc21/0xf30 [ 2080.859348] device_add+0xa47/0x15c0 [ 2080.863046] ? device_is_dependent+0x2a0/0x2a0 [ 2080.867600] ? kfree+0x1f0/0x250 [ 2080.870948] device_create_groups_vargs+0x1dc/0x250 [ 2080.875940] device_create_vargs+0x3a/0x50 [ 2080.880175] bdi_register_va.part.0+0x35/0x650 [ 2080.884742] bdi_register_va+0x63/0x80 [ 2080.888613] super_setup_bdi_name+0x123/0x220 [ 2080.893090] ? kill_block_super+0xe0/0xe0 [ 2080.897228] ? do_raw_spin_unlock+0x164/0x220 [ 2080.901701] fuse_fill_super+0x937/0x15c0 [ 2080.905824] ? fuse_get_root_inode+0xc0/0xc0 [ 2080.910216] ? up_write+0x17/0x60 [ 2080.913651] ? register_shrinker+0x15f/0x220 [ 2080.918036] ? sget_userns+0x768/0xc10 [ 2080.921902] ? get_anon_bdev+0x1c0/0x1c0 [ 2080.925966] ? sget+0xd9/0x110 [ 2080.929139] ? fuse_get_root_inode+0xc0/0xc0 [ 2080.933605] mount_nodev+0x4c/0xf0 [ 2080.937141] mount_fs+0x92/0x2a0 [ 2080.940503] vfs_kern_mount.part.0+0x5b/0x470 [ 2080.945005] do_mount+0xe65/0x2a30 [ 2080.948526] ? retint_kernel+0x2d/0x2d [ 2080.952387] ? copy_mount_string+0x40/0x40 [ 2080.956597] ? copy_mount_options+0x185/0x2f0 [ 2080.961079] ? copy_mount_options+0x19a/0x2f0 [ 2080.965569] ? copy_mount_options+0x1fa/0x2f0 [ 2080.970045] ? copy_mnt_ns+0xa30/0xa30 [ 2080.973950] SyS_mount+0xa8/0x120 [ 2080.977384] ? copy_mnt_ns+0xa30/0xa30 [ 2080.981249] do_syscall_64+0x1d5/0x640 [ 2080.985122] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2080.990292] RIP: 0033:0x7f80d8a040c9 [ 2080.993989] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2081.001674] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2081.008924] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2081.016175] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2081.023418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:20:14 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 55) 08:20:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2e00e123eabb3fe24acbdab7294a31b8c2788bc7ffbfac9e17831db95eb378e6cc4e490b50663e4aad99d7f97fce1bc2cd9827833832737f18e0f9810e230cf7e336ced9e980cc66cd8e6d3b693a57b6ef078a3b91ea7b97f6d752c2b6ae949c994e8ffb069fbe4161a1832d16f34749d99c2726058bb3cb654121684eaefbb1f518f9c9758ec0dd2c3de974abbe57665921e14a1715bef5c69b384c1c6e15de9b16f44b6f09c22560163387dcf8111814a747736d13a4557497c090218c8a1d379f803763d45b554cd309d9523d4c128508f796d13af4a5ea11993e0f0ae1a91fd8b76c3e32d97fab3a4d879df11c99879d9cc6896077"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x7f], 0x1, 0x0, 0x0, 0xffffffffffffffff}) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/164, 0xa4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2e00e123eabb3fe24acbdab7294a31b8c2788bc7ffbfac9e17831db95eb378e6cc4e490b50663e4aad99d7f97fce1bc2cd9827833832737f18e0f9810e230cf7e336ced9e980cc66cd8e6d3b693a57b6ef078a3b91ea7b97f6d752c2b6ae949c994e8ffb069fbe4161a1832d16f34749d99c2726058bb3cb654121684eaefbb1f518f9c9758ec0dd2c3de974abbe57665921e14a1715bef5c69b384c1c6e15de9b16f44b6f09c22560163387dcf8111814a747736d13a4557497c090218c8a1d379f803763d45b554cd309d9523d4c128508f796d13af4a5ea11993e0f0ae1a91fd8b76c3e32d97fab3a4d879df11c99879d9cc6896077"]) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x7f], 0x1}) (async) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/164, 0xa4) (async) 08:20:14 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="31f0241fc565502b618f9ff444c7ae1256ca46e67e850391db4a03d455bdce8c3040dd012ae5033283b9d03f0cda56c9b772ebcccc6955d54279e60c3c39fdb7a192c326f97b2e36a9a3569e16d76b96f8eb1462f4587f690f9e1700004aa31d250d897832098ce0ad9790fb8db0608905b358360395b46bdad8bd03fdd8bccd558da1314d4429bc4521df1c12e902a8c9f7c07547f3b284d7f29207fac31da59998cdc7791d60ebf0e2d0c7a4f9db0aa6d8782439833f68782bd7", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x4000, 0x80, &(0x7f0000001340)) 08:20:14 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000180)={@desc={0x1, 0x0, @auto="f49f4827ab418a9d"}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2081.030661] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:14 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x80000001, 0x10000, 0x5197, 0x7e, &(0x7f0000000180)=""/126, 0xee, &(0x7f0000000340)=""/238, 0xea, &(0x7f0000000440)=""/234}) r1 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x0, 0x0) syz_open_procfs$userns(r1, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x52d41d5b64c4cc0d, 0x36, 0x34, 0x32, 0x38, 0x32, 0x63], 0x2d, [0x31, 0x62, 0x64, 0x61], 0x2d, [0x38, 0x32, 0x61, 0x36], 0x2d, [0x62, 0x35, 0x35, 0x18], 0x2d, [0x34, 0x36, 0x0, 0x33, 0x33, 0x35, 0x61, 0x35]}}}, {@audit}, {@fsname={'fsname', 0x3d, '\\'}}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000002380)='./file0/../file0\x00', &(0x7f00000023c0), 0x18c00c, &(0x7f0000004440)={{}, 0x2c, {'rootmode', 0x3d, 0x65f5eb88309c09f3}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x706}}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@allow_other}], [{@flag='rw'}]}}) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004600)={0x23, 0x3, 0x0, {0x3, 0x2, 0x0, '*%'}}, 0x23) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004580), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f00000045c0)={0x23, 0x3, 0x0, {0x0, 0x2, 0x0, 'rw'}}, 0x23) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) write$FUSE_LSEEK(r5, &(0x7f0000004540)={0x18, 0x0, r2, {0x2e0a}}, 0x18) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000240)) 08:20:14 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2081.126841] FAULT_INJECTION: forcing a failure. [ 2081.126841] name failslab, interval 1, probability 0, space 0, times 0 [ 2081.163909] CPU: 1 PID: 27689 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x52d41d5b64c4cc0d, 0x36, 0x34, 0x32, 0x38, 0x32, 0x63], 0x2d, [0x31, 0x62, 0x64, 0x61], 0x2d, [0x38, 0x32, 0x61, 0x36], 0x2d, [0x62, 0x35, 0x35, 0x18], 0x2d, [0x34, 0x36, 0x0, 0x33, 0x33, 0x35, 0x61, 0x35]}}}, {@audit}, {@fsname={'fsname', 0x3d, '\\'}}]}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000002380)='./file0/../file0\x00', &(0x7f00000023c0), 0x18c00c, &(0x7f0000004440)={{}, 0x2c, {'rootmode', 0x3d, 0x65f5eb88309c09f3}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x706}}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@allow_other}], [{@flag='rw'}]}}) (async) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004600)={0x23, 0x3, 0x0, {0x3, 0x2, 0x0, '*%'}}, 0x23) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004580), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f00000045c0)={0x23, 0x3, 0x0, {0x0, 0x2, 0x0, 'rw'}}, 0x23) (async) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) (async) write$FUSE_LSEEK(r5, &(0x7f0000004540)={0x18, 0x0, r2, {0x2e0a}}, 0x18) (async) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000240)) 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x52d41d5b64c4cc0d, 0x36, 0x34, 0x32, 0x38, 0x32, 0x63], 0x2d, [0x31, 0x62, 0x64, 0x61], 0x2d, [0x38, 0x32, 0x61, 0x36], 0x2d, [0x62, 0x35, 0x35, 0x18], 0x2d, [0x34, 0x36, 0x0, 0x33, 0x33, 0x35, 0x61, 0x35]}}}, {@audit}, {@fsname={'fsname', 0x3d, '\\'}}]}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000002380)='./file0/../file0\x00', &(0x7f00000023c0), 0x18c00c, &(0x7f0000004440)={{}, 0x2c, {'rootmode', 0x3d, 0x65f5eb88309c09f3}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x706}}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@allow_other}], [{@flag='rw'}]}}) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004600)={0x23, 0x3, 0x0, {0x3, 0x2, 0x0, '*%'}}, 0x23) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004580), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f00000045c0)={0x23, 0x3, 0x0, {0x0, 0x2, 0x0, 'rw'}}, 0x23) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) write$FUSE_LSEEK(r5, &(0x7f0000004540)={0x18, 0x0, r2, {0x2e0a}}, 0x18) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000240)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020}, 0x2020) (async) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0x52d41d5b64c4cc0d, 0x36, 0x34, 0x32, 0x38, 0x32, 0x63], 0x2d, [0x31, 0x62, 0x64, 0x61], 0x2d, [0x38, 0x32, 0x61, 0x36], 0x2d, [0x62, 0x35, 0x35, 0x18], 0x2d, [0x34, 0x36, 0x0, 0x33, 0x33, 0x35, 0x61, 0x35]}}}, {@audit}, {@fsname={'fsname', 0x3d, '\\'}}]}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002400)={0x2020}, 0x2020) (async) mount$fuse(0x0, &(0x7f0000002380)='./file0/../file0\x00', &(0x7f00000023c0), 0x18c00c, &(0x7f0000004440)={{}, 0x2c, {'rootmode', 0x3d, 0x65f5eb88309c09f3}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x706}}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@allow_other}], [{@flag='rw'}]}}) (async) mknodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x4) (async) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000004600)={0x23, 0x3, 0x0, {0x3, 0x2, 0x0, '*%'}}, 0x23) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000004580), 0x2, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f00000045c0)={0x23, 0x3, 0x0, {0x0, 0x2, 0x0, 'rw'}}, 0x23) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r5) (async) write$FUSE_LSEEK(r5, &(0x7f0000004540)={0x18, 0x0, r2, {0x2e0a}}, 0x18) (async) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, &(0x7f0000000240)) (async) [ 2081.171818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2081.181169] Call Trace: [ 2081.183758] dump_stack+0x1b2/0x281 [ 2081.187391] should_fail.cold+0x10a/0x149 [ 2081.191549] should_failslab+0xd6/0x130 [ 2081.195532] kmem_cache_alloc+0x28e/0x3c0 [ 2081.199680] __d_alloc+0x2a/0xa20 [ 2081.203138] d_alloc+0x46/0x240 [ 2081.206416] __lookup_hash+0x101/0x270 [ 2081.210335] ? __inode_permission+0xcd/0x2f0 [ 2081.214744] lookup_one_len+0x279/0x3a0 [ 2081.218726] ? lookup_one_len_unlocked+0x410/0x410 [ 2081.223679] start_creating+0xb0/0x200 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0xa3880, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x24e7}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2081.227567] debugfs_create_dir+0x1f/0x420 [ 2081.231817] bdi_register_va.part.0+0x1ad/0x650 [ 2081.236494] bdi_register_va+0x63/0x80 [ 2081.240392] super_setup_bdi_name+0x123/0x220 [ 2081.244883] ? kill_block_super+0xe0/0xe0 [ 2081.249378] ? do_raw_spin_unlock+0x164/0x220 [ 2081.253961] fuse_fill_super+0x937/0x15c0 [ 2081.258105] ? fuse_get_root_inode+0xc0/0xc0 [ 2081.262506] ? up_write+0x17/0x60 [ 2081.265967] ? register_shrinker+0x15f/0x220 [ 2081.270373] ? sget_userns+0x768/0xc10 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0xa3880, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x24e7}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0xa3880, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x0) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x24e7}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2081.274268] ? get_anon_bdev+0x1c0/0x1c0 [ 2081.278321] ? sget+0xd9/0x110 [ 2081.281510] ? fuse_get_root_inode+0xc0/0xc0 [ 2081.285913] mount_nodev+0x4c/0xf0 [ 2081.289450] mount_fs+0x92/0x2a0 [ 2081.292817] vfs_kern_mount.part.0+0x5b/0x470 [ 2081.297313] do_mount+0xe65/0x2a30 [ 2081.300856] ? copy_mount_string+0x40/0x40 [ 2081.305087] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2081.310102] ? copy_mnt_ns+0xa30/0xa30 [ 2081.313988] ? copy_mount_options+0x1fa/0x2f0 [ 2081.318564] ? copy_mnt_ns+0xa30/0xa30 [ 2081.322455] SyS_mount+0xa8/0x120 [ 2081.325904] ? copy_mnt_ns+0xa30/0xa30 [ 2081.329804] do_syscall_64+0x1d5/0x640 [ 2081.333692] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2081.338877] RIP: 0033:0x7f80d8a040c9 [ 2081.342580] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2081.350283] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2081.357550] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2081.364810] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:14 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 56) 08:20:14 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2e00e123eabb3fe24acbdab7294a31b8c2788bc7ffbfac9e17831db95eb378e6cc4e490b50663e4aad99d7f97fce1bc2cd9827833832737f18e0f9810e230cf7e336ced9e980cc66cd8e6d3b693a57b6ef078a3b91ea7b97f6d752c2b6ae949c994e8ffb069fbe4161a1832d16f34749d99c2726058bb3cb654121684eaefbb1f518f9c9758ec0dd2c3de974abbe57665921e14a1715bef5c69b384c1c6e15de9b16f44b6f09c22560163387dcf8111814a747736d13a4557497c090218c8a1d379f803763d45b554cd309d9523d4c128508f796d13af4a5ea11993e0f0ae1a91fd8b76c3e32d97fab3a4d879df11c99879d9cc6896077"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000000)=[0x7f], 0x1, 0x0, 0x0, 0xffffffffffffffff}) readlinkat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=""/164, 0xa4) 08:20:14 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x200480, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0519d094d5bd15}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000010) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x80, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '+'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\\\{'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x33, 0x65, 0x33, 0x64, 0x32, 0x30, 0x62], 0x2d, [0x66, 0x32, 0x61, 0x36], 0x2d, [0x36, 0x36, 0x62, 0x64], 0x2d, [0x34, 0x1a, 0x66, 0x33], 0x2d, [0x32, 0x65, 0x34, 0x37, 0x31, 0x63, 0x33, 0x63]}}}, {@dont_measure}, {@dont_appraise}]}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) socketpair(0x15, 0x6, 0xca3, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7f}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe0}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4165}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x58}, 0x1, 0x0, 0x0, 0x28080}, 0x20080014) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:14 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000180)={@desc={0x1, 0x0, @auto="f49f4827ab418a9d"}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000180)={@desc={0x1, 0x0, @auto="f49f4827ab418a9d"}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:14 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x80000001, 0x10000, 0x5197, 0x7e, &(0x7f0000000180)=""/126, 0xee, &(0x7f0000000340)=""/238, 0xea, &(0x7f0000000440)=""/234}) (async, rerun: 32) r1 = getpgrp(0xffffffffffffffff) (rerun: 32) ptrace$getenv(0x4201, r1, 0x0, 0x0) syz_open_procfs$userns(r1, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:14 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2081.372060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2081.379320] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:15 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x80000001, 0x10000, 0x5197, 0x7e, &(0x7f0000000180)=""/126, 0xee, &(0x7f0000000340)=""/238, 0xea, &(0x7f0000000440)=""/234}) r1 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x0, 0x0) syz_open_procfs$userns(r1, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x80000001, 0x10000, 0x5197, 0x7e, &(0x7f0000000180)=""/126, 0xee, &(0x7f0000000340)=""/238, 0xea, &(0x7f0000000440)=""/234}) (async) getpgrp(0xffffffffffffffff) (async) ptrace$getenv(0x4201, r1, 0x0, 0x0) (async) syz_open_procfs$userns(r1, &(0x7f0000000080)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:15 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x20}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x95}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:15 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x200480, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0519d094d5bd15}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000010) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x80, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '+'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\\\{'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x33, 0x65, 0x33, 0x64, 0x32, 0x30, 0x62], 0x2d, [0x66, 0x32, 0x61, 0x36], 0x2d, [0x36, 0x36, 0x62, 0x64], 0x2d, [0x34, 0x1a, 0x66, 0x33], 0x2d, [0x32, 0x65, 0x34, 0x37, 0x31, 0x63, 0x33, 0x63]}}}, {@dont_measure}, {@dont_appraise}]}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) socketpair(0x15, 0x6, 0xca3, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7f}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe0}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4165}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x58}, 0x1, 0x0, 0x0, 0x28080}, 0x20080014) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x200480, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0519d094d5bd15}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000010) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x80, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '+'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\\\{'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x33, 0x65, 0x33, 0x64, 0x32, 0x30, 0x62], 0x2d, [0x66, 0x32, 0x61, 0x36], 0x2d, [0x36, 0x36, 0x62, 0x64], 0x2d, [0x34, 0x1a, 0x66, 0x33], 0x2d, [0x32, 0x65, 0x34, 0x37, 0x31, 0x63, 0x33, 0x63]}}}, {@dont_measure}, {@dont_appraise}]}}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) (async) socketpair(0x15, 0x6, 0xca3, &(0x7f0000000500)) (async) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7f}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe0}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4165}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x58}, 0x1, 0x0, 0x0, 0x28080}, 0x20080014) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:15 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000180)={@desc={0x1, 0x0, @auto="f49f4827ab418a9d"}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000180)={@desc={0x1, 0x0, @auto="f49f4827ab418a9d"}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) [ 2081.541027] FAULT_INJECTION: forcing a failure. [ 2081.541027] name failslab, interval 1, probability 0, space 0, times 0 [ 2081.578011] CPU: 0 PID: 27765 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2081.585918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2081.595263] Call Trace: [ 2081.597867] dump_stack+0x1b2/0x281 [ 2081.601497] should_fail.cold+0x10a/0x149 [ 2081.605649] should_failslab+0xd6/0x130 [ 2081.609628] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2081.614295] ? kobj_ns_drop+0x80/0x80 [ 2081.618095] call_usermodehelper_setup+0x73/0x2e0 [ 2081.622949] kobject_uevent_env+0xc21/0xf30 [ 2081.627274] device_add+0xa47/0x15c0 [ 2081.631010] ? device_is_dependent+0x2a0/0x2a0 [ 2081.635587] ? kfree+0x1f0/0x250 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x20}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x95}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2081.638956] device_create_groups_vargs+0x1dc/0x250 [ 2081.643971] device_create_vargs+0x3a/0x50 [ 2081.648208] bdi_register_va.part.0+0x35/0x650 [ 2081.652789] bdi_register_va+0x63/0x80 [ 2081.656673] super_setup_bdi_name+0x123/0x220 [ 2081.661165] ? kill_block_super+0xe0/0xe0 [ 2081.665318] ? do_raw_spin_unlock+0x164/0x220 [ 2081.669794] fuse_fill_super+0x937/0x15c0 [ 2081.673932] ? fuse_get_root_inode+0xc0/0xc0 [ 2081.678318] ? up_write+0x17/0x60 [ 2081.681747] ? register_shrinker+0x15f/0x220 [ 2081.686130] ? sget_userns+0x768/0xc10 [ 2081.690000] ? get_anon_bdev+0x1c0/0x1c0 [ 2081.694037] ? sget+0xd9/0x110 [ 2081.697201] ? fuse_get_root_inode+0xc0/0xc0 [ 2081.701585] mount_nodev+0x4c/0xf0 [ 2081.705114] mount_fs+0x92/0x2a0 [ 2081.708474] vfs_kern_mount.part.0+0x5b/0x470 [ 2081.714006] do_mount+0xe65/0x2a30 [ 2081.717539] ? do_raw_spin_unlock+0x164/0x220 [ 2081.722036] ? copy_mount_string+0x40/0x40 [ 2081.726248] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2081.731240] ? copy_mnt_ns+0xa30/0xa30 [ 2081.735107] ? copy_mount_options+0x1fa/0x2f0 [ 2081.739576] ? copy_mnt_ns+0xa30/0xa30 [ 2081.743459] SyS_mount+0xa8/0x120 [ 2081.746901] ? copy_mnt_ns+0xa30/0xa30 [ 2081.750766] do_syscall_64+0x1d5/0x640 [ 2081.754635] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2081.759799] RIP: 0033:0x7f80d8a040c9 [ 2081.763483] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2081.771181] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2081.778426] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2081.785671] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2081.792933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2081.800178] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:15 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 57) 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x20}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x95}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:15 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x200480, 0x0) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async, rerun: 64) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (rerun: 64) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0xe0519d094d5bd15}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x9}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000041}, 0x4000010) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x80, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {}, {@blksize={'blksize', 0x3d, 0x1200}}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '+'}}, {@appraise_type}, {@smackfsfloor={'smackfsfloor', 0x3d, '\\\\{'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x33, 0x65, 0x33, 0x64, 0x32, 0x30, 0x62], 0x2d, [0x66, 0x32, 0x61, 0x36], 0x2d, [0x36, 0x36, 0x62, 0x64], 0x2d, [0x34, 0x1a, 0x66, 0x33], 0x2d, [0x32, 0x65, 0x34, 0x37, 0x31, 0x63, 0x33, 0x63]}}}, {@dont_measure}, {@dont_appraise}]}}) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) socketpair(0x15, 0x6, 0xca3, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x58, r2, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast2}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x7f}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r4}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xe0}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x4165}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x58}, 0x1, 0x0, 0x0, 0x28080}, 0x20080014) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:15 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:15 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={0x0, 0x3}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x81], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000200)={@id={0x2, 0x0, @c}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:15 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:15 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @auto="faed6906c9a8f21d"}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="000000065d5ffb80faeea4fc4d79c72b55381596ad84bb5b627d6b99c26b7b3d4aa1eb011fd8cd7b404f510c743c4f80e5049deb2f3e2bf73530380cdbaef83e341f0c484a2760ec77b300615d31bc7e29aef3d9d5b20c646e024ca3f716d61e2e9a491c0d37ed74738799e528ebd7f2eadd00771080f74543043b0bf555e2bcbe015084398fb42765c46ef0e19c4aafe4c329663bad89a1275357457a7c1f42a6cc425cc0ca3bb643b39998592a69db23a9ab0bd503bc98a5e219a378fb150ce12abf19aec2798069", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2081.931773] FAULT_INJECTION: forcing a failure. [ 2081.931773] name failslab, interval 1, probability 0, space 0, times 0 08:20:15 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={0x0, 0x3}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x81], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000200)={@id={0x2, 0x0, @c}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={0x0, 0x3}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x81], 0x1, 0x80000}) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000200)={@id={0x2, 0x0, @c}}) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:15 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2081.986779] CPU: 1 PID: 27842 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2081.994692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2082.004038] Call Trace: [ 2082.006625] dump_stack+0x1b2/0x281 [ 2082.010251] should_fail.cold+0x10a/0x149 [ 2082.014397] should_failslab+0xd6/0x130 [ 2082.018372] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2082.023039] ? kobj_ns_drop+0x80/0x80 [ 2082.026931] call_usermodehelper_setup+0x73/0x2e0 [ 2082.031771] kobject_uevent_env+0xc21/0xf30 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="000000065d5ffb80faeea4fc4d79c72b55381596ad84bb5b627d6b99c26b7b3d4aa1eb011fd8cd7b404f510c743c4f80e5049deb2f3e2bf73530380cdbaef83e341f0c484a2760ec77b300615d31bc7e29aef3d9d5b20c646e024ca3f716d61e2e9a491c0d37ed74738799e528ebd7f2eadd00771080f74543043b0bf555e2bcbe015084398fb42765c46ef0e19c4aafe4c329663bad89a1275357457a7c1f42a6cc425cc0ca3bb643b39998592a69db23a9ab0bd503bc98a5e219a378fb150ce12abf19aec2798069", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="000000065d5ffb80faeea4fc4d79c72b55381596ad84bb5b627d6b99c26b7b3d4aa1eb011fd8cd7b404f510c743c4f80e5049deb2f3e2bf73530380cdbaef83e341f0c484a2760ec77b300615d31bc7e29aef3d9d5b20c646e024ca3f716d61e2e9a491c0d37ed74738799e528ebd7f2eadd00771080f74543043b0bf555e2bcbe015084398fb42765c46ef0e19c4aafe4c329663bad89a1275357457a7c1f42a6cc425cc0ca3bb643b39998592a69db23a9ab0bd503bc98a5e219a378fb150ce12abf19aec2798069", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2082.036093] device_add+0xa47/0x15c0 [ 2082.039884] ? device_is_dependent+0x2a0/0x2a0 [ 2082.044462] ? kfree+0x1f0/0x250 [ 2082.047827] device_create_groups_vargs+0x1dc/0x250 [ 2082.052925] device_create_vargs+0x3a/0x50 [ 2082.057240] bdi_register_va.part.0+0x35/0x650 [ 2082.061823] bdi_register_va+0x63/0x80 [ 2082.065706] super_setup_bdi_name+0x123/0x220 [ 2082.070199] ? kill_block_super+0xe0/0xe0 [ 2082.074343] ? do_raw_spin_unlock+0x164/0x220 [ 2082.078837] fuse_fill_super+0x937/0x15c0 [ 2082.082988] ? fuse_get_root_inode+0xc0/0xc0 [ 2082.087396] ? up_write+0x17/0x60 [ 2082.090840] ? register_shrinker+0x15f/0x220 [ 2082.095243] ? sget_userns+0x768/0xc10 [ 2082.099133] ? get_anon_bdev+0x1c0/0x1c0 [ 2082.103184] ? sget+0xd9/0x110 [ 2082.106373] ? fuse_get_root_inode+0xc0/0xc0 [ 2082.110784] mount_nodev+0x4c/0xf0 [ 2082.114320] mount_fs+0x92/0x2a0 [ 2082.117686] vfs_kern_mount.part.0+0x5b/0x470 [ 2082.122179] do_mount+0xe65/0x2a30 [ 2082.125731] ? do_raw_spin_unlock+0x164/0x220 [ 2082.130226] ? copy_mount_string+0x40/0x40 [ 2082.134461] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2082.139473] ? copy_mnt_ns+0xa30/0xa30 [ 2082.143352] ? copy_mount_options+0x1fa/0x2f0 [ 2082.147930] ? copy_mnt_ns+0xa30/0xa30 [ 2082.151798] SyS_mount+0xa8/0x120 [ 2082.155230] ? copy_mnt_ns+0xa30/0xa30 [ 2082.159104] do_syscall_64+0x1d5/0x640 [ 2082.162982] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2082.168149] RIP: 0033:0x7f80d8a040c9 [ 2082.171843] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2082.179547] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:15 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 58) 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f0000000000)=[0x7436, 0x1f, 0x5, 0x800, 0x6, 0x6], 0x6, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000200)={&(0x7f0000000140)="a887a0fbfaa42ff4c328bc1e14530c17a8ea35a8d79944b3017f3642f10aecb77d9babea8d2dd2987ee2532607372a2b81ce89de39bf5dbdc5972db00cdd675fcf32604fd228352858371b26bdea45caeffcd5c7ba2e8ded9261b6bc255597d8c6162df52834b2df0c5b8524a02cf904424799387212ceece3547659ac60ef50a5a00c136eb0b6c971ff5bf571e12719e16e25f4b29ec8e93e1daed788e067d9bf48ca6ade8db05d53d8d4cad50da59deabc40ebd3ba09e6442807fdb9f23c", 0xbf}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40000, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 08:20:15 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @auto="faed6906c9a8f21d"}}) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:15 executing program 1: ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000000)=[0x1, 0x8001, 0x17467a85, 0x5, 0x2ba, 0x8000, 0x8], &(0x7f0000000080)=[0x0], 0x7, 0x4, 0xfbfbfbfb}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/35}) syz_open_dev$dri(&(0x7f00000002c0), 0x80000000, 0x200400) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2082.186811] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2082.194062] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2082.201336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2082.208678] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f0000000000)=[0x7436, 0x1f, 0x5, 0x800, 0x6, 0x6], 0x6, 0x800, 0x0, 0xffffffffffffffff}) (rerun: 32) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000200)={&(0x7f0000000140)="a887a0fbfaa42ff4c328bc1e14530c17a8ea35a8d79944b3017f3642f10aecb77d9babea8d2dd2987ee2532607372a2b81ce89de39bf5dbdc5972db00cdd675fcf32604fd228352858371b26bdea45caeffcd5c7ba2e8ded9261b6bc255597d8c6162df52834b2df0c5b8524a02cf904424799387212ceece3547659ac60ef50a5a00c136eb0b6c971ff5bf571e12719e16e25f4b29ec8e93e1daed788e067d9bf48ca6ade8db05d53d8d4cad50da59deabc40ebd3ba09e6442807fdb9f23c", 0xbf}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40000, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 08:20:15 executing program 1: ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000000)=[0x1, 0x8001, 0x17467a85, 0x5, 0x2ba, 0x8000, 0x8], &(0x7f0000000080)=[0x0], 0x7, 0x4, 0xfbfbfbfb}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/35}) syz_open_dev$dri(&(0x7f00000002c0), 0x80000000, 0x200400) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000000)=[0x1, 0x8001, 0x17467a85, 0x5, 0x2ba, 0x8000, 0x8], &(0x7f0000000080)=[0x0], 0x7, 0x4, 0xfbfbfbfb}) (async) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/35}) (async) syz_open_dev$dri(&(0x7f00000002c0), 0x80000000, 0x200400) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000100)={&(0x7f0000000000)=[0x7436, 0x1f, 0x5, 0x800, 0x6, 0x6], 0x6, 0x800, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000200)={&(0x7f0000000140)="a887a0fbfaa42ff4c328bc1e14530c17a8ea35a8d79944b3017f3642f10aecb77d9babea8d2dd2987ee2532607372a2b81ce89de39bf5dbdc5972db00cdd675fcf32604fd228352858371b26bdea45caeffcd5c7ba2e8ded9261b6bc255597d8c6162df52834b2df0c5b8524a02cf904424799387212ceece3547659ac60ef50a5a00c136eb0b6c971ff5bf571e12719e16e25f4b29ec8e93e1daed788e067d9bf48ca6ade8db05d53d8d4cad50da59deabc40ebd3ba09e6442807fdb9f23c", 0xbf}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40000, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 08:20:15 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @auto="faed6906c9a8f21d"}}) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:15 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={0x0, 0x3}) (async, rerun: 64) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x81], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000200)={@id={0x2, 0x0, @c}}) (async, rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (rerun: 64) 08:20:15 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r1, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x800}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x40048021}, 0x10) 08:20:15 executing program 1: ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000000)=[0x1, 0x8001, 0x17467a85, 0x5, 0x2ba, 0x8000, 0x8], &(0x7f0000000080)=[0x0], 0x7, 0x4, 0xfbfbfbfb}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/35}) syz_open_dev$dri(&(0x7f00000002c0), 0x80000000, 0x200400) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000000c0)={&(0x7f0000000000)=[0x1, 0x8001, 0x17467a85, 0x5, 0x2ba, 0x8000, 0x8], &(0x7f0000000080)=[0x0], 0x7, 0x4, 0xfbfbfbfb}) (async) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000280)={0x0, &(0x7f0000000240)=""/35}) (async) syz_open_dev$dri(&(0x7f00000002c0), 0x80000000, 0x200400) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) [ 2082.336746] FAULT_INJECTION: forcing a failure. [ 2082.336746] name failslab, interval 1, probability 0, space 0, times 0 08:20:15 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000022c0)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c906f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000180)={0x20, 0x0, r1, {0x40, 0x0, 0x3, 0x7fff}}, 0x20) [ 2082.394237] CPU: 1 PID: 27890 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2082.402146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2082.411496] Call Trace: [ 2082.414083] dump_stack+0x1b2/0x281 [ 2082.417717] should_fail.cold+0x10a/0x149 [ 2082.421866] should_failslab+0xd6/0x130 [ 2082.425837] kmem_cache_alloc+0x28e/0x3c0 [ 2082.429984] __d_alloc+0x2a/0xa20 [ 2082.433435] ? d_lookup+0x172/0x220 [ 2082.437063] d_alloc+0x46/0x240 [ 2082.440339] __lookup_hash+0x101/0x270 [ 2082.444221] ? __inode_permission+0xcd/0x2f0 [ 2082.448628] lookup_one_len+0x279/0x3a0 [ 2082.452598] ? lookup_one_len_unlocked+0x410/0x410 [ 2082.457525] start_creating+0xb0/0x200 [ 2082.461410] __debugfs_create_file+0x4f/0x440 [ 2082.465904] ? debugfs_create_file+0x37/0x60 [ 2082.470311] bdi_register_va.part.0+0x1f4/0x650 [ 2082.474985] bdi_register_va+0x63/0x80 [ 2082.478872] super_setup_bdi_name+0x123/0x220 [ 2082.483365] ? kill_block_super+0xe0/0xe0 [ 2082.487503] ? do_raw_spin_unlock+0x164/0x220 [ 2082.491976] fuse_fill_super+0x937/0x15c0 [ 2082.496101] ? fuse_get_root_inode+0xc0/0xc0 [ 2082.500488] ? up_write+0x17/0x60 [ 2082.503914] ? register_shrinker+0x15f/0x220 [ 2082.508393] ? sget_userns+0x768/0xc10 [ 2082.512275] ? get_anon_bdev+0x1c0/0x1c0 [ 2082.516327] ? sget+0xd9/0x110 [ 2082.519499] ? fuse_get_root_inode+0xc0/0xc0 [ 2082.523917] mount_nodev+0x4c/0xf0 [ 2082.527432] mount_fs+0x92/0x2a0 [ 2082.530776] vfs_kern_mount.part.0+0x5b/0x470 [ 2082.535246] do_mount+0xe65/0x2a30 [ 2082.538855] ? copy_mount_string+0x40/0x40 [ 2082.543083] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2082.548104] ? copy_mnt_ns+0xa30/0xa30 [ 2082.551974] ? copy_mount_options+0x1fa/0x2f0 [ 2082.556446] ? copy_mnt_ns+0xa30/0xa30 [ 2082.560312] SyS_mount+0xa8/0x120 [ 2082.563743] ? copy_mnt_ns+0xa30/0xa30 [ 2082.567608] do_syscall_64+0x1d5/0x640 [ 2082.571477] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2082.576642] RIP: 0033:0x7f80d8a040c9 [ 2082.580335] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2082.588021] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:16 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 59) 08:20:16 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000001d480d14a7f2a4cc3e50e7c9882d76af5e9218bc186364859de6bc6d61c005f266e0616a889da70422a4d06ced0e50e81e7cc468429e0b20bfdb864ebcee206ad4b477d21db7addeb0d67178eba3bebe4d379033404ecca5f1024e6b5d97ea75949707a0833b9ce2274450836e906be38323c412d24e2dd49aada6f535f13861be5b39cb7980f94dc253facc8e3de548bb4eccc10ab0eb67f8548a5ce32819c154902884c028063e3c2d6f39f0136a874ac"]) 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000)=0x6, 0x4) 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000022c0)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c906f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000180)={0x20, 0x0, r1, {0x40, 0x0, 0x3, 0x7fff}}, 0x20) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000022c0)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c906f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_IOCTL(r2, &(0x7f0000000180)={0x20, 0x0, r1, {0x40, 0x0, 0x3, 0x7fff}}, 0x20) (async) 08:20:16 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r1, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x800}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x40048021}, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) (async) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r1, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x800}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x40048021}, 0x10) (async) [ 2082.595265] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2082.602508] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2082.609751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2082.617006] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f00000022c0)) (async, rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c906f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 32) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000180)={0x20, 0x0, r1, {0x40, 0x0, 0x3, 0x7fff}}, 0x20) 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async, rerun: 32) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) (async, rerun: 32) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000)=0x6, 0x4) [ 2082.747893] FAULT_INJECTION: forcing a failure. [ 2082.747893] name failslab, interval 1, probability 0, space 0, times 0 [ 2082.771200] CPU: 0 PID: 27965 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2082.779100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2082.788446] Call Trace: [ 2082.791031] dump_stack+0x1b2/0x281 [ 2082.794661] should_fail.cold+0x10a/0x149 [ 2082.798806] should_failslab+0xd6/0x130 [ 2082.802779] kmem_cache_alloc+0x28e/0x3c0 [ 2082.806927] alloc_inode+0xa0/0x170 [ 2082.810552] new_inode+0x1d/0xf0 [ 2082.813918] debugfs_get_inode+0x1a/0x130 [ 2082.818064] debugfs_create_dir+0x63/0x420 [ 2082.822302] bdi_register_va.part.0+0x1ad/0x650 [ 2082.826970] bdi_register_va+0x63/0x80 [ 2082.830855] super_setup_bdi_name+0x123/0x220 [ 2082.835348] ? kill_block_super+0xe0/0xe0 [ 2082.839498] ? do_raw_spin_unlock+0x164/0x220 [ 2082.843995] fuse_fill_super+0x937/0x15c0 08:20:16 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x218202, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x140002, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x4dd742e3}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '*'}}, {@subj_type={'subj_type', 0x3d, 'fd'}}, {@smackfshat={'smackfshat', 0x3d, '^'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit}]}}) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') [ 2082.848139] ? fuse_get_root_inode+0xc0/0xc0 [ 2082.852536] ? up_write+0x17/0x60 [ 2082.855978] ? register_shrinker+0x15f/0x220 [ 2082.860377] ? sget_userns+0x768/0xc10 [ 2082.864265] ? get_anon_bdev+0x1c0/0x1c0 [ 2082.868307] ? sget+0xd9/0x110 [ 2082.871493] ? fuse_get_root_inode+0xc0/0xc0 [ 2082.875895] mount_nodev+0x4c/0xf0 [ 2082.879431] mount_fs+0x92/0x2a0 [ 2082.882796] vfs_kern_mount.part.0+0x5b/0x470 [ 2082.887284] do_mount+0xe65/0x2a30 [ 2082.890817] ? do_raw_spin_unlock+0x164/0x220 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67896f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async, rerun: 32) syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) (rerun: 32) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000)=0x6, 0x4) [ 2082.895311] ? copy_mount_string+0x40/0x40 [ 2082.899544] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2082.904557] ? copy_mnt_ns+0xa30/0xa30 [ 2082.908443] ? copy_mount_options+0x1fa/0x2f0 [ 2082.912935] ? copy_mnt_ns+0xa30/0xa30 [ 2082.916819] SyS_mount+0xa8/0x120 [ 2082.920268] ? copy_mnt_ns+0xa30/0xa30 [ 2082.924154] do_syscall_64+0x1d5/0x640 [ 2082.928041] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2082.933223] RIP: 0033:0x7f80d8a040c9 [ 2082.936924] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67896f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67896f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:20:16 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000001d480d14a7f2a4cc3e50e7c9882d76af5e9218bc186364859de6bc6d61c005f266e0616a889da70422a4d06ced0e50e81e7cc468429e0b20bfdb864ebcee206ad4b477d21db7addeb0d67178eba3bebe4d379033404ecca5f1024e6b5d97ea75949707a0833b9ce2274450836e906be38323c412d24e2dd49aada6f535f13861be5b39cb7980f94dc253facc8e3de548bb4eccc10ab0eb67f8548a5ce32819c154902884c028063e3c2d6f39f0136a874ac"]) [ 2082.944632] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2082.951904] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2082.959165] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2082.966425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2082.974038] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:16 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 60) 08:20:16 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f0000000340), 0xffffffffffffffff) (async) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) (async) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r1, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x800}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x40048021}, 0x10) 08:20:16 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async, rerun: 64) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x218202, 0x0) (rerun: 64) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async, rerun: 32) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x140002, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x4dd742e3}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '*'}}, {@subj_type={'subj_type', 0x3d, 'fd'}}, {@smackfshat={'smackfshat', 0x3d, '^'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit}]}}) (rerun: 32) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67896f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:16 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000001d480d14a7f2a4cc3e50e7c9882d76af5e9218bc186364859de6bc6d61c005f266e0616a889da70422a4d06ced0e50e81e7cc468429e0b20bfdb864ebcee206ad4b477d21db7addeb0d67178eba3bebe4d379033404ecca5f1024e6b5d97ea75949707a0833b9ce2274450836e906be38323c412d24e2dd49aada6f535f13861be5b39cb7980f94dc253facc8e3de548bb4eccc10ab0eb67f8548a5ce32819c154902884c028063e3c2d6f39f0136a874ac"]) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="000001d480d14a7f2a4cc3e50e7c9882d76af5e9218bc186364859de6bc6d61c005f266e0616a889da70422a4d06ced0e50e81e7cc468429e0b20bfdb864ebcee206ad4b477d21db7addeb0d67178eba3bebe4d379033404ecca5f1024e6b5d97ea75949707a0833b9ce2274450836e906be38323c412d24e2dd49aada6f535f13861be5b39cb7980f94dc253facc8e3de548bb4eccc10ab0eb67f8548a5ce32819c154902884c028063e3c2d6f39f0136a874ac"]) (async) 08:20:16 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1003061, &(0x7f0000001340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1600}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@euid_eq}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, '^+\xac&-(\''}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x2, 0x7ff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESOCT, @ANYRES16=r2, @ANYRESDEC=0x0, @ANYRES64=r3]) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) write$FUSE_DIRENT(r5, &(0x7f00000022c0)=ANY=[@ANYBLOB="751a881fbf9c8b64cfede1435852cb84a789180c22e5888fd4247052dc616f01df50a1466af3f05b775061cd3d3ed0d7608a091d71a68034230ecaa68fd2bd6dc0247456bdf1f51a53b31e2671ec5b78a66eb1e25f5528ad1655ccd468d7ac2893b56e27d6932e653df595104d2ca86db6f99fea9edffb34d48e86c12a62e6c56baa6196093906c5922859f07de70dec1b8f282884db03e501e7a097d147bbccefe30420d1e95f279952fd05eac2bda86c9e0a0fbf", @ANYRESDEC=r6], 0x40) 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2083.145756] FAULT_INJECTION: forcing a failure. [ 2083.145756] name failslab, interval 1, probability 0, space 0, times 0 08:20:16 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x2, 0x7ff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESOCT, @ANYRES16=r2, @ANYRESDEC=0x0, @ANYRES64=r3]) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) write$FUSE_DIRENT(r5, &(0x7f00000022c0)=ANY=[@ANYBLOB="751a881fbf9c8b64cfede1435852cb84a789180c22e5888fd4247052dc616f01df50a1466af3f05b775061cd3d3ed0d7608a091d71a68034230ecaa68fd2bd6dc0247456bdf1f51a53b31e2671ec5b78a66eb1e25f5528ad1655ccd468d7ac2893b56e27d6932e653df595104d2ca86db6f99fea9edffb34d48e86c12a62e6c56baa6196093906c5922859f07de70dec1b8f282884db03e501e7a097d147bbccefe30420d1e95f279952fd05eac2bda86c9e0a0fbf", @ANYRESDEC=r6], 0x40) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x2, 0x7ff) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESOCT, @ANYRES16=r2, @ANYRESDEC=0x0, @ANYRES64=r3]) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) (async) write$FUSE_DIRENT(r5, &(0x7f00000022c0)=ANY=[@ANYBLOB="751a881fbf9c8b64cfede1435852cb84a789180c22e5888fd4247052dc616f01df50a1466af3f05b775061cd3d3ed0d7608a091d71a68034230ecaa68fd2bd6dc0247456bdf1f51a53b31e2671ec5b78a66eb1e25f5528ad1655ccd468d7ac2893b56e27d6932e653df595104d2ca86db6f99fea9edffb34d48e86c12a62e6c56baa6196093906c5922859f07de70dec1b8f282884db03e501e7a097d147bbccefe30420d1e95f279952fd05eac2bda86c9e0a0fbf", @ANYRESDEC=r6], 0x40) (async) [ 2083.190808] CPU: 0 PID: 28019 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2083.198713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2083.208060] Call Trace: [ 2083.210646] dump_stack+0x1b2/0x281 [ 2083.214443] should_fail.cold+0x10a/0x149 [ 2083.218598] should_failslab+0xd6/0x130 [ 2083.222574] kmem_cache_alloc+0x28e/0x3c0 [ 2083.226724] alloc_inode+0xa0/0x170 [ 2083.230351] new_inode+0x1d/0xf0 [ 2083.233714] debugfs_get_inode+0x1a/0x130 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) (async, rerun: 64) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (rerun: 64) [ 2083.237862] debugfs_create_dir+0x63/0x420 [ 2083.242095] bdi_register_va.part.0+0x1ad/0x650 [ 2083.246768] bdi_register_va+0x63/0x80 [ 2083.250665] super_setup_bdi_name+0x123/0x220 [ 2083.255153] ? kill_block_super+0xe0/0xe0 [ 2083.259296] ? do_raw_spin_unlock+0x164/0x220 [ 2083.263790] fuse_fill_super+0x937/0x15c0 [ 2083.267938] ? fuse_get_root_inode+0xc0/0xc0 [ 2083.272345] ? up_write+0x17/0x60 [ 2083.275798] ? register_shrinker+0x15f/0x220 [ 2083.280199] ? sget_userns+0x768/0xc10 [ 2083.284088] ? get_anon_bdev+0x1c0/0x1c0 [ 2083.288226] ? sget+0xd9/0x110 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000000)=[0x3f, 0xffffff01, 0x3f, 0x80, 0x3, 0xfe, 0x6, 0x2], 0x8, 0x80000, 0x0, 0xffffffffffffffff}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) renameat2(r0, &(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x1) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000080)=""/90) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) statx(r2, &(0x7f0000000300)='./file0\x00', 0x100, 0x4, &(0x7f0000000140)) [ 2083.291410] ? fuse_get_root_inode+0xc0/0xc0 [ 2083.295814] mount_nodev+0x4c/0xf0 [ 2083.299347] mount_fs+0x92/0x2a0 [ 2083.302711] vfs_kern_mount.part.0+0x5b/0x470 [ 2083.307202] do_mount+0xe65/0x2a30 [ 2083.310738] ? do_raw_spin_unlock+0x164/0x220 [ 2083.315240] ? copy_mount_string+0x40/0x40 [ 2083.319474] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2083.324486] ? copy_mnt_ns+0xa30/0xa30 [ 2083.328372] ? copy_mount_options+0x1fa/0x2f0 [ 2083.332908] ? copy_mnt_ns+0xa30/0xa30 [ 2083.336795] SyS_mount+0xa8/0x120 [ 2083.340244] ? copy_mnt_ns+0xa30/0xa30 [ 2083.344127] do_syscall_64+0x1d5/0x640 [ 2083.348013] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2083.353197] RIP: 0033:0x7f80d8a040c9 [ 2083.356898] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2083.364599] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2083.371863] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2083.379111] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:16 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 61) 08:20:16 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000000)=[0x3f, 0xffffff01, 0x3f, 0x80, 0x3, 0xfe, 0x6, 0x2], 0x8, 0x80000, 0x0, 0xffffffffffffffff}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async, rerun: 64) renameat2(r0, &(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x1) (async, rerun: 64) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000080)=""/90) (async, rerun: 64) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 64) statx(r2, &(0x7f0000000300)='./file0\x00', 0x100, 0x4, &(0x7f0000000140)) [ 2083.386360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.393627] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2083.480799] FAULT_INJECTION: forcing a failure. [ 2083.480799] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.497898] CPU: 1 PID: 28083 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2083.505806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2083.515153] Call Trace: [ 2083.517744] dump_stack+0x1b2/0x281 [ 2083.521371] should_fail.cold+0x10a/0x149 [ 2083.525521] should_failslab+0xd6/0x130 [ 2083.529494] kmem_cache_alloc+0x28e/0x3c0 [ 2083.533641] alloc_inode+0xa0/0x170 [ 2083.537265] new_inode+0x1d/0xf0 [ 2083.540628] debugfs_get_inode+0x1a/0x130 [ 2083.544773] __debugfs_create_file+0x93/0x440 [ 2083.549262] ? debugfs_create_file+0x37/0x60 [ 2083.553669] bdi_register_va.part.0+0x1f4/0x650 [ 2083.558329] bdi_register_va+0x63/0x80 [ 2083.562194] super_setup_bdi_name+0x123/0x220 [ 2083.566680] ? kill_block_super+0xe0/0xe0 [ 2083.570819] ? do_raw_spin_unlock+0x164/0x220 [ 2083.575327] fuse_fill_super+0x937/0x15c0 [ 2083.579453] ? fuse_get_root_inode+0xc0/0xc0 [ 2083.583839] ? up_write+0x17/0x60 [ 2083.587267] ? register_shrinker+0x15f/0x220 [ 2083.591664] ? sget_userns+0x768/0xc10 [ 2083.595885] ? get_anon_bdev+0x1c0/0x1c0 [ 2083.599923] ? sget+0xd9/0x110 [ 2083.603094] ? fuse_get_root_inode+0xc0/0xc0 [ 2083.607476] mount_nodev+0x4c/0xf0 [ 2083.610998] mount_fs+0x92/0x2a0 [ 2083.614354] vfs_kern_mount.part.0+0x5b/0x470 [ 2083.618827] do_mount+0xe65/0x2a30 [ 2083.622345] ? do_raw_spin_unlock+0x164/0x220 [ 2083.627013] ? copy_mount_string+0x40/0x40 [ 2083.631233] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2083.636232] ? copy_mnt_ns+0xa30/0xa30 [ 2083.640097] ? copy_mount_options+0x1fa/0x2f0 [ 2083.644566] ? copy_mnt_ns+0xa30/0xa30 [ 2083.648435] SyS_mount+0xa8/0x120 [ 2083.651879] ? copy_mnt_ns+0xa30/0xa30 [ 2083.655759] do_syscall_64+0x1d5/0x640 [ 2083.659635] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2083.664812] RIP: 0033:0x7f80d8a040c9 [ 2083.668501] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2083.676193] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2083.683612] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2083.690864] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2083.698116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.705360] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:17 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0), 0x218202, 0x0) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x140002, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x4dd742e3}}, {@default_permissions}], [{@smackfsfloor={'smackfsfloor', 0x3d, '*'}}, {@subj_type={'subj_type', 0x3d, 'fd'}}, {@smackfshat={'smackfshat', 0x3d, '^'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit}]}}) (async) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') 08:20:17 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) mknodat(r1, &(0x7f0000000100)='./file0\x00', 0x2, 0x7ff) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r3) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESOCT, @ANYRES16=r2, @ANYRESDEC=0x0, @ANYRES64=r3]) (async) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r6) (async) write$FUSE_DIRENT(r5, &(0x7f00000022c0)=ANY=[@ANYBLOB="751a881fbf9c8b64cfede1435852cb84a789180c22e5888fd4247052dc616f01df50a1466af3f05b775061cd3d3ed0d7608a091d71a68034230ecaa68fd2bd6dc0247456bdf1f51a53b31e2671ec5b78a66eb1e25f5528ad1655ccd468d7ac2893b56e27d6932e653df595104d2ca86db6f99fea9edffb34d48e86c12a62e6c56baa6196093906c5922859f07de70dec1b8f282884db03e501e7a097d147bbccefe30420d1e95f279952fd05eac2bda86c9e0a0fbf", @ANYRESDEC=r6], 0x40) 08:20:17 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) (async, rerun: 64) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) (async, rerun: 64) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 64) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async, rerun: 64) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1003061, &(0x7f0000001340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1600}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@euid_eq}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, '^+\xac&-(\''}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) 08:20:17 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000004c0)=0x3) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) mknodat(r0, &(0x7f0000000680)='./file0\x00', 0x2, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x101, 0x2, 0x800, 0x8], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r2) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=ANY=[@ANYBLOB='< \x00\x00', @ANYRES16=r6, @ANYBLOB="010027bd7000fddbdf2504000000050012000900000008000c0003000000050006000700000006000300fc010000080019007f000001"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r4, 0xeef43000905ea448, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xc}}]}, 0x68}, 0x1, 0x0, 0x0, 0x14040000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x2c, 0x80805, 0x562, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r9, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r10, 0x1}, 0x14}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r8, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r10, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r11}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r7) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r12, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r12) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0xc0408, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d965191df0b022e0d0283abe2c4a2697048ab64f6aefdb32dd8f7dd3aadd6eb3ea820a9a6225752d54add7a3c318c601a333d76d98ca635eca9b5a3263c9df9442387f6cf891f9bdef8f77c5c647dd232c5e5da732af37f5d95b0", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000\x0000000000000100000,user_id=', @ANYRES8=r2, @ANYBLOB="2c67b0d7a983ea8e586b78c7", @ANYRESHEX=r12, @ANYRES32=r12]) 08:20:17 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f0000000000)=[0x3f, 0xffffff01, 0x3f, 0x80, 0x3, 0xfe, 0x6, 0x2], 0x8, 0x80000, 0x0, 0xffffffffffffffff}) (rerun: 32) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) renameat2(r0, &(0x7f0000000280)='./file0\x00', r1, &(0x7f00000002c0)='./file0\x00', 0x1) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000080)=""/90) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) statx(r2, &(0x7f0000000300)='./file0\x00', 0x100, 0x4, &(0x7f0000000140)) 08:20:17 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 62) 08:20:17 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6b74036f64653d3030300000e0be3030303000000000c03f0000bea5cecd2c757365725f69643d2c1470a5015a4aed0109d8a61228b5c470", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:17 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000004c0)=0x3) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat(r0, &(0x7f0000000680)='./file0\x00', 0x2, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x101, 0x2, 0x800, 0x8], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) (async) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r2) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=ANY=[@ANYBLOB='< \x00\x00', @ANYRES16=r6, @ANYBLOB="010027bd7000fddbdf2504000000050012000900000008000c0003000000050006000700000006000300fc010000080019007f000001"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r4, 0xeef43000905ea448, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xc}}]}, 0x68}, 0x1, 0x0, 0x0, 0x14040000}, 0x0) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x2c, 0x80805, 0x562, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r9, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r10, 0x1}, 0x14}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r8, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r10, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r11}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r7) (async) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r12, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r12) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0xc0408, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d965191df0b022e0d0283abe2c4a2697048ab64f6aefdb32dd8f7dd3aadd6eb3ea820a9a6225752d54add7a3c318c601a333d76d98ca635eca9b5a3263c9df9442387f6cf891f9bdef8f77c5c647dd232c5e5da732af37f5d95b0", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000\x0000000000000100000,user_id=', @ANYRES8=r2, @ANYBLOB="2c67b0d7a983ea8e586b78c7", @ANYRESHEX=r12, @ANYRES32=r12]) 08:20:17 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6b74036f64653d3030300000e0be3030303000000000c03f0000bea5cecd2c757365725f69643d2c1470a5015a4aed0109d8a61228b5c470", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:17 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000004c0)=0x3) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) mknodat(r0, &(0x7f0000000680)='./file0\x00', 0x2, 0x2) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x101, 0x2, 0x800, 0x8], 0x4, 0x80000, 0x0, 0xffffffffffffffff}) (async, rerun: 64) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r2) (async, rerun: 64) socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)=ANY=[@ANYBLOB='< \x00\x00', @ANYRES16=r6, @ANYBLOB="010027bd7000fddbdf2504000000050012000900000008000c0003000000050006000700000006000300fc010000080019007f000001"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r4, 0xeef43000905ea448, 0x70bd29, 0x25dfdbfc, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x2}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @dev={0xac, 0x14, 0x14, 0xc}}]}, 0x68}, 0x1, 0x0, 0x0, 0x14040000}, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) r7 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x2c, 0x80805, 0x562, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) (async) r10 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r9, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r10, 0x1}, 0x14}}, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r8, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, r10, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r11}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r7) (async, rerun: 64) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r7, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) (async, rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r12, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r12) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0xc0408, &(0x7f0000000180)=ANY=[@ANYBLOB="66643d965191df0b022e0d0283abe2c4a2697048ab64f6aefdb32dd8f7dd3aadd6eb3ea820a9a6225752d54add7a3c318c601a333d76d98ca635eca9b5a3263c9df9442387f6cf891f9bdef8f77c5c647dd232c5e5da732af37f5d95b0", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000\x0000000000000100000,user_id=', @ANYRES8=r2, @ANYBLOB="2c67b0d7a983ea8e586b78c7", @ANYRESHEX=r12, @ANYRES32=r12]) 08:20:17 executing program 2: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x54, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xa69d45d}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:20:17 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=""/4096, 0x1000) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x1003061, &(0x7f0000001340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1600}}, {@default_permissions}, {@allow_other}, {@allow_other}], [{@euid_eq}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@obj_type={'obj_type', 0x3d, '^+\xac&-(\''}}, {@obj_user={'obj_user', 0x3d, '/dev/fuse\x00'}}]}}) 08:20:17 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:17 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6b74036f64653d3030300000e0be3030303000000000c03f0000bea5cecd2c757365725f69643d2c1470a5015a4aed0109d8a61228b5c470", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2084.050024] FAULT_INJECTION: forcing a failure. [ 2084.050024] name failslab, interval 1, probability 0, space 0, times 0 [ 2084.083983] CPU: 0 PID: 28237 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:17 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2084.091927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2084.101280] Call Trace: [ 2084.103867] dump_stack+0x1b2/0x281 [ 2084.107504] should_fail.cold+0x10a/0x149 [ 2084.111657] should_failslab+0xd6/0x130 [ 2084.115627] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2084.120294] fuse_dentry_init+0x40/0xa0 [ 2084.124267] ? fuse_dentry_release+0x40/0x40 [ 2084.128672] __d_alloc+0x5cf/0xa20 [ 2084.132300] d_make_root+0x3e/0xc0 [ 2084.135846] fuse_fill_super+0xc49/0x15c0 [ 2084.139989] ? fuse_get_root_inode+0xc0/0xc0 [ 2084.144401] ? up_write+0x17/0x60 08:20:17 executing program 5: socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:17 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) [ 2084.147941] ? register_shrinker+0x15f/0x220 [ 2084.152347] ? sget_userns+0x768/0xc10 [ 2084.156235] ? get_anon_bdev+0x1c0/0x1c0 [ 2084.160290] ? sget+0xd9/0x110 [ 2084.163474] ? fuse_get_root_inode+0xc0/0xc0 [ 2084.167881] mount_nodev+0x4c/0xf0 [ 2084.171414] mount_fs+0x92/0x2a0 [ 2084.174782] vfs_kern_mount.part.0+0x5b/0x470 [ 2084.179275] do_mount+0xe65/0x2a30 [ 2084.182813] ? copy_mount_string+0x40/0x40 [ 2084.187043] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2084.192055] ? copy_mnt_ns+0xa30/0xa30 [ 2084.195939] ? copy_mount_options+0x1fa/0x2f0 [ 2084.200444] ? copy_mnt_ns+0xa30/0xa30 [ 2084.204331] SyS_mount+0xa8/0x120 [ 2084.207786] ? copy_mnt_ns+0xa30/0xa30 [ 2084.211668] do_syscall_64+0x1d5/0x640 [ 2084.215557] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2084.220742] RIP: 0033:0x7f80d8a040c9 [ 2084.224443] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2084.232145] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2084.239414] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 08:20:17 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 63) 08:20:17 executing program 5: socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:17 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140), 0x10) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x3f, 0x4) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:17 executing program 2: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x54, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xa69d45d}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:20:17 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="b000000000230000", @ANYRES64=r1, @ANYBLOB="05000000000000000008000000000000080000000300000067726f75705f69640500000000000000810000000000000000000000ff0100000400000000000000ffff00000000000003000000010000002f2e280000000000030000000000000000000000100000000a000000010000002f6465762f667573650000000000000005000000000000004000000000000000080000000800000067726f75705f6964"], 0xb0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:17 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80000) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2084.246677] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2084.253939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2084.261198] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:17 executing program 5: socketpair(0x15, 0x1, 0x9, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x3}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x7}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x1fc}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @loopback}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @local}, 0x10) (async, rerun: 32) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (rerun: 32) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:17 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140), 0x10) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x3f, 0x4) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)) (async) bind$tipc(r0, &(0x7f0000000140), 0x10) (async) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x3f, 0x4) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:17 executing program 2: sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x54, 0x0, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xa69d45d}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:20:17 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="b000000000230000", @ANYRES64=r1, @ANYBLOB="05000000000000000008000000000000080000000300000067726f75705f69640500000000000000810000000000000000000000ff0100000400000000000000ffff00000000000003000000010000002f2e280000000000030000000000000000000000100000000a000000010000002f6465762f667573650000000000000005000000000000004000000000000000080000000800000067726f75705f6964"], 0xb0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:17 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80000) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80000) (async) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:17 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) [ 2084.407076] FAULT_INJECTION: forcing a failure. [ 2084.407076] name failslab, interval 1, probability 0, space 0, times 0 [ 2084.446839] CPU: 1 PID: 28282 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2084.454748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2084.464094] Call Trace: [ 2084.466680] dump_stack+0x1b2/0x281 [ 2084.470308] should_fail.cold+0x10a/0x149 [ 2084.474458] should_failslab+0xd6/0x130 [ 2084.478426] kmem_cache_alloc+0x28e/0x3c0 [ 2084.482571] ? fuse_kill_sb_anon+0x50/0x50 [ 2084.486801] ? fuse_init_file_inode+0x70/0x70 [ 2084.491292] fuse_alloc_inode+0x1d/0x3f0 [ 2084.495344] ? do_raw_spin_unlock+0x164/0x220 [ 2084.499838] ? fuse_kill_sb_anon+0x50/0x50 [ 2084.504066] alloc_inode+0x5d/0x170 [ 2084.507681] iget5_locked+0x169/0x450 [ 2084.511472] ? trace_hardirqs_on+0x10/0x10 [ 2084.515694] ? fuse_inode_eq+0x70/0x70 [ 2084.519570] fuse_iget+0x1b5/0x790 [ 2084.523105] ? fuse_change_attributes+0x4d0/0x4d0 [ 2084.527945] fuse_get_root_inode+0x99/0xc0 [ 2084.532169] ? fuse_iget+0x790/0x790 [ 2084.535884] ? __local_bh_enable_ip+0xc1/0x170 [ 2084.540486] ? bdi_set_max_ratio+0xe5/0x120 [ 2084.544891] fuse_fill_super+0xc18/0x15c0 [ 2084.549030] ? fuse_get_root_inode+0xc0/0xc0 [ 2084.553428] ? up_write+0x17/0x60 [ 2084.556876] ? register_shrinker+0x15f/0x220 [ 2084.561273] ? sget_userns+0x768/0xc10 [ 2084.565161] ? get_anon_bdev+0x1c0/0x1c0 [ 2084.569561] ? sget+0xd9/0x110 [ 2084.572746] ? fuse_get_root_inode+0xc0/0xc0 [ 2084.577146] mount_nodev+0x4c/0xf0 [ 2084.580676] mount_fs+0x92/0x2a0 [ 2084.584039] vfs_kern_mount.part.0+0x5b/0x470 [ 2084.588531] do_mount+0xe65/0x2a30 [ 2084.592064] ? assoc_array_gc+0x1131/0x1160 [ 2084.596379] ? retint_kernel+0x2d/0x2d [ 2084.600258] ? copy_mount_string+0x40/0x40 [ 2084.604487] ? __sanitizer_cov_trace_pc+0x34/0x50 [ 2084.609332] ? copy_mount_options+0x1fa/0x2f0 [ 2084.613814] ? copy_mnt_ns+0xa30/0xa30 [ 2084.617691] SyS_mount+0xa8/0x120 [ 2084.621131] ? copy_mnt_ns+0xa30/0xa30 [ 2084.625021] do_syscall_64+0x1d5/0x640 [ 2084.628903] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2084.634081] RIP: 0033:0x7f80d8a040c9 [ 2084.637777] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2084.645475] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2084.652737] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2084.660002] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2084.667265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2084.674535] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:18 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 64) 08:20:18 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bind$tipc(r0, &(0x7f0000000140), 0x10) (async) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x3f, 0x4) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:18 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:20:18 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="b000000000230000", @ANYRES64=r1, @ANYBLOB="05000000000000000008000000000000080000000300000067726f75705f69640500000000000000810000000000000000000000ff0100000400000000000000ffff00000000000003000000010000002f2e280000000000030000000000000000000000100000000a000000010000002f6465762f667573650000000000000005000000000000004000000000000000080000000800000067726f75705f6964"], 0xb0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000340)={0x2020}, 0x2020) (async) write$FUSE_DIRENT(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="b000000000230000", @ANYRES64=r1, @ANYBLOB="05000000000000000008000000000000080000000300000067726f75705f69640500000000000000810000000000000000000000ff0100000400000000000000ffff00000000000003000000010000002f2e280000000000030000000000000000000000100000000a000000010000002f6465762f667573650000000000000005000000000000004000000000000000080000000800000067726f75705f6964"], 0xb0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:18 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x2, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x201, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x200}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x8000, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 08:20:18 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80000) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x1}, 0x10) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:18 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x0, {0x0, 0x14}}, 0x20) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:18 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x2, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x201, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x200}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x8000, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) socketpair(0x2, 0xa, 0x5, &(0x7f0000000080)) (async) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x201, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x200}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) (async) mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x8000, 0x1) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) 08:20:18 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) [ 2084.817802] FAULT_INJECTION: forcing a failure. [ 2084.817802] name failslab, interval 1, probability 0, space 0, times 0 08:20:18 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000010c0)={0x2020}, 0x2020) clock_gettime(0x4, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030307d30303030303030303130303030302c087301725f69643d28fc0b9b6bfd962d67f15f3bb37524ce3691307a2ebadd51bff93b8add1852691ad277aa9e330fa8efe4e62fd2036c96ced842dc28189ae498533f673765258dbcbcecfccd13c1fb7564c869a8e3f7e4c5c90e182fe2adbbf977360000000000c0f2bed965c1d25ba6a12a45393dabf607dbcd30baae7063aec85b9d03bb082e40c534a0d86e87ff5ba98f218dcf24f84cd53633258f8bb1c7c876f5c2304fff503801523ed0d0629788ba5c08dff6ab95", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES8=r1, @ANYBLOB=',\x00']) 08:20:18 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1f}}, 0x18) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2084.888748] CPU: 0 PID: 28334 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2084.896645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2084.905995] Call Trace: [ 2084.908590] dump_stack+0x1b2/0x281 [ 2084.912226] should_fail.cold+0x10a/0x149 [ 2084.916374] should_failslab+0xd6/0x130 [ 2084.920351] kmem_cache_alloc+0x28e/0x3c0 [ 2084.924499] __fuse_request_alloc+0x21/0xe0 [ 2084.928817] fuse_fill_super+0xc89/0x15c0 [ 2084.932963] ? fuse_get_root_inode+0xc0/0xc0 08:20:18 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1f}}, 0x18) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1f}}, 0x18) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) [ 2084.937368] ? up_write+0x17/0x60 [ 2084.940816] ? register_shrinker+0x15f/0x220 [ 2084.945219] ? sget_userns+0x768/0xc10 [ 2084.949108] ? get_anon_bdev+0x1c0/0x1c0 [ 2084.953157] ? sget+0xd9/0x110 [ 2084.956343] ? fuse_get_root_inode+0xc0/0xc0 [ 2084.960748] mount_nodev+0x4c/0xf0 [ 2084.964271] mount_fs+0x92/0x2a0 [ 2084.967619] vfs_kern_mount.part.0+0x5b/0x470 [ 2084.972094] do_mount+0xe65/0x2a30 [ 2084.975614] ? copy_mount_string+0x40/0x40 [ 2084.979828] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2084.984821] ? copy_mnt_ns+0xa30/0xa30 [ 2084.988684] ? copy_mount_options+0x1fa/0x2f0 [ 2084.993165] ? copy_mnt_ns+0xa30/0xa30 [ 2084.997039] SyS_mount+0xa8/0x120 [ 2085.000475] ? copy_mnt_ns+0xa30/0xa30 [ 2085.004374] do_syscall_64+0x1d5/0x640 [ 2085.008245] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2085.013418] RIP: 0033:0x7f80d8a040c9 [ 2085.017124] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2085.024816] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2085.032080] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2085.039364] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2085.046611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2085.053914] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:18 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 65) 08:20:18 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x0, {0x0, 0x14}}, 0x20) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:18 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fanotify_mark(r1, 0x80, 0x4000021, 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:18 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair(0x2, 0xa, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x201, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x200}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_GW_MODE={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) (async) mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x8000, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 08:20:18 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0x0, 0x0, {0x1f}}, 0x18) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:18 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000010c0)={0x2020}, 0x2020) clock_gettime(0x4, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030307d30303030303030303130303030302c087301725f69643d28fc0b9b6bfd962d67f15f3bb37524ce3691307a2ebadd51bff93b8add1852691ad277aa9e330fa8efe4e62fd2036c96ced842dc28189ae498533f673765258dbcbcecfccd13c1fb7564c869a8e3f7e4c5c90e182fe2adbbf977360000000000c0f2bed965c1d25ba6a12a45393dabf607dbcd30baae7063aec85b9d03bb082e40c534a0d86e87ff5ba98f218dcf24f84cd53633258f8bb1c7c876f5c2304fff503801523ed0d0629788ba5c08dff6ab95", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES8=r1, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f00000010c0)={0x2020}, 0x2020) (async) clock_gettime(0x4, &(0x7f0000000000)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030307d30303030303030303130303030302c087301725f69643d28fc0b9b6bfd962d67f15f3bb37524ce3691307a2ebadd51bff93b8add1852691ad277aa9e330fa8efe4e62fd2036c96ced842dc28189ae498533f673765258dbcbcecfccd13c1fb7564c869a8e3f7e4c5c90e182fe2adbbf977360000000000c0f2bed965c1d25ba6a12a45393dabf607dbcd30baae7063aec85b9d03bb082e40c534a0d86e87ff5ba98f218dcf24f84cd53633258f8bb1c7c876f5c2304fff503801523ed0d0629788ba5c08dff6ab95", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES8=r1, @ANYBLOB=',\x00']) (async) 08:20:18 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fanotify_mark(r1, 0x80, 0x4000021, 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) fanotify_mark(r1, 0x80, 0x4000021, 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:18 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0xfffffffffffffffe, 0x0, {0x0, 0x14}}, 0x20) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:18 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x1], 0x1, 0x800, 0x0, 0xffffffffffffffff}) utimensat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{}, {0x77359400}}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) [ 2085.230198] FAULT_INJECTION: forcing a failure. [ 2085.230198] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.251975] CPU: 0 PID: 28405 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2085.259873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2085.269217] Call Trace: [ 2085.271810] dump_stack+0x1b2/0x281 [ 2085.275529] should_fail.cold+0x10a/0x149 08:20:18 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:18 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0xc3a18286deb23094, &(0x7f0000000240)) [ 2085.279679] should_failslab+0xd6/0x130 [ 2085.283663] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2085.288334] ? fuse_init_file_inode+0x70/0x70 [ 2085.292828] fuse_alloc_inode+0x2ea/0x3f0 [ 2085.296971] ? do_raw_spin_unlock+0x164/0x220 [ 2085.301466] ? fuse_kill_sb_anon+0x50/0x50 [ 2085.305694] alloc_inode+0x5d/0x170 [ 2085.309316] iget5_locked+0x169/0x450 [ 2085.313115] ? trace_hardirqs_on+0x10/0x10 [ 2085.317348] ? fuse_inode_eq+0x70/0x70 [ 2085.321232] fuse_iget+0x1b5/0x790 [ 2085.324784] ? fuse_change_attributes+0x4d0/0x4d0 08:20:18 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) [ 2085.329634] fuse_get_root_inode+0x99/0xc0 [ 2085.333862] ? fuse_iget+0x790/0x790 [ 2085.337577] ? __local_bh_enable_ip+0xc1/0x170 [ 2085.342151] ? bdi_set_max_ratio+0xe5/0x120 [ 2085.346465] fuse_fill_super+0xc18/0x15c0 [ 2085.350613] ? fuse_get_root_inode+0xc0/0xc0 [ 2085.355023] ? up_write+0x17/0x60 [ 2085.358470] ? register_shrinker+0x15f/0x220 [ 2085.362876] ? sget_userns+0x768/0xc10 [ 2085.366769] ? get_anon_bdev+0x1c0/0x1c0 [ 2085.370826] ? sget+0xd9/0x110 [ 2085.374019] ? fuse_get_root_inode+0xc0/0xc0 [ 2085.378506] mount_nodev+0x4c/0xf0 [ 2085.382039] mount_fs+0x92/0x2a0 [ 2085.385405] vfs_kern_mount.part.0+0x5b/0x470 [ 2085.389895] do_mount+0xe65/0x2a30 [ 2085.393434] ? do_raw_spin_unlock+0x164/0x220 [ 2085.397931] ? copy_mount_string+0x40/0x40 [ 2085.402160] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2085.407165] ? copy_mnt_ns+0xa30/0xa30 [ 2085.411028] ? copy_mount_options+0x1fa/0x2f0 [ 2085.415501] ? copy_mnt_ns+0xa30/0xa30 [ 2085.419364] SyS_mount+0xa8/0x120 [ 2085.422791] ? copy_mnt_ns+0xa30/0xa30 [ 2085.426652] do_syscall_64+0x1d5/0x640 [ 2085.430521] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2085.435687] RIP: 0033:0x7f80d8a040c9 [ 2085.439372] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2085.447071] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2085.454315] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2085.461755] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2085.469093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:20:19 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 66) 08:20:19 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0xc3a18286deb23094, &(0x7f0000000240)) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x300, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:19 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r2, &(0x7f00000010c0)={0x2020}, 0x2020) (async) clock_gettime(0x4, &(0x7f0000000000)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030307d30303030303030303130303030302c087301725f69643d28fc0b9b6bfd962d67f15f3bb37524ce3691307a2ebadd51bff93b8add1852691ad277aa9e330fa8efe4e62fd2036c96ced842dc28189ae498533f673765258dbcbcecfccd13c1fb7564c869a8e3f7e4c5c90e182fe2adbbf977360000000000c0f2bed965c1d25ba6a12a45393dabf607dbcd30baae7063aec85b9d03bb082e40c534a0d86e87ff5ba98f218dcf24f84cd53633258f8bb1c7c876f5c2304fff503801523ed0d0629788ba5c08dff6ab95", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRES8=r1, @ANYBLOB=',\x00']) 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x1], 0x1, 0x800, 0x0, 0xffffffffffffffff}) utimensat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{}, {0x77359400}}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 08:20:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) fanotify_mark(r1, 0x80, 0x4000021, 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2085.476354] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:19 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0xc3a18286deb23094, &(0x7f0000000240)) 08:20:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xd1df], 0x1, 0x800, 0x0, 0xffffffffffffffff}) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x20, 0x0) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x10000}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2085.585253] FAULT_INJECTION: forcing a failure. [ 2085.585253] name failslab, interval 1, probability 0, space 0, times 0 [ 2085.621427] CPU: 0 PID: 28458 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:19 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x1], 0x1, 0x800, 0x0, 0xffffffffffffffff}) utimensat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{}, {0x77359400}}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x1], 0x1, 0x800}) (async) utimensat(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{}, {0x77359400}}, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) (async) [ 2085.629337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2085.638686] Call Trace: [ 2085.641271] dump_stack+0x1b2/0x281 [ 2085.644900] should_fail.cold+0x10a/0x149 [ 2085.649051] should_failslab+0xd6/0x130 [ 2085.653058] kmem_cache_alloc+0x28e/0x3c0 [ 2085.657202] __d_alloc+0x2a/0xa20 [ 2085.660656] ? lock_acquire+0x170/0x3f0 [ 2085.664655] d_alloc+0x46/0x240 [ 2085.667929] d_alloc_name+0x70/0x80 [ 2085.671546] ? d_alloc+0x240/0x240 [ 2085.675079] fuse_ctl_add_dentry+0x70/0x410 [ 2085.679479] ? __lockdep_init_map+0x100/0x560 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x10000}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x10000}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) [ 2085.683970] fuse_ctl_add_conn+0x148/0x250 [ 2085.688199] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2085.692864] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2085.697469] fuse_fill_super+0xe0c/0x15c0 [ 2085.701623] ? fuse_get_root_inode+0xc0/0xc0 [ 2085.706026] ? up_write+0x17/0x60 [ 2085.709474] ? register_shrinker+0x15f/0x220 [ 2085.713882] ? sget_userns+0x768/0xc10 [ 2085.717778] ? get_anon_bdev+0x1c0/0x1c0 [ 2085.721834] ? sget+0xd9/0x110 [ 2085.725030] ? fuse_get_root_inode+0xc0/0xc0 [ 2085.729430] mount_nodev+0x4c/0xf0 [ 2085.732962] mount_fs+0x92/0x2a0 [ 2085.736328] vfs_kern_mount.part.0+0x5b/0x470 [ 2085.740823] do_mount+0xe65/0x2a30 [ 2085.744367] ? copy_mount_string+0x40/0x40 [ 2085.748597] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2085.753655] ? copy_mnt_ns+0xa30/0xa30 [ 2085.757542] ? copy_mount_options+0x1fa/0x2f0 [ 2085.762029] ? copy_mnt_ns+0xa30/0xa30 [ 2085.765911] SyS_mount+0xa8/0x120 [ 2085.769361] ? copy_mnt_ns+0xa30/0xa30 [ 2085.773255] do_syscall_64+0x1d5/0x640 [ 2085.777141] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2085.782318] RIP: 0033:0x7f80d8a040c9 [ 2085.786018] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2085.793746] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2085.801017] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2085.808268] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2085.815518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2085.822766] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:19 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 67) 08:20:19 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 64) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x6, 0x0, 0x10000}) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="b4e3e4c9b3e8123b9d1e8d6bd58e6f52140aa22508d5c1fdef8a598c09afe6ee24108336a0ddaf71342b6043cd9b31ca39dec234c765eff869c8ff8db3f0a09e975e0203abc436647a722afbf8992dc615206c46d010d75d1e0e8ca365c03525ad59e1b1b248f91522d14c3af101c253a4f0d8f548b61281ad7ea4806e687fe20bebbfe27caa270dec44fbc75fbc8e29f108485f89edf5e4272dcd32dba1005fc506bebd4b5c02cc6a573f3a36f11283afdf84765ae2ee135bd10d72be98554809e0a5a0530641f8b8", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303130303030302c757365725f69643d0000000000000000000000000000ff49b5af0b338778933bf065994b6a8428fa3ebe4cb478153cf677f74fdafad66a68f57455e26d5426b2dee0e50ad7b0dc9c03dd2d5b909bbafc351ca91a4bb16873d717aa7b7a01dcf7c6510f3652d487b31d7d7621ad8528cfda57b670ffac80d8a7ca36de0497a031e96574ba8fd6977025b678005221736cfdcdfdcf10", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xd1df], 0x1, 0x800, 0x0, 0xffffffffffffffff}) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x20, 0x0) 08:20:19 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) 08:20:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xd1df], 0x1, 0x800, 0x0, 0xffffffffffffffff}) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x20, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0xd1df], 0x1, 0x800}) (async) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x20, 0x0) (async) 08:20:19 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2cc616c1aaaa060d737dc942f9c5057ead41ad12ed99cc9970bd12a09f81f37d777380147b9f86b05eb68a7a339fec352a444025a2c662faf87b92dba51c7f4b1ad2c05229be41f1c5f1de337f887674bb3c56ae820e3f05ef5c8a86676853194946ca310b79f999c3be37cebc238efdab99cac9560cbd86cb4b16018ba1de85c2ebd8d9eeefab5dda2af48e2a03c264bb3c7db31c41cb3b3b321738983c67bcb9bbc9347e62969a05b72a517d58bba799159b5df0ec889b5d40353a3bed16c225e680aee226029191b6489a759c7f1d99b5a9532b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2085.962104] FAULT_INJECTION: forcing a failure. [ 2085.962104] name failslab, interval 1, probability 0, space 0, times 0 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="b4e3e4c9b3e8123b9d1e8d6bd58e6f52140aa22508d5c1fdef8a598c09afe6ee24108336a0ddaf71342b6043cd9b31ca39dec234c765eff869c8ff8db3f0a09e975e0203abc436647a722afbf8992dc615206c46d010d75d1e0e8ca365c03525ad59e1b1b248f91522d14c3af101c253a4f0d8f548b61281ad7ea4806e687fe20bebbfe27caa270dec44fbc75fbc8e29f108485f89edf5e4272dcd32dba1005fc506bebd4b5c02cc6a573f3a36f11283afdf84765ae2ee135bd10d72be98554809e0a5a0530641f8b8", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303130303030302c757365725f69643d0000000000000000000000000000ff49b5af0b338778933bf065994b6a8428fa3ebe4cb478153cf677f74fdafad66a68f57455e26d5426b2dee0e50ad7b0dc9c03dd2d5b909bbafc351ca91a4bb16873d717aa7b7a01dcf7c6510f3652d487b31d7d7621ad8528cfda57b670ffac80d8a7ca36de0497a031e96574ba8fd6977025b678005221736cfdcdfdcf10", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2086.005146] CPU: 0 PID: 28518 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2086.013062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2086.022408] Call Trace: [ 2086.024993] dump_stack+0x1b2/0x281 [ 2086.028629] should_fail.cold+0x10a/0x149 [ 2086.032791] should_failslab+0xd6/0x130 [ 2086.036767] kmem_cache_alloc+0x28e/0x3c0 [ 2086.040922] __d_alloc+0x2a/0xa20 [ 2086.044375] d_alloc+0x46/0x240 [ 2086.047651] d_alloc_name+0x70/0x80 [ 2086.051272] ? d_alloc+0x240/0x240 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2cc616c1aaaa060d737dc942f9c5057ead41ad12ed99cc9970bd12a09f81f37d777380147b9f86b05eb68a7a339fec352a444025a2c662faf87b92dba51c7f4b1ad2c05229be41f1c5f1de337f887674bb3c56ae820e3f05ef5c8a86676853194946ca310b79f999c3be37cebc238efdab99cac9560cbd86cb4b16018ba1de85c2ebd8d9eeefab5dda2af48e2a03c264bb3c7db31c41cb3b3b321738983c67bcb9bbc9347e62969a05b72a517d58bba799159b5df0ec889b5d40353a3bed16c225e680aee226029191b6489a759c7f1d99b5a9532b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2086.054818] fuse_ctl_add_dentry+0x70/0x410 [ 2086.059146] ? __lockdep_init_map+0x100/0x560 [ 2086.063637] fuse_ctl_add_conn+0x110/0x250 [ 2086.067865] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2086.072530] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2086.077110] fuse_fill_super+0xe0c/0x15c0 [ 2086.081256] ? fuse_get_root_inode+0xc0/0xc0 [ 2086.085664] ? up_write+0x17/0x60 [ 2086.089110] ? register_shrinker+0x15f/0x220 [ 2086.093528] ? sget_userns+0x768/0xc10 [ 2086.097437] ? get_anon_bdev+0x1c0/0x1c0 [ 2086.101490] ? sget+0xd9/0x110 [ 2086.104683] ? fuse_get_root_inode+0xc0/0xc0 [ 2086.109087] mount_nodev+0x4c/0xf0 [ 2086.112623] mount_fs+0x92/0x2a0 [ 2086.115988] vfs_kern_mount.part.0+0x5b/0x470 [ 2086.120476] do_mount+0xe65/0x2a30 [ 2086.124015] ? copy_mount_string+0x40/0x40 [ 2086.128244] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2086.133252] ? copy_mnt_ns+0xa30/0xa30 [ 2086.137135] ? copy_mount_options+0x1fa/0x2f0 [ 2086.141621] ? copy_mnt_ns+0xa30/0xa30 [ 2086.145504] SyS_mount+0xa8/0x120 [ 2086.148944] ? copy_mnt_ns+0xa30/0xa30 [ 2086.152810] do_syscall_64+0x1d5/0x640 [ 2086.156700] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2086.161871] RIP: 0033:0x7f80d8a040c9 [ 2086.165557] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2086.173242] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2086.180490] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2086.187733] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2086.194981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:20:19 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 68) 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000280)=ANY=[@ANYBLOB="b4e3e4c9b3e8123b9d1e8d6bd58e6f52140aa22508d5c1fdef8a598c09afe6ee24108336a0ddaf71342b6043cd9b31ca39dec234c765eff869c8ff8db3f0a09e975e0203abc436647a722afbf8992dc615206c46d010d75d1e0e8ca365c03525ad59e1b1b248f91522d14c3af101c253a4f0d8f548b61281ad7ea4806e687fe20bebbfe27caa270dec44fbc75fbc8e29f108485f89edf5e4272dcd32dba1005fc506bebd4b5c02cc6a573f3a36f11283afdf84765ae2ee135bd10d72be98554809e0a5a0530641f8b8", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303130303030302c757365725f69643d0000000000000000000000000000ff49b5af0b338778933bf065994b6a8428fa3ebe4cb478153cf677f74fdafad66a68f57455e26d5426b2dee0e50ad7b0dc9c03dd2d5b909bbafc351ca91a4bb16873d717aa7b7a01dcf7c6510f3652d487b31d7d7621ad8528cfda57b670ffac80d8a7ca36de0497a031e96574ba8fd6977025b678005221736cfdcdfdcf10", @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d2cc616c1aaaa060d737dc942f9c5057ead41ad12ed99cc9970bd12a09f81f37d777380147b9f86b05eb68a7a339fec352a444025a2c662faf87b92dba51c7f4b1ad2c05229be41f1c5f1de337f887674bb3c56ae820e3f05ef5c8a86676853194946ca310b79f999c3be37cebc238efdab99cac9560cbd86cb4b16018ba1de85c2ebd8d9eeefab5dda2af48e2a03c264bb3c7db31c41cb3b3b321738983c67bcb9bbc9347e62969a05b72a517d58bba799159b5df0ec889b5d40353a3bed16c225e680aee226029191b6489a759c7f1d99b5a9532b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000240)={0x2020}, 0x2020) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) [ 2086.202239] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x80, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0), 0x12000, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3800}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r0}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_LSEEK(r2, &(0x7f0000000140)={0x18, 0x0, r4, {0x1e1}}, 0x18) 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000180)={0x67446698, 0x1, 0x4, 0x4, 0x4, "b3b93c8d6f89fb345190b827d70d439bf3239059552b33ebdd7f06740b187a4a92671cf2c56e3cfb22ef8ea14b2de1a997e73383061c86440f3f5747d7bb3a5674249f55ed80618803ec2bef046d3f48446043860b85993339f1640977169e66407afb5dced77014dca7081251b0d566c8233fb3d3b2163f7376da37de9fa56ad9f846cdae6bf7b56b74895d93867e5dd3adb8a741544fc69ce7c3a835574f80d08f4d2a6281528df7c8bcc3f7fc4237e83f66e6bc989f266a5fd2d88efe83e80e11cc648f8fa9e15b814e4c37a6bd291d7d42479ff254cc1c7def2f5302a4a9d17ae6426299cd06731594af"}, 0xfc) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 08:20:19 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303005303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:19 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x80, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0), 0x12000, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3800}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r0}}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_LSEEK(r2, &(0x7f0000000140)={0x18, 0x0, r4, {0x1e1}}, 0x18) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x80, &(0x7f00000001c0)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0), 0x12000, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3800}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r0}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f0000002500)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) (async) write$FUSE_LSEEK(r2, &(0x7f0000000140)={0x18, 0x0, r4, {0x1e1}}, 0x18) (async) 08:20:19 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) 08:20:19 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) statx(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x4, &(0x7f0000000240)) 08:20:19 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000180)={0x67446698, 0x1, 0x4, 0x4, 0x4, "b3b93c8d6f89fb345190b827d70d439bf3239059552b33ebdd7f06740b187a4a92671cf2c56e3cfb22ef8ea14b2de1a997e73383061c86440f3f5747d7bb3a5674249f55ed80618803ec2bef046d3f48446043860b85993339f1640977169e66407afb5dced77014dca7081251b0d566c8233fb3d3b2163f7376da37de9fa56ad9f846cdae6bf7b56b74895d93867e5dd3adb8a741544fc69ce7c3a835574f80d08f4d2a6281528df7c8bcc3f7fc4237e83f66e6bc989f266a5fd2d88efe83e80e11cc648f8fa9e15b814e4c37a6bd291d7d42479ff254cc1c7def2f5302a4a9d17ae6426299cd06731594af"}, 0xfc) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) [ 2086.413554] FAULT_INJECTION: forcing a failure. [ 2086.413554] name failslab, interval 1, probability 0, space 0, times 0 [ 2086.439745] CPU: 1 PID: 28585 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2086.447646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2086.456994] Call Trace: [ 2086.459580] dump_stack+0x1b2/0x281 [ 2086.463199] should_fail.cold+0x10a/0x149 [ 2086.467329] should_failslab+0xd6/0x130 [ 2086.471287] kmem_cache_alloc+0x28e/0x3c0 [ 2086.475469] alloc_inode+0xa0/0x170 [ 2086.479087] new_inode+0x1d/0xf0 [ 2086.482437] fuse_ctl_add_dentry+0x8d/0x410 [ 2086.486741] ? __lockdep_init_map+0x100/0x560 [ 2086.491213] fuse_ctl_add_conn+0x148/0x250 [ 2086.495428] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2086.500079] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2086.504640] fuse_fill_super+0xe0c/0x15c0 [ 2086.508775] ? fuse_get_root_inode+0xc0/0xc0 [ 2086.513167] ? up_write+0x17/0x60 [ 2086.516603] ? register_shrinker+0x15f/0x220 [ 2086.520987] ? sget_userns+0x768/0xc10 [ 2086.524941] ? get_anon_bdev+0x1c0/0x1c0 [ 2086.528985] ? sget+0xd9/0x110 [ 2086.532167] ? fuse_get_root_inode+0xc0/0xc0 [ 2086.536563] mount_nodev+0x4c/0xf0 [ 2086.540081] mount_fs+0x92/0x2a0 [ 2086.543440] vfs_kern_mount.part.0+0x5b/0x470 [ 2086.547922] do_mount+0xe65/0x2a30 [ 2086.551464] ? copy_mount_string+0x40/0x40 [ 2086.555690] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2086.560707] ? copy_mnt_ns+0xa30/0xa30 [ 2086.564574] ? copy_mount_options+0x1fa/0x2f0 [ 2086.569050] ? copy_mnt_ns+0xa30/0xa30 [ 2086.572941] SyS_mount+0xa8/0x120 [ 2086.576369] ? copy_mnt_ns+0xa30/0xa30 [ 2086.580256] do_syscall_64+0x1d5/0x640 [ 2086.584123] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2086.589293] RIP: 0033:0x7f80d8a040c9 [ 2086.592988] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2086.600688] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:20 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 69) 08:20:20 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2000, 0x80, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0), 0x12000, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3800}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r0}}) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r3, &(0x7f0000004540)={0xc8, 0x0, r4, [{{}, {0x0, 0x0, 0x1f, 0x0, '/proc/thread-self/attr/current\x00'}}]}, 0xc8) write$FUSE_LSEEK(r2, &(0x7f0000000140)={0x18, 0x0, r4, {0x1e1}}, 0x18) 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303005303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:20 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$nbd(0xffffffffffffffff, &(0x7f0000000180)={0x67446698, 0x1, 0x4, 0x4, 0x4, "b3b93c8d6f89fb345190b827d70d439bf3239059552b33ebdd7f06740b187a4a92671cf2c56e3cfb22ef8ea14b2de1a997e73383061c86440f3f5747d7bb3a5674249f55ed80618803ec2bef046d3f48446043860b85993339f1640977169e66407afb5dced77014dca7081251b0d566c8233fb3d3b2163f7376da37de9fa56ad9f846cdae6bf7b56b74895d93867e5dd3adb8a741544fc69ce7c3a835574f80d08f4d2a6281528df7c8bcc3f7fc4237e83f66e6bc989f266a5fd2d88efe83e80e11cc648f8fa9e15b814e4c37a6bd291d7d42479ff254cc1c7def2f5302a4a9d17ae6426299cd06731594af"}, 0xfc) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$nbd(0xffffffffffffffff, &(0x7f0000000180)={0x67446698, 0x1, 0x4, 0x4, 0x4, "b3b93c8d6f89fb345190b827d70d439bf3239059552b33ebdd7f06740b187a4a92671cf2c56e3cfb22ef8ea14b2de1a997e73383061c86440f3f5747d7bb3a5674249f55ed80618803ec2bef046d3f48446043860b85993339f1640977169e66407afb5dced77014dca7081251b0d566c8233fb3d3b2163f7376da37de9fa56ad9f846cdae6bf7b56b74895d93867e5dd3adb8a741544fc69ce7c3a835574f80d08f4d2a6281528df7c8bcc3f7fc4237e83f66e6bc989f266a5fd2d88efe83e80e11cc648f8fa9e15b814e4c37a6bd291d7d42479ff254cc1c7def2f5302a4a9d17ae6426299cd06731594af"}, 0xfc) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) 08:20:20 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) statx(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x4, &(0x7f0000000240)) 08:20:20 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x111000, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2086.607939] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2086.615190] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2086.622462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2086.629807] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:20 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f31ff005964650700000000000000303030303030303030303130303030202c757365725f696458", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$nbd(r1, &(0x7f0000000180)={0x67446698, 0x0, 0x1, 0x1, 0x2, "47995c087257ee026bcee8c6b8636d553faa4d2de4e8e432b2f9573e8395cbc4db576edf9e652715302cc76d83ab600f7ac6cf3960259d8d48e6fdd1b791d2e834ebf7b3e7dad3cce69721fc4527ccc12f7d6ca09287033e1f13d851dbc8e049ce82b66967994353b0595226c26d46380e55a05cafe32a540f6c3db9de39640397c7662eb0c4163cb9c746ced7050388c07c90ca2b29448299fc44db5f19b0a8cb76cc6abb"}, 0xb5) 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303005303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:20 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$TIOCNXCL(r1, 0x540d) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:20 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) statx(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x4, &(0x7f0000000240)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) statx(r0, &(0x7f0000000000)='./file1\x00', 0x400, 0x4, &(0x7f0000000240)) (async) [ 2086.742354] FAULT_INJECTION: forcing a failure. [ 2086.742354] name failslab, interval 1, probability 0, space 0, times 0 08:20:20 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 32) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async, rerun: 32) ioctl$TIOCNXCL(r1, 0x540d) (async, rerun: 32) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2086.796819] CPU: 0 PID: 28617 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2086.804755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2086.814103] Call Trace: [ 2086.816716] dump_stack+0x1b2/0x281 [ 2086.820351] should_fail.cold+0x10a/0x149 [ 2086.824504] should_failslab+0xd6/0x130 [ 2086.828475] kmem_cache_alloc+0x28e/0x3c0 [ 2086.832624] alloc_inode+0xa0/0x170 [ 2086.836249] new_inode+0x1d/0xf0 [ 2086.839619] fuse_ctl_add_dentry+0x8d/0x410 08:20:20 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) ioctl$TIOCNXCL(r1, 0x540d) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r1) (async) ioctl$TIOCNXCL(r1, 0x540d) (async) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) [ 2086.843935] ? __lockdep_init_map+0x100/0x560 [ 2086.848449] fuse_ctl_add_conn+0x17c/0x250 [ 2086.852681] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2086.857366] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2086.861946] fuse_fill_super+0xe0c/0x15c0 [ 2086.866088] ? fuse_get_root_inode+0xc0/0xc0 [ 2086.870490] ? up_write+0x17/0x60 [ 2086.873936] ? register_shrinker+0x15f/0x220 [ 2086.878340] ? sget_userns+0x768/0xc10 [ 2086.882231] ? get_anon_bdev+0x1c0/0x1c0 [ 2086.886281] ? sget+0xd9/0x110 [ 2086.889465] ? fuse_get_root_inode+0xc0/0xc0 [ 2086.893865] mount_nodev+0x4c/0xf0 [ 2086.897403] mount_fs+0x92/0x2a0 [ 2086.900774] vfs_kern_mount.part.0+0x5b/0x470 [ 2086.905267] do_mount+0xe65/0x2a30 [ 2086.908805] ? retint_kernel+0x2d/0x2d [ 2086.912682] ? copy_mount_string+0x40/0x40 [ 2086.916897] ? copy_mount_options+0x185/0x2f0 [ 2086.921367] ? copy_mount_options+0x18f/0x2f0 [ 2086.925859] ? copy_mount_options+0x1fa/0x2f0 [ 2086.930332] ? copy_mnt_ns+0xa30/0xa30 [ 2086.934213] SyS_mount+0xa8/0x120 [ 2086.937660] ? copy_mnt_ns+0xa30/0xa30 [ 2086.941528] do_syscall_64+0x1d5/0x640 [ 2086.945397] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2086.950565] RIP: 0033:0x7f80d8a040c9 [ 2086.954252] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2086.961941] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2086.969196] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2086.976442] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2086.983685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:20:20 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 70) 08:20:20 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fb5dc140379a5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffe67, 0x0}, 0x4020) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)=ANY=[]) 08:20:20 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}}, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x80000001, 0x4, 0xca48, 0x6, 0x71, 0x2, 0x6], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000280)='./file0\x00', 0x2000, 0x1, &(0x7f0000000140)) 08:20:20 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000c80)={0x2020, 0x0, 0x0, 0x0}, 0x2020) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@flag='rw'}, {@uid_gt={'uid>', r1}}, {@euid_gt={'euid>', r2}}]}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) mknodat(r4, &(0x7f0000000280)='./file0\x00', 0x10, 0x3c7) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x2, 0xe84) [ 2086.990934] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:20 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f31ff005964650700000000000000303030303030303030303130303030202c757365725f696458", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async, rerun: 64) write$nbd(r1, &(0x7f0000000180)={0x67446698, 0x0, 0x1, 0x1, 0x2, "47995c087257ee026bcee8c6b8636d553faa4d2de4e8e432b2f9573e8395cbc4db576edf9e652715302cc76d83ab600f7ac6cf3960259d8d48e6fdd1b791d2e834ebf7b3e7dad3cce69721fc4527ccc12f7d6ca09287033e1f13d851dbc8e049ce82b66967994353b0595226c26d46380e55a05cafe32a540f6c3db9de39640397c7662eb0c4163cb9c746ced7050388c07c90ca2b29448299fc44db5f19b0a8cb76cc6abb"}, 0xb5) (rerun: 64) [ 2087.080887] FAULT_INJECTION: forcing a failure. [ 2087.080887] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.124719] CPU: 1 PID: 28667 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2087.132632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2087.141980] Call Trace: [ 2087.144567] dump_stack+0x1b2/0x281 [ 2087.148198] should_fail.cold+0x10a/0x149 [ 2087.152348] should_failslab+0xd6/0x130 [ 2087.156319] kmem_cache_alloc+0x28e/0x3c0 [ 2087.160467] __d_alloc+0x2a/0xa20 [ 2087.163925] ? lock_acquire+0x170/0x3f0 [ 2087.167897] d_alloc+0x46/0x240 [ 2087.171171] d_alloc_name+0x70/0x80 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffe67, 0x0}, 0x4020) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)=ANY=[]) 08:20:20 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000c80)={0x2020, 0x0, 0x0, 0x0}, 0x2020) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@flag='rw'}, {@uid_gt={'uid>', r1}}, {@euid_gt={'euid>', r2}}]}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) mknodat(r4, &(0x7f0000000280)='./file0\x00', 0x10, 0x3c7) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x2, 0xe84) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000c80)={0x2020}, 0x2020) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000180)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@flag='rw'}, {@uid_gt={'uid>', r1}}, {@euid_gt={'euid>', r2}}]}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) (async) mknodat(r4, &(0x7f0000000280)='./file0\x00', 0x10, 0x3c7) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x2, 0xe84) (async) 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xfffffffffffffe67, 0x0}, 0x4020) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000080)=ANY=[]) 08:20:20 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000c80)={0x2020, 0x0, 0x0, 0x0}, 0x2020) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@flag='rw'}, {@uid_gt={'uid>', r1}}, {@euid_gt={'euid>', r2}}]}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) mknodat(r4, &(0x7f0000000280)='./file0\x00', 0x10, 0x3c7) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x2, 0xe84) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000c80)={0x2020}, 0x2020) (async) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x1, &(0x7f0000000180)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@flag='rw'}, {@uid_gt={'uid>', r1}}, {@euid_gt={'euid>', r2}}]}}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) (async) mknodat(r4, &(0x7f0000000280)='./file0\x00', 0x10, 0x3c7) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) mknodat(r3, &(0x7f0000000080)='./file0\x00', 0x2, 0xe84) (async) [ 2087.174794] ? d_alloc+0x240/0x240 [ 2087.178340] fuse_ctl_add_dentry+0x70/0x410 [ 2087.182667] ? __lockdep_init_map+0x100/0x560 [ 2087.187166] fuse_ctl_add_conn+0x17c/0x250 [ 2087.191392] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2087.196053] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2087.200634] fuse_fill_super+0xe0c/0x15c0 [ 2087.204884] ? fuse_get_root_inode+0xc0/0xc0 [ 2087.209392] ? up_write+0x17/0x60 [ 2087.212835] ? register_shrinker+0x15f/0x220 [ 2087.217236] ? sget_userns+0x768/0xc10 [ 2087.221215] ? get_anon_bdev+0x1c0/0x1c0 08:20:20 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r1, r2/1000+10000}}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4, 0xfffff322) 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES32=r0, @ANYBLOB=',root00000100000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 2087.225272] ? sget+0xd9/0x110 [ 2087.228455] ? fuse_get_root_inode+0xc0/0xc0 [ 2087.232855] mount_nodev+0x4c/0xf0 [ 2087.236390] mount_fs+0x92/0x2a0 [ 2087.239751] vfs_kern_mount.part.0+0x5b/0x470 [ 2087.244341] do_mount+0xe65/0x2a30 [ 2087.247889] ? copy_mount_string+0x40/0x40 [ 2087.252126] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2087.257145] ? copy_mnt_ns+0xa30/0xa30 [ 2087.261036] ? copy_mount_options+0x1fa/0x2f0 [ 2087.265527] ? copy_mnt_ns+0xa30/0xa30 [ 2087.269410] SyS_mount+0xa8/0x120 [ 2087.272859] ? copy_mnt_ns+0xa30/0xa30 [ 2087.276743] do_syscall_64+0x1d5/0x640 [ 2087.280630] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2087.285899] RIP: 0033:0x7f80d8a040c9 [ 2087.289620] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2087.297333] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2087.304602] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2087.311865] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:20 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 71) 08:20:20 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES32=r0, @ANYBLOB=',root00000100000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES32=r0, @ANYBLOB=',root00000100000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:20:20 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}}, 0x100) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x80000001, 0x4, 0xca48, 0x6, 0x71, 0x2, 0x6], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000280)='./file0\x00', 0x2000, 0x1, &(0x7f0000000140)) 08:20:20 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fb5dc140379a5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:20 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r1, r2/1000+10000}}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4, 0xfffff322) [ 2087.319303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2087.326736] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:20 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f31ff005964650700000000000000303030303030303030303130303030202c757365725f696458", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$nbd(r1, &(0x7f0000000180)={0x67446698, 0x0, 0x1, 0x1, 0x2, "47995c087257ee026bcee8c6b8636d553faa4d2de4e8e432b2f9573e8395cbc4db576edf9e652715302cc76d83ab600f7ac6cf3960259d8d48e6fdd1b791d2e834ebf7b3e7dad3cce69721fc4527ccc12f7d6ca09287033e1f13d851dbc8e049ce82b66967994353b0595226c26d46380e55a05cafe32a540f6c3db9de39640397c7662eb0c4163cb9c746ced7050388c07c90ca2b29448299fc44db5f19b0a8cb76cc6abb"}, 0xb5) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fb5dc140379a5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fb5dc140379a5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:20:21 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}}, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x80000001, 0x4, 0xca48, 0x6, 0x71, 0x2, 0x6], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) statx(r0, &(0x7f0000000280)='./file0\x00', 0x2000, 0x1, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}}, 0x100) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000000c0)=[0x80000001, 0x4, 0xca48, 0x6, 0x71, 0x2, 0x6], 0x7, 0x80800}) (async) statx(r0, &(0x7f0000000280)='./file0\x00', 0x2000, 0x1, &(0x7f0000000140)) (async) [ 2087.453635] FAULT_INJECTION: forcing a failure. [ 2087.453635] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.474737] CPU: 0 PID: 28735 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2087.482649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2087.491997] Call Trace: [ 2087.494586] dump_stack+0x1b2/0x281 [ 2087.498215] should_fail.cold+0x10a/0x149 [ 2087.502359] should_failslab+0xd6/0x130 [ 2087.506328] kmem_cache_alloc+0x28e/0x3c0 [ 2087.510474] __d_alloc+0x2a/0xa20 [ 2087.513926] ? lock_acquire+0x170/0x3f0 [ 2087.517898] d_alloc+0x46/0x240 [ 2087.521180] d_alloc_name+0x70/0x80 [ 2087.524801] ? d_alloc+0x240/0x240 [ 2087.528337] fuse_ctl_add_dentry+0x70/0x410 [ 2087.532655] ? __lockdep_init_map+0x100/0x560 [ 2087.537143] fuse_ctl_add_conn+0x1b0/0x250 [ 2087.541374] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2087.546041] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2087.550623] fuse_fill_super+0xe0c/0x15c0 [ 2087.554852] ? fuse_get_root_inode+0xc0/0xc0 [ 2087.559263] ? up_write+0x17/0x60 [ 2087.562891] ? register_shrinker+0x15f/0x220 [ 2087.567298] ? sget_userns+0x768/0xc10 [ 2087.571189] ? get_anon_bdev+0x1c0/0x1c0 [ 2087.575243] ? sget+0xd9/0x110 [ 2087.578436] ? fuse_get_root_inode+0xc0/0xc0 [ 2087.582844] mount_nodev+0x4c/0xf0 [ 2087.586380] mount_fs+0x92/0x2a0 [ 2087.589750] vfs_kern_mount.part.0+0x5b/0x470 [ 2087.594243] do_mount+0xe65/0x2a30 [ 2087.597785] ? copy_mount_string+0x40/0x40 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}}) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}}) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee00}}) (async) 08:20:21 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x200, &(0x7f0000000140)) [ 2087.602025] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2087.607036] ? copy_mnt_ns+0xa30/0xa30 [ 2087.611003] ? copy_mount_options+0x1fa/0x2f0 [ 2087.615493] ? copy_mnt_ns+0xa30/0xa30 [ 2087.619377] SyS_mount+0xa8/0x120 [ 2087.622825] ? copy_mnt_ns+0xa30/0xa30 [ 2087.626710] do_syscall_64+0x1d5/0x640 [ 2087.630595] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2087.635775] RIP: 0033:0x7f80d8a040c9 [ 2087.639473] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2087.647165] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 08:20:21 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 72) 08:20:21 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x200, &(0x7f0000000140)) 08:20:21 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r1, r2/1000+10000}}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) mknodat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4, 0xfffff322) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) clock_gettime(0x0, &(0x7f00000000c0)) (async) utimensat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r1, r2/1000+10000}}, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) mknodat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4, 0xfffff322) (async) 08:20:21 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES32=r0, @ANYBLOB=',root00000100000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r1) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000001080), r2) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRES32=r0, @ANYBLOB=',root00000100000,user_id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:20:21 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/116, 0x74) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@smackfsroot={'smackfsroot', 0x3d, 'group\xc6j\a'}}, {@measure}, {@pcr={'pcr', 0x3d, 0x3c}}]}}) read$FUSE(r0, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, r1, {0x0, 0x16}}, 0x20) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x100) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2087.654425] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2087.661691] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2087.668952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2087.676211] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:21 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x200, &(0x7f0000000140)) 08:20:21 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/116, 0x74) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@smackfsroot={'smackfsroot', 0x3d, 'group\xc6j\a'}}, {@measure}, {@pcr={'pcr', 0x3d, 0x3c}}]}}) (async) read$FUSE(r0, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, r1, {0x0, 0x16}}, 0x20) 08:20:21 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB="66643df5cb4dabf6e537dec48856a536dfa4d220c1069c534d24c4a9aec950dd8b08f08b133d4485da9b501b935dfb9485d2ce63e544472bbc8bcbc4a51afa19743c14ffca458ef0f467d66052c8e76a093bdb580bf5d29991690917762aec6d6006b4263d18c51a7036bbfe9c3cf7e9170aae5f33e253d276ca1e23a57720f6fdbc5583d58c2b56d94ecc696c621d4a123258fcdb33dbe7d07901836e594033cc8103b6c20ecd16207a7e92965182ac60b882f20d5fd2222d2f533b5ebae34a8498d3eec4e0933a48", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 08:20:21 executing program 1: getsockname$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x100) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2087.803509] FAULT_INJECTION: forcing a failure. [ 2087.803509] name failslab, interval 1, probability 0, space 0, times 0 [ 2087.853547] CPU: 0 PID: 28791 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2087.861453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2087.870802] Call Trace: [ 2087.873391] dump_stack+0x1b2/0x281 [ 2087.877024] should_fail.cold+0x10a/0x149 [ 2087.881167] should_failslab+0xd6/0x130 [ 2087.885141] kmem_cache_alloc+0x28e/0x3c0 [ 2087.889286] __d_alloc+0x2a/0xa20 [ 2087.892736] ? lock_acquire+0x170/0x3f0 [ 2087.896706] d_alloc+0x46/0x240 [ 2087.899986] d_alloc_name+0x70/0x80 08:20:21 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x100) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2087.903604] ? d_alloc+0x240/0x240 [ 2087.907144] fuse_ctl_add_dentry+0x70/0x410 [ 2087.911461] ? __lockdep_init_map+0x100/0x560 [ 2087.915952] fuse_ctl_add_conn+0x1e0/0x250 [ 2087.920186] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2087.924846] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2087.929421] fuse_fill_super+0xe0c/0x15c0 [ 2087.933553] ? fuse_get_root_inode+0xc0/0xc0 [ 2087.937952] ? up_write+0x17/0x60 [ 2087.941391] ? register_shrinker+0x15f/0x220 [ 2087.945775] ? sget_userns+0x768/0xc10 [ 2087.949643] ? get_anon_bdev+0x1c0/0x1c0 [ 2087.953677] ? sget+0xd9/0x110 [ 2087.956843] ? fuse_get_root_inode+0xc0/0xc0 [ 2087.961229] mount_nodev+0x4c/0xf0 [ 2087.964754] mount_fs+0x92/0x2a0 [ 2087.968113] vfs_kern_mount.part.0+0x5b/0x470 [ 2087.972617] do_mount+0xe65/0x2a30 [ 2087.976138] ? copy_mount_string+0x40/0x40 [ 2087.980347] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2087.985339] ? copy_mnt_ns+0xa30/0xa30 [ 2087.989201] ? copy_mount_options+0x1fa/0x2f0 [ 2087.993672] ? copy_mnt_ns+0xa30/0xa30 [ 2087.997536] SyS_mount+0xa8/0x120 [ 2088.000963] ? copy_mnt_ns+0xa30/0xa30 [ 2088.004833] do_syscall_64+0x1d5/0x640 [ 2088.008700] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2088.013878] RIP: 0033:0x7f80d8a040c9 [ 2088.017570] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2088.025349] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2088.032604] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2088.039872] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2088.047123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2088.054371] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:21 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 73) 08:20:21 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB="66643df5cb4dabf6e537dec48856a536dfa4d220c1069c534d24c4a9aec950dd8b08f08b133d4485da9b501b935dfb9485d2ce63e544472bbc8bcbc4a51afa19743c14ffca458ef0f467d66052c8e76a093bdb580bf5d29991690917762aec6d6006b4263d18c51a7036bbfe9c3cf7e9170aae5f33e253d276ca1e23a57720f6fdbc5583d58c2b56d94ecc696c621d4a123258fcdb33dbe7d07901836e594033cc8103b6c20ecd16207a7e92965182ac60b882f20d5fd2222d2f533b5ebae34a8498d3eec4e0933a48", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 08:20:21 executing program 1: getsockname$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x10) (async) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000) (async) 08:20:21 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/116, 0x74) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@smackfsroot={'smackfsroot', 0x3d, 'group\xc6j\a'}}, {@measure}, {@pcr={'pcr', 0x3d, 0x3c}}]}}) read$FUSE(r0, &(0x7f0000000300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, r1, {0x0, 0x16}}, 0x20) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/116, 0x74) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@smackfsroot={'smackfsroot', 0x3d, 'group\xc6j\a'}}, {@measure}, {@pcr={'pcr', 0x3d, 0x3c}}]}}) (async) read$FUSE(r0, &(0x7f0000000300)={0x2020}, 0x2020) (async) write$FUSE_OPEN(r0, &(0x7f00000000c0)={0x20, 0x0, r1, {0x0, 0x16}}, 0x20) (async) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000040), 0x9, 0x200) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:21 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0x0, r0) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) syslog(0x4, &(0x7f0000000040)=""/27, 0x1b) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) fchmodat(r2, &(0x7f0000000080)='./file0\x00', 0xa) 08:20:21 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f0000000180)=ANY=[@ANYBLOB="66643df5cb4dabf6e537dec48856a536dfa4d220c1069c534d24c4a9aec950dd8b08f08b133d4485da9b501b935dfb9485d2ce63e544472bbc8bcbc4a51afa19743c14ffca458ef0f467d66052c8e76a093bdb580bf5d29991690917762aec6d6006b4263d18c51a7036bbfe9c3cf7e9170aae5f33e253d276ca1e23a57720f6fdbc5583d58c2b56d94ecc696c621d4a123258fcdb33dbe7d07901836e594033cc8103b6c20ecd16207a7e92965182ac60b882f20d5fd2222d2f533b5ebae34a8498d3eec4e0933a48", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 08:20:21 executing program 1: getsockname$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) accept4$vsock_stream(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000) 08:20:21 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r1 = syz_open_dev$dri(&(0x7f0000000040), 0x9, 0x200) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 08:20:21 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f01653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:21 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x3], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000001c0)=[0x7fff, 0x8, 0x0, 0x7f], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) utimensat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {0x0, 0xea60}}, 0x100) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x200, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440), 0x2400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESOCT=r4, @ANYBLOB=',group_id=', @ANYRESOCT=r1, @ANYBLOB="e900"]) [ 2088.212258] FAULT_INJECTION: forcing a failure. [ 2088.212258] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.255271] CPU: 0 PID: 28835 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2088.263180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2088.272531] Call Trace: [ 2088.275115] dump_stack+0x1b2/0x281 [ 2088.278745] should_fail.cold+0x10a/0x149 [ 2088.282896] should_failslab+0xd6/0x130 [ 2088.286869] kmem_cache_alloc+0x28e/0x3c0 [ 2088.291018] __d_alloc+0x2a/0xa20 [ 2088.294474] ? lock_acquire+0x170/0x3f0 [ 2088.298446] d_alloc+0x46/0x240 [ 2088.301724] d_alloc_name+0x70/0x80 08:20:21 executing program 5: mknodat$loop(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (rerun: 32) r1 = syz_open_dev$dri(&(0x7f0000000040), 0x9, 0x200) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2088.305518] ? d_alloc+0x240/0x240 [ 2088.309058] fuse_ctl_add_dentry+0x70/0x410 [ 2088.313378] ? __lockdep_init_map+0x100/0x560 [ 2088.317869] fuse_ctl_add_conn+0x1e0/0x250 [ 2088.322103] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2088.326852] ? CIFSSMBGetPosixACL+0x1a5/0x1390 [ 2088.331426] fuse_fill_super+0xe0c/0x15c0 [ 2088.335570] ? fuse_get_root_inode+0xc0/0xc0 [ 2088.339970] ? up_write+0x17/0x60 [ 2088.343397] ? register_shrinker+0x15f/0x220 [ 2088.347781] ? sget_userns+0x768/0xc10 [ 2088.351667] ? get_anon_bdev+0x1c0/0x1c0 [ 2088.355703] ? sget+0xd9/0x110 [ 2088.358869] ? fuse_get_root_inode+0xc0/0xc0 [ 2088.363251] mount_nodev+0x4c/0xf0 [ 2088.366780] mount_fs+0x92/0x2a0 [ 2088.370132] vfs_kern_mount.part.0+0x5b/0x470 [ 2088.374604] do_mount+0xe65/0x2a30 [ 2088.378122] ? do_raw_spin_unlock+0x164/0x220 [ 2088.382611] ? copy_mount_string+0x40/0x40 [ 2088.386838] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2088.391832] ? copy_mnt_ns+0xa30/0xa30 [ 2088.395697] ? copy_mount_options+0x1fa/0x2f0 [ 2088.400166] ? copy_mnt_ns+0xa30/0xa30 [ 2088.404047] SyS_mount+0xa8/0x120 [ 2088.407473] ? copy_mnt_ns+0xa30/0xa30 [ 2088.411343] do_syscall_64+0x1d5/0x640 [ 2088.415217] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2088.420383] RIP: 0033:0x7f80d8a040c9 [ 2088.424068] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2088.431768] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2088.439014] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2088.446263] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 08:20:22 executing program 0: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 74) 08:20:22 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="10000000020000000700000008000000050000003f0000005922d3c6367ba313"], &(0x7f00000002c0), 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {r1, r2/1000+10000}}, 0x100) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:22 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x3], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000001c0)=[0x7fff, 0x8, 0x0, 0x7f], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) utimensat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {0x0, 0xea60}}, 0x100) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x200, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440), 0x2400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESOCT=r4, @ANYBLOB=',group_id=', @ANYRESOCT=r1, @ANYBLOB="e900"]) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x3], 0x1, 0x80000}) (async) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000001c0)=[0x7fff, 0x8, 0x0, 0x7f], 0x4, 0x80800}) (async) utimensat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {0x0, 0xea60}}, 0x100) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x200, &(0x7f0000000340)) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440), 0x2400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESOCT=r4, @ANYBLOB=',group_id=', @ANYRESOCT=r1, @ANYBLOB="e900"]) (async) 08:20:22 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f01653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f01653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:20:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) (async) keyctl$get_persistent(0x16, 0x0, r0) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x40, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) syslog(0x4, &(0x7f0000000040)=""/27, 0x1b) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) fchmodat(r2, &(0x7f0000000080)='./file0\x00', 0xa) 08:20:22 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x40], 0x1, 0x80c00, 0x0, 0xffffffffffffffff}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) fanotify_mark(r3, 0x1, 0x8, r4, &(0x7f00000002c0)='./file0\x00') mknodat$loop(r2, &(0x7f0000000280)='./file0\x00', 0x8, 0x1) [ 2088.453527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2088.460774] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 08:20:22 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f01653d30303030303030303030303030303030303130303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:20:22 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x4) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x40], 0x1, 0x80c00, 0x0, 0xffffffffffffffff}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) fanotify_mark(r3, 0x1, 0x8, r4, &(0x7f00000002c0)='./file0\x00') mknodat$loop(r2, &(0x7f0000000280)='./file0\x00', 0x8, 0x1) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x280000, 0x0) (async) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x4) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000200)={&(0x7f00000001c0)=[0x40], 0x1, 0x80c00}) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r3) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r4) (async) fanotify_mark(r3, 0x1, 0x8, r4, &(0x7f00000002c0)='./file0\x00') (async) mknodat$loop(r2, &(0x7f0000000280)='./file0\x00', 0x8, 0x1) (async) 08:20:22 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="10000000020000000700000008000000050000003f0000005922d3c6367ba313"], &(0x7f00000002c0), 0x400) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {r1, r2/1000+10000}}, 0x100) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) 08:20:22 executing program 4: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r0) (async, rerun: 32) keyctl$get_persistent(0x16, 0x0, r0) (async, rerun: 32) mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x40, 0x0) (async, rerun: 64) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x400, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) syslog(0x4, &(0x7f0000000040)=""/27, 0x1b) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r2) (async) fchmodat(r2, &(0x7f0000000080)='./file0\x00', 0xa) 08:20:22 executing program 3: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x3], 0x1, 0x80000, 0x0, 0xffffffffffffffff}) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000240)={&(0x7f00000001c0)=[0x7fff, 0x8, 0x0, 0x7f], 0x4, 0x80800, 0x0, 0xffffffffffffffff}) utimensat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {0x0, 0xea60}}, 0x100) (async, rerun: 32) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) statx(r0, &(0x7f0000000280)='./file0\x00', 0x0, 0x200, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440), 0x2400, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESOCT=r4, @ANYBLOB=',group_id=', @ANYRESOCT=r1, @ANYBLOB="e900"]) [ 2088.613624] FAULT_INJECTION: forcing a failure. [ 2088.613624] name failslab, interval 1, probability 0, space 0, times 0 [ 2088.653342] CPU: 0 PID: 28894 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 08:20:22 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="10000000020000000700000008000000050000003f0000005922d3c6367ba313"], &(0x7f00000002c0), 0x400) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {r1, r2/1000+10000}}, 0x100) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) (async) name_to_handle_at(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="10000000020000000700000008000000050000003f0000005922d3c6367ba313"], &(0x7f00000002c0), 0x400) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000c40), r0) (async) clock_gettime(0x0, &(0x7f0000000080)) (async) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{}, {r1, r2/1000+10000}}, 0x100) (async) statx(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0, &(0x7f0000000140)) (async) [ 2088.661255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2088.670602] Call Trace: [ 2088.673271] dump_stack+0x1b2/0x281 [ 2088.676898] should_fail.cold+0x10a/0x149 [ 2088.681044] should_failslab+0xd6/0x130 [ 2088.685106] __kmalloc_track_caller+0x2bc/0x400 [ 2088.689773] ? do_mount+0x1e41/0x2a30 [ 2088.693568] kstrdup+0x36/0x70 [ 2088.696758] do_mount+0x1e41/0x2a30 [ 2088.700386] ? copy_mount_string+0x40/0x40 [ 2088.704617] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2088.709630] ? copy_mnt_ns+0xa30/0xa30 [ 2088.713509] ? copy_mount_options+0x1fa/0x2f0 [ 2088.718085] ? copy_mnt_ns+0xa30/0xa30 [ 2088.721970] SyS_mount+0xa8/0x120 [ 2088.725418] ? copy_mnt_ns+0xa30/0xa30 [ 2088.729405] do_syscall_64+0x1d5/0x640 [ 2088.733291] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2088.738472] RIP: 0033:0x7f80d8a040c9 [ 2088.742178] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2088.749879] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2088.757168] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2088.764461] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2088.771718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2088.778965] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2088.796448] BUG: unable to handle kernel paging request at fffffffffffffffc [ 2088.803564] IP: do_mount+0x1ef2/0x2a30 [ 2088.807436] PGD 8e6b067 P4D 8e6b067 PUD 8e6d067 PMD 0 [ 2088.812707] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2088.817180] Modules linked in: [ 2088.820364] CPU: 0 PID: 28894 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2088.828219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2088.837553] task: ffff88809edf0540 task.stack: ffff888097ad8000 [ 2088.843585] RIP: 0010:do_mount+0x1ef2/0x2a30 [ 2088.847962] RSP: 0018:ffff888097adfd90 EFLAGS: 00010246 [ 2088.853301] RAX: dffffc0000000000 RBX: 00000000fffffff4 RCX: ffffc90005bfa000 [ 2088.860546] RDX: 1fffffffffffffff RSI: ffffffff818eabf4 RDI: fffffffffffffffc [ 2088.867795] RBP: fffffffffffffff4 R08: ffffffff8ba0e58c R09: 0000000000000001 [ 2088.875036] R10: 0000000000000000 R11: ffff88809edf0540 R12: ffff888097544c28 [ 2088.882279] R13: ffffffff891eac20 R14: 0000000000000000 R15: 0000000000000020 [ 2088.889525] FS: 00007f80d6f76700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 2088.897724] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2088.903577] CR2: fffffffffffffffc CR3: 000000009238b000 CR4: 00000000003406f0 [ 2088.910828] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2088.918083] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2088.925334] Call Trace: [ 2088.927903] ? copy_mount_string+0x40/0x40 [ 2088.932138] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2088.937142] ? copy_mnt_ns+0xa30/0xa30 [ 2088.941008] ? copy_mount_options+0x1fa/0x2f0 [ 2088.945476] ? copy_mnt_ns+0xa30/0xa30 [ 2088.949483] SyS_mount+0xa8/0x120 [ 2088.952925] ? copy_mnt_ns+0xa30/0xa30 [ 2088.956794] do_syscall_64+0x1d5/0x640 [ 2088.960665] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2088.965833] RIP: 0033:0x7f80d8a040c9 [ 2088.969517] RSP: 002b:00007f80d6f76168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2088.977231] RAX: ffffffffffffffda RBX: 00007f80d8b23f80 RCX: 00007f80d8a040c9 [ 2088.984476] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 2088.991737] RBP: 00007f80d6f761d0 R08: 00000000200002c0 R09: 0000000000000000 [ 2088.998982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2089.006227] R13: 00007ffdef76cb8f R14: 00007f80d6f76300 R15: 0000000000022000 [ 2089.013486] Code: c6 ff 48 89 ef 48 63 eb e8 7c 61 ff ff 48 8d 7d 08 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 80 3c 02 00 0f 85 4b 08 00 00 <48> 8b 5d 08 e8 65 a8 c6 ff 48 8d 7b 70 e8 8c 43 b2 ff 4c 89 ef [ 2089.032572] RIP: do_mount+0x1ef2/0x2a30 RSP: ffff888097adfd90 [ 2089.038434] CR2: fffffffffffffffc [ 2089.041972] ---[ end trace 5fd8514d7da82bbd ]--- [ 2089.046699] Kernel panic - not syncing: Fatal exception [ 2089.052208] Kernel Offset: disabled [ 2089.055810] Rebooting in 86400 seconds..