ce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) (async) 08:33:11 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x0) [ 1601.745577] should_failslab+0xd6/0x130 [ 1601.749551] __kmalloc+0x2c1/0x400 [ 1601.753086] ? register_shrinker+0x1ab/0x220 [ 1601.757497] register_shrinker+0x1ab/0x220 [ 1601.761728] sget_userns+0x9aa/0xc10 [ 1601.765444] ? get_anon_bdev+0x1c0/0x1c0 [ 1601.769509] ? get_anon_bdev+0x1c0/0x1c0 [ 1601.773566] sget+0xd1/0x110 [ 1601.776584] ? fuse_get_root_inode+0xc0/0xc0 [ 1601.780987] mount_nodev+0x2c/0xf0 [ 1601.784528] mount_fs+0x92/0x2a0 [ 1601.787896] vfs_kern_mount.part.0+0x5b/0x470 [ 1601.792392] do_mount+0xe65/0x2a30 [ 1601.795931] ? __do_page_fault+0x159/0xad0 [ 1601.800160] ? retint_kernel+0x2d/0x2d [ 1601.804041] ? copy_mount_string+0x40/0x40 [ 1601.808274] ? memset+0x20/0x40 [ 1601.811548] ? copy_mount_options+0x1fa/0x2f0 [ 1601.816044] ? copy_mnt_ns+0xa30/0xa30 [ 1601.819929] SyS_mount+0xa8/0x120 [ 1601.823377] ? copy_mnt_ns+0xa30/0xa30 [ 1601.827261] do_syscall_64+0x1d5/0x640 [ 1601.831148] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1601.836328] RIP: 0033:0x7f2196c8261a [ 1601.840029] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:11 executing program 3: r0 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="4a00080097b5c8d9448e9bb278fc85", @ANYRES16=r0, @ANYBLOB="00022bbd7000ffdbdf1100000000070099dbc752bed978761356820d5b2d4145c96da0fae944db594c3b151f1f8aeb", @ANYRES32, @ANYBLOB="0600060004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8085}, 0x4008010) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 08:33:11 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000140)={0x26, 0x3, 0x0, {0x5, 0x5, 0x0, 'l2tp\x00'}}, 0x26) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r1) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:11 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0x0, 0x0, {0x4, 0x4, 0x9, 0x1}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1601.847726] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1601.854984] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1601.862246] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1601.869505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1601.876772] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:11 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 20) 08:33:11 executing program 3: r0 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="4a00080097b5c8d9448e9bb278fc85", @ANYRES16=r0, @ANYBLOB="00022bbd7000ffdbdf1100000000070099dbc752bed978761356820d5b2d4145c96da0fae944db594c3b151f1f8aeb", @ANYRES32, @ANYBLOB="0600060004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8085}, 0x4008010) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 08:33:11 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 08:33:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9ddb1a64", @ANYRES16=r1, @ANYBLOB="0400250afb1d9fe8ad5ec8bd7000fedbdf25c34dc0eb12794f18ed7ab6d2d4020000000900030473797a3100000000"], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x24048081) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, r5, {0x9, 0x0, 0x200, 0x50}}, 0x20) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x2, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002600), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)=0x0) getresuid(&(0x7f0000002380)=0x0, &(0x7f00000023c0), &(0x7f0000002400)) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2010400, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x100000000000000}}], [{@dont_appraise}, {@appraise_type}, {@audit}, {@measure}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@uid_lt}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0xffffffffffffffda, 0x0, {{0x1, 0x80000001}}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2800020, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) 08:33:11 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) 08:33:11 executing program 3: r0 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="4a00080097b5c8d9448e9bb278fc85", @ANYRES16=r0, @ANYBLOB="00022bbd7000ffdbdf1100000000070099dbc752bed978761356820d5b2d4145c96da0fae944db594c3b151f1f8aeb", @ANYRES32, @ANYBLOB="0600060004000000"], 0x30}, 0x1, 0x0, 0x0, 0x8085}, 0x4008010) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000100)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x1}, r1) 08:33:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x2, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002600), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)=0x0) (async) getresuid(&(0x7f0000002380)=0x0, &(0x7f00000023c0), &(0x7f0000002400)) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2010400, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x100000000000000}}], [{@dont_appraise}, {@appraise_type}, {@audit}, {@measure}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@uid_lt}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) (async) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0xffffffffffffffda, 0x0, {{0x1, 0x80000001}}}, 0x28) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2800020, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) 08:33:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9ddb1a64", @ANYRES16=r1, @ANYBLOB="0400250afb1d9fe8ad5ec8bd7000fedbdf25c34dc0eb12794f18ed7ab6d2d4020000000900030473797a3100000000"], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x24048081) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, r5, {0x9, 0x0, 0x200, 0x50}}, 0x20) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) (async) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9ddb1a64", @ANYRES16=r1, @ANYBLOB="0400250afb1d9fe8ad5ec8bd7000fedbdf25c34dc0eb12794f18ed7ab6d2d4020000000900030473797a3100000000"], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x24048081) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) (async) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, r5, {0x9, 0x0, 0x200, 0x50}}, 0x20) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) 08:33:11 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x2, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002600), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)=0x0) getresuid(&(0x7f0000002380)=0x0, &(0x7f00000023c0), &(0x7f0000002400)) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2010400, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x100000000000000}}], [{@dont_appraise}, {@appraise_type}, {@audit}, {@measure}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@uid_lt}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0xffffffffffffffda, 0x0, {{0x1, 0x80000001}}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2800020, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) [ 1602.061889] FAULT_INJECTION: forcing a failure. [ 1602.061889] name failslab, interval 1, probability 0, space 0, times 0 [ 1602.093333] CPU: 0 PID: 9966 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1602.101146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1602.110496] Call Trace: [ 1602.113084] dump_stack+0x1b2/0x281 [ 1602.116717] should_fail.cold+0x10a/0x149 [ 1602.120866] should_failslab+0xd6/0x130 [ 1602.124838] __kmalloc+0x2c1/0x400 [ 1602.128386] ? match_number+0x9d/0x200 [ 1602.132280] match_number+0x9d/0x200 [ 1602.135995] ? match_strdup+0xa0/0xa0 [ 1602.139795] ? register_shrinker+0x15a/0x220 [ 1602.144201] fuse_fill_super+0x3f2/0x15c0 [ 1602.148349] ? fuse_get_root_inode+0xc0/0xc0 [ 1602.152757] ? up_write+0x17/0x60 [ 1602.156203] ? register_shrinker+0x15f/0x220 08:33:11 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1602.160609] ? sget_userns+0x768/0xc10 [ 1602.164499] ? get_anon_bdev+0x1c0/0x1c0 [ 1602.168553] ? sget+0xd9/0x110 [ 1602.171745] ? fuse_get_root_inode+0xc0/0xc0 [ 1602.176152] mount_nodev+0x4c/0xf0 [ 1602.179686] mount_fs+0x92/0x2a0 [ 1602.183051] vfs_kern_mount.part.0+0x5b/0x470 [ 1602.187548] do_mount+0xe65/0x2a30 [ 1602.191094] ? __do_page_fault+0x159/0xad0 [ 1602.195328] ? retint_kernel+0x2d/0x2d [ 1602.199213] ? copy_mount_string+0x40/0x40 [ 1602.203450] ? memset+0x20/0x40 [ 1602.206723] ? copy_mount_options+0x1fa/0x2f0 08:33:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x2, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002600), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) getresuid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)=0x0) (async, rerun: 32) getresuid(&(0x7f0000002380)=0x0, &(0x7f00000023c0), &(0x7f0000002400)) (rerun: 32) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2010400, &(0x7f0000002440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x100000000000000}}], [{@dont_appraise}, {@appraise_type}, {@audit}, {@measure}, {@fowner_eq={'fowner', 0x3d, r3}}, {@euid_eq={'euid', 0x3d, r4}}, {@uid_lt}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fowner_gt={'fowner>', 0xee00}}]}}) (async) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0xffffffffffffffda, 0x0, {{0x1, 0x80000001}}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2800020, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}]}}) [ 1602.211209] ? copy_mnt_ns+0xa30/0xa30 [ 1602.215088] SyS_mount+0xa8/0x120 [ 1602.218531] ? copy_mnt_ns+0xa30/0xa30 [ 1602.222412] do_syscall_64+0x1d5/0x640 [ 1602.226299] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1602.231481] RIP: 0033:0x7f2196c8261a [ 1602.235181] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1602.242881] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1602.250144] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 08:33:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESOCT=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4040158213721fb7"]) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x15996a17b534e15f}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004e2d3273cb47b604b909d15c3f7652bbd7000fddbdf25010000000500040001000000140002006d61"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x48011) [ 1602.257409] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1602.264675] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1602.271937] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 21) 08:33:12 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r6, &(0x7f0000000040)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) (async) read$FUSE(r1, &(0x7f0000002380)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) (async) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) (async) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) (async) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) (async) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) (async) 08:33:12 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x37, 0x36, 0x39, 0x65, 0x39, 0x37, 0x39, 0x37, 0x36, 0x31, 0x33, 0x33, 0x38, 0x36, 0x32, 0x33]}, &(0x7f0000000200)={0x0, "d8b542aaf94af50746830db8cd28bf650a5545a4c01ace3c134c4c3dc3426520d0a67d8851dd94bfbfea4bdec10cf922406505285d6d3e5a0f7f3fa5c7e3500c", 0x15}, 0x48, r0) 08:33:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r1, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="9ddb1a64", @ANYRES16=r1, @ANYBLOB="0400250afb1d9fe8ad5ec8bd7000fedbdf25c34dc0eb12794f18ed7ab6d2d4020000000900030473797a3100000000"], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x24048081) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) (async) write$FUSE_IOCTL(r3, &(0x7f0000000080)={0x20, 0x0, r5, {0x9, 0x0, 0x200, 0x50}}, 0x20) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESOCT=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4040158213721fb7"]) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x15996a17b534e15f}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004e2d3273cb47b604b909d15c3f7652bbd7000fddbdf25010000000500040001000000140002006d61"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x48011) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESOCT=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4040158213721fb7"]) (async) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x15996a17b534e15f}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004e2d3273cb47b604b909d15c3f7652bbd7000fddbdf25010000000500040001000000140002006d61"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x48011) (async) 08:33:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0xffffffffffffffda, 0x0, {0x6, 0x4, 0x0, {0x0, 0x101, 0x3, 0xfa23, 0x9, 0x401, 0x1, 0x0, 0x1, 0x2000, 0x6, r2, r4, 0x401}}}, 0x78) 08:33:12 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x37, 0x36, 0x39, 0x65, 0x39, 0x37, 0x39, 0x37, 0x36, 0x31, 0x33, 0x33, 0x38, 0x36, 0x32, 0x33]}, &(0x7f0000000200)={0x0, "d8b542aaf94af50746830db8cd28bf650a5545a4c01ace3c134c4c3dc3426520d0a67d8851dd94bfbfea4bdec10cf922406505285d6d3e5a0f7f3fa5c7e3500c", 0x15}, 0x48, r0) 08:33:12 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r6, &(0x7f0000000040)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) (async) read$FUSE(r1, &(0x7f0000002380)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020}, 0x2020) (async) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) (async) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) (async) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) (async) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) (async) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) (async) [ 1602.444330] FAULT_INJECTION: forcing a failure. [ 1602.444330] name failslab, interval 1, probability 0, space 0, times 0 [ 1602.480788] CPU: 1 PID: 10044 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1602.488684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1602.498031] Call Trace: [ 1602.500615] dump_stack+0x1b2/0x281 [ 1602.504243] should_fail.cold+0x10a/0x149 [ 1602.508395] should_failslab+0xd6/0x130 [ 1602.512368] __kmalloc+0x2c1/0x400 [ 1602.515903] ? match_number+0x9d/0x200 [ 1602.519790] match_number+0x9d/0x200 [ 1602.523502] ? match_strdup+0xa0/0xa0 [ 1602.527295] ? register_shrinker+0x15a/0x220 [ 1602.531703] fuse_fill_super+0x3f2/0x15c0 [ 1602.535860] ? fuse_get_root_inode+0xc0/0xc0 [ 1602.540267] ? up_write+0x17/0x60 08:33:12 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) 08:33:12 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x37, 0x36, 0x39, 0x65, 0x39, 0x37, 0x39, 0x37, 0x36, 0x31, 0x33, 0x33, 0x38, 0x36, 0x32, 0x33]}, &(0x7f0000000200)={0x0, "d8b542aaf94af50746830db8cd28bf650a5545a4c01ace3c134c4c3dc3426520d0a67d8851dd94bfbfea4bdec10cf922406505285d6d3e5a0f7f3fa5c7e3500c", 0x15}, 0x48, r0) 08:33:12 executing program 3: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x3, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) mount$fuseblk(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x31000, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x63, 0x32, 0x31, 0x34, 0x61, 0x31, 0x5d0dd02facb9f1c8], 0x2d, [0x33, 0x34, 0x61], 0x2d, [0x51, 0x63, 0x63, 0x36], 0x2d, [0x61, 0x0, 0x38, 0x31], 0x2d, [0x30, 0x34, 0x32, 0x67, 0x32, 0x30, 0x62, 0x30]}}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ':N$:'}}]}}) read$proc_mixer(r0, &(0x7f0000000140)=""/82, 0x52) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, 0x0) write$proc_mixer(r3, &(0x7f0000000540)=[{'ALTPCM', @void}, {'LINE2', @void}], 0xd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r6, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r6, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x868) [ 1602.543717] ? register_shrinker+0x15f/0x220 [ 1602.548123] ? sget_userns+0x768/0xc10 [ 1602.552021] ? get_anon_bdev+0x1c0/0x1c0 [ 1602.556075] ? sget+0xd9/0x110 [ 1602.559267] ? fuse_get_root_inode+0xc0/0xc0 [ 1602.563671] mount_nodev+0x4c/0xf0 [ 1602.567206] mount_fs+0x92/0x2a0 [ 1602.570568] vfs_kern_mount.part.0+0x5b/0x470 [ 1602.575061] do_mount+0xe65/0x2a30 [ 1602.578601] ? __do_page_fault+0x159/0xad0 [ 1602.582828] ? retint_kernel+0x2d/0x2d [ 1602.586709] ? copy_mount_string+0x40/0x40 [ 1602.590939] ? memset+0x20/0x40 [ 1602.594211] ? copy_mount_options+0x1fa/0x2f0 [ 1602.598700] ? copy_mnt_ns+0xa30/0xa30 [ 1602.602580] SyS_mount+0xa8/0x120 [ 1602.606025] ? copy_mnt_ns+0xa30/0xa30 [ 1602.609910] do_syscall_64+0x1d5/0x640 [ 1602.613798] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1602.618977] RIP: 0033:0x7f2196c8261a [ 1602.622679] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1602.630382] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1602.637643] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1602.644911] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1602.652165] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1602.659412] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 22) 08:33:12 executing program 3: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x3, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) mount$fuseblk(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x31000, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x63, 0x32, 0x31, 0x34, 0x61, 0x31, 0x5d0dd02facb9f1c8], 0x2d, [0x33, 0x34, 0x61], 0x2d, [0x51, 0x63, 0x63, 0x36], 0x2d, [0x61, 0x0, 0x38, 0x31], 0x2d, [0x30, 0x34, 0x32, 0x67, 0x32, 0x30, 0x62, 0x30]}}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ':N$:'}}]}}) read$proc_mixer(r0, &(0x7f0000000140)=""/82, 0x52) (async) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, 0x0) (async) write$proc_mixer(r3, &(0x7f0000000540)=[{'ALTPCM', @void}, {'LINE2', @void}], 0xd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r6, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) (async, rerun: 64) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r6, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x868) (rerun: 64) 08:33:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESOCT=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="4040158213721fb7"]) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x15996a17b534e15f}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0004e2d3273cb47b604b909d15c3f7652bbd7000fddbdf25010000000500040001000000140002006d61"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x48011) 08:33:12 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) 08:33:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0xffffffffffffffda, 0x0, {0x6, 0x4, 0x0, {0x0, 0x101, 0x3, 0xfa23, 0x9, 0x401, 0x1, 0x0, 0x1, 0x2000, 0x6, r2, r4, 0x401}}}, 0x78) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) (async) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0xffffffffffffffda, 0x0, {0x6, 0x4, 0x0, {0x0, 0x101, 0x3, 0xfa23, 0x9, 0x401, 0x1, 0x0, 0x1, 0x2000, 0x6, r2, r4, 0x401}}}, 0x78) (async) 08:33:12 executing program 4: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000810}, 0x8010) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), r0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)='$', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1602.764096] FAULT_INJECTION: forcing a failure. [ 1602.764096] name failslab, interval 1, probability 0, space 0, times 0 08:33:12 executing program 3: r0 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x3, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) mount$fuseblk(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x31000, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x63, 0x32, 0x31, 0x34, 0x61, 0x31, 0x5d0dd02facb9f1c8], 0x2d, [0x33, 0x34, 0x61], 0x2d, [0x51, 0x63, 0x63, 0x36], 0x2d, [0x61, 0x0, 0x38, 0x31], 0x2d, [0x30, 0x34, 0x32, 0x67, 0x32, 0x30, 0x62, 0x30]}}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ':N$:'}}]}}) read$proc_mixer(r0, &(0x7f0000000140)=""/82, 0x52) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, 0x0) write$proc_mixer(r3, &(0x7f0000000540)=[{'ALTPCM', @void}, {'LINE2', @void}], 0xd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r6, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r6, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x868) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x3, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) mount$fuseblk(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x31000, &(0x7f0000000440)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x30, 0x63, 0x32, 0x31, 0x34, 0x61, 0x31, 0x5d0dd02facb9f1c8], 0x2d, [0x33, 0x34, 0x61], 0x2d, [0x51, 0x63, 0x63, 0x36], 0x2d, [0x61, 0x0, 0x38, 0x31], 0x2d, [0x30, 0x34, 0x32, 0x67, 0x32, 0x30, 0x62, 0x30]}}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, ':N$:'}}]}}) (async) read$proc_mixer(r0, &(0x7f0000000140)=""/82, 0x52) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) (async) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, 0x0) (async) write$proc_mixer(r3, &(0x7f0000000540)=[{'ALTPCM', @void}, {'LINE2', @void}], 0xd) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r4) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r6, 0x811, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) (async) sendmsg$SMC_PNETID_DEL(r4, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r6, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'wlan0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x868) (async) 08:33:12 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000040)=r9) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r10, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r11, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r12, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r8, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r6, &(0x7f0000006580)={0x60, 0x0, r7, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r7, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, r3, r5}, 0xc) [ 1602.805877] CPU: 1 PID: 10111 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1602.813775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1602.823120] Call Trace: [ 1602.825708] dump_stack+0x1b2/0x281 [ 1602.829339] should_fail.cold+0x10a/0x149 [ 1602.833492] should_failslab+0xd6/0x130 [ 1602.837464] __kmalloc+0x2c1/0x400 [ 1602.841002] ? match_strdup+0x58/0xa0 [ 1602.844802] match_strdup+0x58/0xa0 [ 1602.848435] fuse_fill_super+0x2e1/0x15c0 [ 1602.852591] ? fuse_get_root_inode+0xc0/0xc0 [ 1602.857000] ? up_write+0x17/0x60 [ 1602.860444] ? register_shrinker+0x15f/0x220 [ 1602.864849] ? sget_userns+0x768/0xc10 [ 1602.868742] ? get_anon_bdev+0x1c0/0x1c0 [ 1602.872799] ? sget+0xd9/0x110 [ 1602.875990] ? fuse_get_root_inode+0xc0/0xc0 [ 1602.880389] mount_nodev+0x4c/0xf0 [ 1602.883924] mount_fs+0x92/0x2a0 [ 1602.887290] vfs_kern_mount.part.0+0x5b/0x470 [ 1602.891784] do_mount+0xe65/0x2a30 [ 1602.895322] ? __do_page_fault+0x159/0xad0 [ 1602.899552] ? retint_kernel+0x2d/0x2d 08:33:12 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) [ 1602.903438] ? copy_mount_string+0x40/0x40 [ 1602.907671] ? memset+0x20/0x40 [ 1602.910951] ? copy_mount_options+0x1fa/0x2f0 [ 1602.915443] ? copy_mnt_ns+0xa30/0xa30 [ 1602.919325] SyS_mount+0xa8/0x120 [ 1602.922772] ? copy_mnt_ns+0xa30/0xa30 [ 1602.926652] do_syscall_64+0x1d5/0x640 [ 1602.930538] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1602.935716] RIP: 0033:0x7f2196c8261a [ 1602.939416] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1602.947117] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a 08:33:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 23) 08:33:12 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000040)=r8) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r9, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r10, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r11, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r7, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r5, &(0x7f0000006580)={0x60, 0x0, r6, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r6, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) 08:33:12 executing program 4: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000810}, 0x8010) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) (async) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), r0) (async) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)='$', 0x1) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = getegid() write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) (async) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0xffffffffffffffda, 0x0, {0x6, 0x4, 0x0, {0x0, 0x101, 0x3, 0xfa23, 0x9, 0x401, 0x1, 0x0, 0x1, 0x2000, 0x6, r2, r4, 0x401}}}, 0x78) 08:33:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1602.954385] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1602.961649] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1602.968908] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1602.976170] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:12 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$unlink(0x9, r0, r1) 08:33:12 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000040)=r8) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r9, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r10, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r11, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r7, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r5, &(0x7f0000006580)={0x60, 0x0, r6, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r6, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) [ 1603.089368] FAULT_INJECTION: forcing a failure. [ 1603.089368] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.149241] CPU: 0 PID: 10174 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1603.157145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.166494] Call Trace: [ 1603.169097] dump_stack+0x1b2/0x281 [ 1603.172728] should_fail.cold+0x10a/0x149 [ 1603.176891] should_failslab+0xd6/0x130 [ 1603.180869] __kmalloc+0x2c1/0x400 [ 1603.184420] ? match_strdup+0x58/0xa0 [ 1603.188215] ? map_id_down+0xe9/0x180 [ 1603.192019] match_strdup+0x58/0xa0 [ 1603.195646] fuse_fill_super+0x21d/0x15c0 [ 1603.199790] ? fuse_get_root_inode+0xc0/0xc0 [ 1603.204190] ? up_write+0x17/0x60 [ 1603.207633] ? register_shrinker+0x15f/0x220 [ 1603.212035] ? sget_userns+0x768/0xc10 [ 1603.215921] ? get_anon_bdev+0x1c0/0x1c0 [ 1603.219971] ? sget+0xd9/0x110 [ 1603.223158] ? fuse_get_root_inode+0xc0/0xc0 [ 1603.227562] mount_nodev+0x4c/0xf0 [ 1603.231102] mount_fs+0x92/0x2a0 [ 1603.234464] vfs_kern_mount.part.0+0x5b/0x470 [ 1603.238956] do_mount+0xe65/0x2a30 [ 1603.242493] ? __do_page_fault+0x159/0xad0 08:33:12 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$unlink(0x9, r0, r1) (async) 08:33:12 executing program 4: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000810}, 0x8010) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), r0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)='$', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@GTPA_LINK={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000810}, 0x8010) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000040)={'syzkaller0\x00', {0x2, 0x4e24, @rand_addr=0x64010100}}) (async) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), r0) (async) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)='$', 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) 08:33:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x6}}, 0xffffffffffffffef) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r1, &(0x7f00000065c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, r2, {0x4}}, 0x18) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="10b786", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = getegid() read$FUSE(r5, &(0x7f0000004580)={0x2020}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000004540)={0x20, 0xfffffffffffffffe}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="e81a0398b8a7d1ef7228a0383504ee5aeaa5"]) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000002500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r7, @ANYBLOB="2c726f6f746d6fc88d3d30303030303030303030303030303030303032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',\x00']) setfsgid(r8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002700)=ANY=[@ANYBLOB="b002000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000008000000000000000600000000400000050000000ca10000010000000000000069000000000000000500000000000000ff0300000000000001000000000000000500000000000000f2000000400000000800000000a0000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="e7b20000d60f000000000000040000000000000009000000000000000a000000f8ffffffe5232f6465762f66757365000000000000000500000000000000030000000000000006000000000000000100000000000000780000000100000004000000000000000500000000000000010400000000000001000000000000005d00000000000000afb50000000000000002000005000400070000000080000001000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="fffffffff9ffffff00000000040000000000000000000000000000000a000000090000002f6465762f667573650000000000000000000000000000000100000000000000ffffff7f00000000010001000000000004000000ff0f00000200000000000000020000000000000000240000000000000180000000000000db00000000000000cbb1080000000000528d000001000000ffffff7f00c0000009000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="060000000000000000000000060000000000000008000000000000000a000000200000002f6465762f6675736500000000000000000000000000000002000000000000000600000000000000ffffffffffffff7f01000100a7000000060000000000000801000080ffffffff6fb1b950000000000200000000000000ff0300000000000000000000000000dcff01000002000000ffffffff00200000f5960000", @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="060000004000000000000000040000000000000000000080ffffffff0a000000080000002f6465762f6675736500000000000000"], 0x2b0) 08:33:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x6}}, 0xffffffffffffffef) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r1, &(0x7f00000065c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, r2, {0x4}}, 0x18) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="10b786", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r6 = getegid() read$FUSE(r5, &(0x7f0000004580)={0x2020}, 0x2020) (async) write$FUSE_OPEN(r1, &(0x7f0000004540)={0x20, 0xfffffffffffffffe}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="e81a0398b8a7d1ef7228a0383504ee5aeaa5"]) (async) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000002500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r7, @ANYBLOB="2c726f6f746d6fc88d3d30303030303030303030303030303030303032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',\x00']) (async) setfsgid(r8) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002700)=ANY=[@ANYBLOB="b002000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000008000000000000000600000000400000050000000ca10000010000000000000069000000000000000500000000000000ff0300000000000001000000000000000500000000000000f2000000400000000800000000a0000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="e7b20000d60f000000000000040000000000000009000000000000000a000000f8ffffffe5232f6465762f66757365000000000000000500000000000000030000000000000006000000000000000100000000000000780000000100000004000000000000000500000000000000010400000000000001000000000000005d00000000000000afb50000000000000002000005000400070000000080000001000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="fffffffff9ffffff00000000040000000000000000000000000000000a000000090000002f6465762f667573650000000000000000000000000000000100000000000000ffffff7f00000000010001000000000004000000ff0f00000200000000000000020000000000000000240000000000000180000000000000db00000000000000cbb1080000000000528d000001000000ffffff7f00c0000009000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="060000000000000000000000060000000000000008000000000000000a000000200000002f6465762f6675736500000000000000000000000000000002000000000000000600000000000000ffffffffffffff7f01000100a7000000060000000000000801000080ffffffff6fb1b950000000000200000000000000ff0300000000000000000000000000dcff01000002000000ffffffff00200000f5960000", @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="060000004000000000000000040000000000000000000080ffffffff0a000000080000002f6465762f6675736500000000000000"], 0x2b0) [ 1603.246727] ? retint_kernel+0x2d/0x2d [ 1603.250610] ? copy_mount_string+0x40/0x40 [ 1603.254843] ? memset+0x20/0x40 [ 1603.258118] ? copy_mount_options+0x1fa/0x2f0 [ 1603.262605] ? copy_mnt_ns+0xa30/0xa30 [ 1603.266488] SyS_mount+0xa8/0x120 [ 1603.269937] ? copy_mnt_ns+0xa30/0xa30 [ 1603.273821] do_syscall_64+0x1d5/0x640 [ 1603.277710] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1603.282894] RIP: 0033:0x7f2196c8261a [ 1603.286594] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:13 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000040)=r8) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r9, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r10, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r11, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r7, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r5, &(0x7f0000006580)={0x60, 0x0, r6, {{0x0, 0x0, 0x200}}}, 0x60) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0x0, r6, {0x7, 0x24, 0x1000, 0x804, 0x5, 0x0, 0x2, 0x10000}}, 0x50) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) [ 1603.294295] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1603.301552] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1603.308809] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1603.316072] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1603.323332] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:13 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 24) 08:33:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0xcc0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x4, &(0x7f0000000580)=[{&(0x7f0000000800)="fecb306c7f32e3fa691868e95652ae69b98c2811f72c34df0b652b23679571e192609e06000000d51986eca4658eac831d86aef9956a987f2d949844221126bff591a5fca66f4281a5dfb0f1976b2de86cf78e0407000000afe1efdcdcb4889d5cca3eb21bcd498b2ea60d93ff2ed33e703beb2b4aa7ad8e744cffef95efa5b92f1c7a20d0c4c166060bd27f912d0c0fefed2872c55f0052f2c36f5a2ac5ed45f68897be87b4b4f22cdaf94d20abb9352945ac8477ce687cb8b1c3fe24d40c35b9646db918ebfe85f9da395fb4ecfc39e5b6ca80977c8f3a6e3a90cb313d8c1cab6c2f4f4e350f89444ef33b69cdfd42d6fe9db96bf2227121ee51ec0b4288369a7c1e65abc4ccb87acc8bfb2176f8f7f83f4a56816943bce37a613cd6041a527b67cee19718b00eda2eaabd9ce09a519656929b33495456af6b10bac7b5ce30d10d4cfff75073fe4f09a0e66c84efcc133225fc9bc5ccfddb905cd903ea752f2e895a0d9e51dc83d050350fef0c48a1b2aeda4c5010a89cd4e96eddab8e5f4696dfe8294b2de2c0ccb7cf874068a56f3e8cabf8bef129e80392166f45ff4000dab698c39e11c995be535d88577538f2b71ab82c1a", 0x1b5, 0x1}, {&(0x7f0000000340)="9df74690d63a61c5ae123b85ab0b90577cdd13e566bddf66ad26c4d56a38f57c9d7703e995c905d30a8629bc389d1b75ea27b88d524224f2b4d4c0f908cc9fe6f4db05332258454e07ff7f295389a43dd11233a3f521418ffd19195ff4b7e8ce371181be29be74e1ee70a2e83115dea214afefa4640868649318512450528454d262d1d28643b933a79b9de51f8efd7b3c4d", 0x92, 0x401}, {&(0x7f0000000400)="b50378023ac92f09ac18e23e44b83846b29f71b4b798f814c4706d6e3d1dfb8d1d23edba78cf20efcace6d080bc8dd1e122a26b3951d21ea34305d83cd958aeb4f8b7257de2df76768dcb75b93bf4b99e5fb56f9d8597fa90307874327897ab0bc2057a542b80435de4e3f1f23d736b8087a3b2e92ebcf5cc47a3794ed12f48530a10193c4a40fe162679b502ec1fb47d64bfe00a68d4561d32364754ac2a697ccb55f51ea1a83f4fd3e5cd34fe7fa08d716d119e12e47b4e6b58a6c424cd22feca8866d9ea7ea7b1cfa476449394a985e0496ae19aee67a3a4a51d06b0d224fad4e5d39463785908204025f88ce15ee6baa3c", 0xf3, 0x6}, {&(0x7f0000000500)="353d4e9e3f1bcb7abad2208d620d78620c222cde45489894b36a99a5f61775a4a7e7001857e7f5938e4e906c2095718fae20d67326f2bcc431806c325e31a9609e1801e4705336b9d426e1685c92261f5ba72b7b24ff374f7b", 0x59, 0x8}], 0x100040, &(0x7f0000000600)=ANY=[@ANYBLOB='_,\x00']) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000180)={'fscrypt:', @auto=[0x33, 0x35, 0x66, 0x0, 0x61, 0x63, 0x63, 0x63, 0x32, 0x61, 0x0, 0x38, 0x39, 0x62, 0x30, 0x34]}, &(0x7f00000001c0)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0xfffffdac, 0xfffffffffffffffc) 08:33:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, r3, {0x0, 0x3}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000120000,user_id=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x6}}, 0xffffffffffffffef) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r1, &(0x7f00000065c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, r2, {0x4}}, 0x18) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="10b786", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = getegid() read$FUSE(r5, &(0x7f0000004580)={0x2020}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000004540)={0x20, 0xfffffffffffffffe}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="e81a0398b8a7d1ef7228a0383504ee5aeaa5"]) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000002500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r7, @ANYBLOB="2c726f6f746d6fc88d3d30303030303030303030303030303030303032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',\x00']) setfsgid(r8) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002700)=ANY=[@ANYBLOB="b002000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000008000000000000000600000000400000050000000ca10000010000000000000069000000000000000500000000000000ff0300000000000001000000000000000500000000000000f2000000400000000800000000a0000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="e7b20000d60f000000000000040000000000000009000000000000000a000000f8ffffffe5232f6465762f66757365000000000000000500000000000000030000000000000006000000000000000100000000000000780000000100000004000000000000000500000000000000010400000000000001000000000000005d00000000000000afb50000000000000002000005000400070000000080000001000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="fffffffff9ffffff00000000040000000000000000000000000000000a000000090000002f6465762f667573650000000000000000000000000000000100000000000000ffffff7f00000000010001000000000004000000ff0f00000200000000000000020000000000000000240000000000000180000000000000db00000000000000cbb1080000000000528d000001000000ffffff7f00c0000009000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="060000000000000000000000060000000000000008000000000000000a000000200000002f6465762f6675736500000000000000000000000000000002000000000000000600000000000000ffffffffffffff7f01000100a7000000060000000000000801000080ffffffff6fb1b950000000000200000000000000ff0300000000000000000000000000dcff01000002000000ffffffff00200000f5960000", @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="060000004000000000000000040000000000000000000080ffffffff0a000000080000002f6465762f6675736500000000000000"], 0x2b0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x6}}, 0xffffffffffffffef) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f00000065c0)={0x2020}, 0x2020) (async) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, r2, {0x4}}, 0x18) (async) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="10b786", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) read$FUSE(r5, &(0x7f0000004580)={0x2020}, 0x2020) (async) write$FUSE_OPEN(r1, &(0x7f0000004540)={0x20, 0xfffffffffffffffe}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB="e81a0398b8a7d1ef7228a0383504ee5aeaa5"]) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000002500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r7, @ANYBLOB="2c726f6f746d6fc88d3d30303030303030303030303030303030303032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r8, @ANYBLOB=',\x00']) (async) setfsgid(r8) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002700)=ANY=[@ANYBLOB="b002000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000000000000000000008000000000000000600000000400000050000000ca10000010000000000000069000000000000000500000000000000ff0300000000000001000000000000000500000000000000f2000000400000000800000000a0000000000000", @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="e7b20000d60f000000000000040000000000000009000000000000000a000000f8ffffffe5232f6465762f66757365000000000000000500000000000000030000000000000006000000000000000100000000000000780000000100000004000000000000000500000000000000010400000000000001000000000000005d00000000000000afb50000000000000002000005000400070000000080000001000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="fffffffff9ffffff00000000040000000000000000000000000000000a000000090000002f6465762f667573650000000000000000000000000000000100000000000000ffffff7f00000000010001000000000004000000ff0f00000200000000000000020000000000000000240000000000000180000000000000db00000000000000cbb1080000000000528d000001000000ffffff7f00c0000009000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="060000000000000000000000060000000000000008000000000000000a000000200000002f6465762f6675736500000000000000000000000000000002000000000000000600000000000000ffffffffffffff7f01000100a7000000060000000000000801000080ffffffff6fb1b950000000000200000000000000ff0300000000000000000000000000dcff01000002000000ffffffff00200000f5960000", @ANYRES32=r3, @ANYRES32=r6, @ANYBLOB="060000004000000000000000040000000000000000000080ffffffff0a000000080000002f6465762f6675736500000000000000"], 0x2b0) (async) 08:33:13 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000040)=r8) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r9, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r10, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r11, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r7, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r5, &(0x7f0000006580)={0x60, 0x0, r6, {{0x0, 0x0, 0x200}}}, 0x60) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) 08:33:13 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r9, 0x8004e500, &(0x7f0000000040)=r8) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r9, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r10, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r11, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r7, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) write$FUSE_STATFS(r5, &(0x7f0000006580)={0x60, 0x0, r6, {{0x0, 0x0, 0x200}}}, 0x60) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) 08:33:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, r3, {0x0, 0x3}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000120000,user_id=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:13 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0xcc0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x4, &(0x7f0000000580)=[{&(0x7f0000000800)="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", 0x1b5, 0x1}, {&(0x7f0000000340)="9df74690d63a61c5ae123b85ab0b90577cdd13e566bddf66ad26c4d56a38f57c9d7703e995c905d30a8629bc389d1b75ea27b88d524224f2b4d4c0f908cc9fe6f4db05332258454e07ff7f295389a43dd11233a3f521418ffd19195ff4b7e8ce371181be29be74e1ee70a2e83115dea214afefa4640868649318512450528454d262d1d28643b933a79b9de51f8efd7b3c4d", 0x92, 0x401}, {&(0x7f0000000400)="b50378023ac92f09ac18e23e44b83846b29f71b4b798f814c4706d6e3d1dfb8d1d23edba78cf20efcace6d080bc8dd1e122a26b3951d21ea34305d83cd958aeb4f8b7257de2df76768dcb75b93bf4b99e5fb56f9d8597fa90307874327897ab0bc2057a542b80435de4e3f1f23d736b8087a3b2e92ebcf5cc47a3794ed12f48530a10193c4a40fe162679b502ec1fb47d64bfe00a68d4561d32364754ac2a697ccb55f51ea1a83f4fd3e5cd34fe7fa08d716d119e12e47b4e6b58a6c424cd22feca8866d9ea7ea7b1cfa476449394a985e0496ae19aee67a3a4a51d06b0d224fad4e5d39463785908204025f88ce15ee6baa3c", 0xf3, 0x6}, {&(0x7f0000000500)="353d4e9e3f1bcb7abad2208d620d78620c222cde45489894b36a99a5f61775a4a7e7001857e7f5938e4e906c2095718fae20d67326f2bcc431806c325e31a9609e1801e4705336b9d426e1685c92261f5ba72b7b24ff374f7b", 0x59, 0x8}], 0x100040, &(0x7f0000000600)=ANY=[@ANYBLOB='_,\x00']) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000180)={'fscrypt:', @auto=[0x33, 0x35, 0x66, 0x0, 0x61, 0x63, 0x63, 0x63, 0x32, 0x61, 0x0, 0x38, 0x39, 0x62, 0x30, 0x34]}, &(0x7f00000001c0)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0xfffffdac, 0xfffffffffffffffc) (rerun: 32) 08:33:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) ioprio_get$uid(0x0, 0xee01) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x5, 0x10000, 0x5e}}, 0x28) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r3, &(0x7f0000004300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, r4, {{0x7fffffff, 0x8a, 0x101, 0x7ff, 0x9, 0x81, 0xfffffffc}}}, 0x60) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r6, 0xee01, 0xee00}, 0xc) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000080000000000000174eea85b749f68e1e00"/40, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1603.504037] FAULT_INJECTION: forcing a failure. [ 1603.504037] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.528460] CPU: 1 PID: 10256 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1603.536358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.545711] Call Trace: [ 1603.548297] dump_stack+0x1b2/0x281 [ 1603.551926] should_fail.cold+0x10a/0x149 [ 1603.556070] should_failslab+0xd6/0x130 [ 1603.560037] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1603.564684] fuse_fill_super+0x74f/0x15c0 [ 1603.568810] ? fuse_get_root_inode+0xc0/0xc0 [ 1603.573197] ? up_write+0x17/0x60 [ 1603.576627] ? register_shrinker+0x15f/0x220 [ 1603.581010] ? sget_userns+0x768/0xc10 [ 1603.584875] ? get_anon_bdev+0x1c0/0x1c0 [ 1603.588909] ? sget+0xd9/0x110 [ 1603.592078] ? fuse_get_root_inode+0xc0/0xc0 [ 1603.596462] mount_nodev+0x4c/0xf0 [ 1603.599975] mount_fs+0x92/0x2a0 [ 1603.603321] vfs_kern_mount.part.0+0x5b/0x470 [ 1603.607791] do_mount+0xe65/0x2a30 [ 1603.611310] ? __do_page_fault+0x159/0xad0 [ 1603.615528] ? retint_kernel+0x2d/0x2d [ 1603.619397] ? copy_mount_string+0x40/0x40 [ 1603.623609] ? memset+0x20/0x40 [ 1603.626865] ? copy_mount_options+0x1fa/0x2f0 [ 1603.631334] ? copy_mnt_ns+0xa30/0xa30 [ 1603.635198] SyS_mount+0xa8/0x120 [ 1603.638634] ? copy_mnt_ns+0xa30/0xa30 [ 1603.642504] do_syscall_64+0x1d5/0x640 [ 1603.646371] entry_SYSCALL_64_after_hwframe+0x46/0xbb 08:33:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20, 0x0, r3, {0x0, 0x3}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000120000,user_id=\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:13 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 25) [ 1603.651532] RIP: 0033:0x7f2196c8261a [ 1603.655220] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1603.662903] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1603.670160] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1603.677419] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1603.684665] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1603.691907] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:13 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r5, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) read$FUSE(r1, &(0x7f0000002380)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r8, &(0x7f0000006400)={0x150, 0xfffffffffffffffe, r9, [{{0x3, 0x3, 0x9, 0x6, 0x3, 0x3, {0x5, 0x8, 0x69, 0x3, 0xffffffff, 0x8, 0x1, 0x3, 0x2, 0x7000, 0x9, r2, r10, 0x2, 0x6}}, {0x0, 0x7ff, 0x8, 0x6, '\\\',{!(--'}}, {{0x2, 0x1, 0x4, 0xaee, 0x8, 0x3, {0x2, 0xc2, 0x8, 0x7, 0x6, 0x7f, 0x52, 0x78e, 0x8001, 0x2000, 0x4, 0xee01, r6, 0x1, 0x2}}, {0x2, 0x9, 0x1, 0x2, ','}}]}, 0x150) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}}) 08:33:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) ioprio_get$uid(0x0, 0xee01) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x5, 0x10000, 0x5e}}, 0x28) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r3, &(0x7f0000004300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, r4, {{0x7fffffff, 0x8a, 0x101, 0x7ff, 0x9, 0x81, 0xfffffffc}}}, 0x60) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r6, 0xee01, 0xee00}, 0xc) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000080000000000000174eea85b749f68e1e00"/40, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) ioprio_get$uid(0x0, 0xee01) (async) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x5, 0x10000, 0x5e}}, 0x28) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r3, &(0x7f0000004300)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, r4, {{0x7fffffff, 0x8a, 0x101, 0x7ff, 0x9, 0x81, 0xfffffffc}}}, 0x60) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) (async) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r6, 0xee01, 0xee00}, 0xc) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000080000000000000174eea85b749f68e1e00"/40, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:33:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:13 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r5) read$FUSE(r1, &(0x7f0000002380)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000043c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1603.786621] FAULT_INJECTION: forcing a failure. [ 1603.786621] name failslab, interval 1, probability 0, space 0, times 0 [ 1603.835231] CPU: 1 PID: 10300 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1603.843134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1603.852480] Call Trace: [ 1603.855067] dump_stack+0x1b2/0x281 [ 1603.858695] should_fail.cold+0x10a/0x149 [ 1603.862851] should_failslab+0xd6/0x130 [ 1603.866835] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1603.871937] bdi_alloc_node+0x5d/0x2e0 [ 1603.875822] super_setup_bdi_name+0x8b/0x220 [ 1603.880222] ? kill_block_super+0xe0/0xe0 08:33:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000002240)={0x110, 0xfffffffffffffffe, r2, [{0x6, 0x1f, 0x2, 0x3, '[^'}, {0x0, 0x4, 0x2, 0x80, '\\('}, {0x0, 0x4, 0x1, 0x8001, '('}, {0x6, 0x4, 0xa, 0x8, '/dev/fuse\x00'}, {0x5, 0x10001, 0xa, 0x0, '/dev/fuse\x00'}, {0x6, 0x2, 0xa, 0x1000, '/dev/fuse\x00'}, {0x5, 0xfffffffffffffff8, 0xa, 0x20, '/dev/fuse\x00'}]}, 0x110) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x6}}, 0x18) 08:33:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000002240)={0x110, 0xfffffffffffffffe, r2, [{0x6, 0x1f, 0x2, 0x3, '[^'}, {0x0, 0x4, 0x2, 0x80, '\\('}, {0x0, 0x4, 0x1, 0x8001, '('}, {0x6, 0x4, 0xa, 0x8, '/dev/fuse\x00'}, {0x5, 0x10001, 0xa, 0x0, '/dev/fuse\x00'}, {0x6, 0x2, 0xa, 0x1000, '/dev/fuse\x00'}, {0x5, 0xfffffffffffffff8, 0xa, 0x20, '/dev/fuse\x00'}]}, 0x110) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) (async) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x6}}, 0x18) [ 1603.884363] ? __lockdep_init_map+0x100/0x560 [ 1603.888851] ? do_raw_spin_unlock+0x164/0x220 [ 1603.893347] fuse_fill_super+0x937/0x15c0 [ 1603.897495] ? fuse_get_root_inode+0xc0/0xc0 [ 1603.901909] ? up_write+0x17/0x60 [ 1603.905359] ? register_shrinker+0x15f/0x220 [ 1603.909767] ? sget_userns+0x768/0xc10 [ 1603.913656] ? get_anon_bdev+0x1c0/0x1c0 [ 1603.917708] ? sget+0xd9/0x110 [ 1603.920894] ? fuse_get_root_inode+0xc0/0xc0 [ 1603.925298] mount_nodev+0x4c/0xf0 [ 1603.928825] mount_fs+0x92/0x2a0 [ 1603.932181] vfs_kern_mount.part.0+0x5b/0x470 [ 1603.936685] do_mount+0xe65/0x2a30 [ 1603.940228] ? __do_page_fault+0x159/0xad0 [ 1603.944460] ? retint_kernel+0x2d/0x2d [ 1603.948345] ? copy_mount_string+0x40/0x40 [ 1603.952578] ? memset+0x20/0x40 [ 1603.955852] ? copy_mount_options+0x1fa/0x2f0 [ 1603.960341] ? copy_mnt_ns+0xa30/0xa30 [ 1603.964223] SyS_mount+0xa8/0x120 [ 1603.967665] ? copy_mnt_ns+0xa30/0xa30 [ 1603.971533] do_syscall_64+0x1d5/0x640 [ 1603.975411] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1603.980576] RIP: 0033:0x7f2196c8261a [ 1603.984263] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1603.991944] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1603.999187] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1604.006433] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1604.013680] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1604.020935] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 [ 1604.057390] print_req_error: I/O error, dev loop3, sector 0 08:33:14 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0xcc0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x4, &(0x7f0000000580)=[{&(0x7f0000000800)="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", 0x1b5, 0x1}, {&(0x7f0000000340)="9df74690d63a61c5ae123b85ab0b90577cdd13e566bddf66ad26c4d56a38f57c9d7703e995c905d30a8629bc389d1b75ea27b88d524224f2b4d4c0f908cc9fe6f4db05332258454e07ff7f295389a43dd11233a3f521418ffd19195ff4b7e8ce371181be29be74e1ee70a2e83115dea214afefa4640868649318512450528454d262d1d28643b933a79b9de51f8efd7b3c4d", 0x92, 0x401}, {&(0x7f0000000400)="b50378023ac92f09ac18e23e44b83846b29f71b4b798f814c4706d6e3d1dfb8d1d23edba78cf20efcace6d080bc8dd1e122a26b3951d21ea34305d83cd958aeb4f8b7257de2df76768dcb75b93bf4b99e5fb56f9d8597fa90307874327897ab0bc2057a542b80435de4e3f1f23d736b8087a3b2e92ebcf5cc47a3794ed12f48530a10193c4a40fe162679b502ec1fb47d64bfe00a68d4561d32364754ac2a697ccb55f51ea1a83f4fd3e5cd34fe7fa08d716d119e12e47b4e6b58a6c424cd22feca8866d9ea7ea7b1cfa476449394a985e0496ae19aee67a3a4a51d06b0d224fad4e5d39463785908204025f88ce15ee6baa3c", 0xf3, 0x6}, {&(0x7f0000000500)="353d4e9e3f1bcb7abad2208d620d78620c222cde45489894b36a99a5f61775a4a7e7001857e7f5938e4e906c2095718fae20d67326f2bcc431806c325e31a9609e1801e4705336b9d426e1685c92261f5ba72b7b24ff374f7b", 0x59, 0x8}], 0x100040, &(0x7f0000000600)=ANY=[@ANYBLOB='_,\x00']) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000180)={'fscrypt:', @auto=[0x33, 0x35, 0x66, 0x0, 0x61, 0x63, 0x63, 0x63, 0x32, 0x61, 0x0, 0x38, 0x39, 0x62, 0x30, 0x34]}, &(0x7f00000001c0)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0xfffffdac, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0xcc0, 0x0) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) setsockopt$sock_void(r1, 0x1, 0x1b, 0x0, 0x0) (async) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x4, &(0x7f0000000580)=[{&(0x7f0000000800)="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", 0x1b5, 0x1}, {&(0x7f0000000340)="9df74690d63a61c5ae123b85ab0b90577cdd13e566bddf66ad26c4d56a38f57c9d7703e995c905d30a8629bc389d1b75ea27b88d524224f2b4d4c0f908cc9fe6f4db05332258454e07ff7f295389a43dd11233a3f521418ffd19195ff4b7e8ce371181be29be74e1ee70a2e83115dea214afefa4640868649318512450528454d262d1d28643b933a79b9de51f8efd7b3c4d", 0x92, 0x401}, {&(0x7f0000000400)="b50378023ac92f09ac18e23e44b83846b29f71b4b798f814c4706d6e3d1dfb8d1d23edba78cf20efcace6d080bc8dd1e122a26b3951d21ea34305d83cd958aeb4f8b7257de2df76768dcb75b93bf4b99e5fb56f9d8597fa90307874327897ab0bc2057a542b80435de4e3f1f23d736b8087a3b2e92ebcf5cc47a3794ed12f48530a10193c4a40fe162679b502ec1fb47d64bfe00a68d4561d32364754ac2a697ccb55f51ea1a83f4fd3e5cd34fe7fa08d716d119e12e47b4e6b58a6c424cd22feca8866d9ea7ea7b1cfa476449394a985e0496ae19aee67a3a4a51d06b0d224fad4e5d39463785908204025f88ce15ee6baa3c", 0xf3, 0x6}, {&(0x7f0000000500)="353d4e9e3f1bcb7abad2208d620d78620c222cde45489894b36a99a5f61775a4a7e7001857e7f5938e4e906c2095718fae20d67326f2bcc431806c325e31a9609e1801e4705336b9d426e1685c92261f5ba72b7b24ff374f7b", 0x59, 0x8}], 0x100040, &(0x7f0000000600)=ANY=[@ANYBLOB='_,\x00']) (async) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000180)={'fscrypt:', @auto=[0x33, 0x35, 0x66, 0x0, 0x61, 0x63, 0x63, 0x63, 0x32, 0x61, 0x0, 0x38, 0x39, 0x62, 0x30, 0x34]}, &(0x7f00000001c0)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0xfffffdac, 0xfffffffffffffffc) (async) 08:33:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000002240)={0x110, 0xfffffffffffffffe, r2, [{0x6, 0x1f, 0x2, 0x3, '[^'}, {0x0, 0x4, 0x2, 0x80, '\\('}, {0x0, 0x4, 0x1, 0x8001, '('}, {0x6, 0x4, 0xa, 0x8, '/dev/fuse\x00'}, {0x5, 0x10001, 0xa, 0x0, '/dev/fuse\x00'}, {0x6, 0x2, 0xa, 0x1000, '/dev/fuse\x00'}, {0x5, 0xfffffffffffffff8, 0xa, 0x20, '/dev/fuse\x00'}]}, 0x110) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) (async) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x6}}, 0x18) 08:33:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,userOid=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:14 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 26) 08:33:14 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r5) read$FUSE(r1, &(0x7f0000002380)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) 08:33:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async, rerun: 32) ioprio_get$uid(0x0, 0xee01) (rerun: 32) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000140)={0x28, 0x2, 0x0, {0x5, 0x10000, 0x5e}}, 0x28) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r3, &(0x7f0000004300)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, r4, {{0x7fffffff, 0x8a, 0x101, 0x7ff, 0x9, 0x81, 0xfffffffc}}}, 0x60) (async) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={r6, 0xee01, 0xee00}, 0xc) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000080000000000000174eea85b749f68e1e00"/40, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (rerun: 32) [ 1604.341130] print_req_error: I/O error, dev loop3, sector 0 08:33:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,userOid=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:14 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r5) read$FUSE(r1, &(0x7f0000002380)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) 08:33:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setgroups(0x2, &(0x7f0000000040)=[0xffffffffffffffff, 0xee00]) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1604.445078] FAULT_INJECTION: forcing a failure. [ 1604.445078] name failslab, interval 1, probability 0, space 0, times 0 [ 1604.483184] CPU: 0 PID: 10394 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1604.491090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.500433] Call Trace: [ 1604.503018] dump_stack+0x1b2/0x281 [ 1604.506646] should_fail.cold+0x10a/0x149 [ 1604.510792] should_failslab+0xd6/0x130 [ 1604.514766] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1604.519870] bdi_alloc_node+0x5d/0x2e0 [ 1604.523756] super_setup_bdi_name+0x8b/0x220 [ 1604.528163] ? kill_block_super+0xe0/0xe0 [ 1604.532309] ? __lockdep_init_map+0x100/0x560 [ 1604.536802] ? do_raw_spin_unlock+0x164/0x220 [ 1604.541301] fuse_fill_super+0x937/0x15c0 [ 1604.545441] ? fuse_get_root_inode+0xc0/0xc0 [ 1604.549829] ? up_write+0x17/0x60 [ 1604.553265] ? register_shrinker+0x15f/0x220 [ 1604.557665] ? sget_userns+0x768/0xc10 [ 1604.561530] ? get_anon_bdev+0x1c0/0x1c0 [ 1604.565566] ? sget+0xd9/0x110 [ 1604.568734] ? fuse_get_root_inode+0xc0/0xc0 [ 1604.573126] mount_nodev+0x4c/0xf0 [ 1604.576650] mount_fs+0x92/0x2a0 [ 1604.579995] vfs_kern_mount.part.0+0x5b/0x470 [ 1604.584472] do_mount+0xe65/0x2a30 [ 1604.587992] ? __do_page_fault+0x159/0xad0 [ 1604.592219] ? retint_kernel+0x2d/0x2d [ 1604.596096] ? copy_mount_string+0x40/0x40 [ 1604.600315] ? memset+0x20/0x40 [ 1604.603577] ? copy_mount_options+0x1fa/0x2f0 [ 1604.608049] ? copy_mnt_ns+0xa30/0xa30 [ 1604.611923] SyS_mount+0xa8/0x120 [ 1604.615358] ? copy_mnt_ns+0xa30/0xa30 [ 1604.619224] do_syscall_64+0x1d5/0x640 [ 1604.623097] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1604.628272] RIP: 0033:0x7f2196c8261a [ 1604.631969] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,userOid=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) setgroups(0x2, &(0x7f0000000040)=[0xffffffffffffffff, 0xee00]) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1604.639662] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1604.646906] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1604.654153] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1604.661399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1604.668644] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:14 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d557f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "3a2815fc448d6a262f4e5844b1019814ff03f60ac172bf6fb45a29d1f84ed42407af577df60bc643424f63ebbe0e8f006fbd601bc352aec6826e0b12266c4c77", 0x3b}, 0x48, r0) keyctl$clear(0x7, r2) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) keyctl$unlink(0x9, r4, r5) 08:33:14 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r5) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) 08:33:14 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 27) [ 1604.694756] print_req_error: I/O error, dev loop3, sector 0 08:33:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) setgroups(0x2, &(0x7f0000000040)=[0xffffffffffffffff, 0xee00]) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:14 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=0x1, 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:14 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d557f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffa) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "3a2815fc448d6a262f4e5844b1019814ff03f60ac172bf6fb45a29d1f84ed42407af577df60bc643424f63ebbe0e8f006fbd601bc352aec6826e0b12266c4c77", 0x3b}, 0x48, r0) keyctl$clear(0x7, r2) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) keyctl$unlink(0x9, r4, r5) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d557f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffa) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "3a2815fc448d6a262f4e5844b1019814ff03f60ac172bf6fb45a29d1f84ed42407af577df60bc643424f63ebbe0e8f006fbd601bc352aec6826e0b12266c4c77", 0x3b}, 0x48, r0) (async) keyctl$clear(0x7, r2) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) keyctl$unlink(0x9, r1, r3) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) (async) keyctl$unlink(0x9, r4, r5) (async) 08:33:14 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) 08:33:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) (async) [ 1604.781152] FAULT_INJECTION: forcing a failure. [ 1604.781152] name failslab, interval 1, probability 0, space 0, times 0 [ 1604.845533] CPU: 0 PID: 10434 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1604.853446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1604.862791] Call Trace: [ 1604.865379] dump_stack+0x1b2/0x281 [ 1604.869012] should_fail.cold+0x10a/0x149 [ 1604.873171] should_failslab+0xd6/0x130 [ 1604.877155] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1604.881821] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 1604.886923] device_create_groups_vargs+0x7b/0x250 [ 1604.891853] device_create_vargs+0x3a/0x50 [ 1604.896091] bdi_register_va.part.0+0x35/0x650 [ 1604.900672] bdi_register_va+0x63/0x80 [ 1604.904555] super_setup_bdi_name+0x123/0x220 [ 1604.909047] ? kill_block_super+0xe0/0xe0 [ 1604.913195] ? do_raw_spin_unlock+0x164/0x220 [ 1604.917694] fuse_fill_super+0x937/0x15c0 [ 1604.921846] ? fuse_get_root_inode+0xc0/0xc0 [ 1604.926252] ? up_write+0x17/0x60 [ 1604.929697] ? register_shrinker+0x15f/0x220 [ 1604.934103] ? sget_userns+0x768/0xc10 [ 1604.937995] ? get_anon_bdev+0x1c0/0x1c0 [ 1604.942053] ? sget+0xd9/0x110 [ 1604.945243] ? fuse_get_root_inode+0xc0/0xc0 [ 1604.949648] mount_nodev+0x4c/0xf0 [ 1604.953184] mount_fs+0x92/0x2a0 [ 1604.956550] vfs_kern_mount.part.0+0x5b/0x470 [ 1604.961043] do_mount+0xe65/0x2a30 [ 1604.964582] ? __do_page_fault+0x159/0xad0 [ 1604.968814] ? retint_kernel+0x2d/0x2d [ 1604.972698] ? copy_mount_string+0x40/0x40 [ 1604.977018] ? memset+0x20/0x40 [ 1604.980292] ? copy_mount_options+0x1fa/0x2f0 [ 1604.984782] ? copy_mnt_ns+0xa30/0xa30 [ 1604.988663] SyS_mount+0xa8/0x120 [ 1604.992107] ? copy_mnt_ns+0xa30/0xa30 [ 1604.996011] do_syscall_64+0x1d5/0x640 [ 1604.999904] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1605.005081] RIP: 0033:0x7f2196c8261a [ 1605.008772] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1605.016465] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1605.023719] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1605.030983] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1605.038246] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 08:33:14 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000180)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d557f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffa) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "3a2815fc448d6a262f4e5844b1019814ff03f60ac172bf6fb45a29d1f84ed42407af577df60bc643424f63ebbe0e8f006fbd601bc352aec6826e0b12266c4c77", 0x3b}, 0x48, r0) keyctl$clear(0x7, r2) (async) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r3) (async) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) (async) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) (async) keyctl$unlink(0x9, r4, r5) 08:33:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgrp(0x0) capset(&(0x7f0000000200)={0x19980330, r3}, 0x0) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, r2, {{0xffffffffffffff80, 0x2c4, 0x1, r3}}}, 0x28) 08:33:14 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) (async) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=0x1, 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) (async) 08:33:14 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1605.045564] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:14 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 28) 08:33:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[], 0x28}}, 0x0) socket(0x241a9c77caccbcc9, 0x800, 0xa2cf) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000100)) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:14 executing program 4: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=0x1, 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.weight\x00', 0x2, 0x0) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='io.bfq.weight\x00', 0x2, 0x0) (async) write$cgroup_int(r0, &(0x7f00000000c0)=0x4, 0x12) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) (async) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, 0x0) (async) write$cgroup_int(r1, &(0x7f00000001c0)=0x1, 0x12) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:33:14 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 64) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) r3 = getpgrp(0x0) capset(&(0x7f0000000200)={0x19980330, r3}, 0x0) (async) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, r2, {{0xffffffffffffff80, 0x2c4, 0x1, r3}}}, 0x28) 08:33:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x40}}, 0x18) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}, {@fowner_lt}, {@dont_appraise}]}}) 08:33:14 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1605.177204] FAULT_INJECTION: forcing a failure. [ 1605.177204] name failslab, interval 1, probability 0, space 0, times 0 08:33:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) (async, rerun: 64) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[], 0x28}}, 0x0) (async, rerun: 64) socket(0x241a9c77caccbcc9, 0x800, 0xa2cf) (async) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000100)) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) [ 1605.246961] CPU: 0 PID: 10498 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1605.254859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.264210] Call Trace: [ 1605.266798] dump_stack+0x1b2/0x281 [ 1605.270429] should_fail.cold+0x10a/0x149 [ 1605.274576] should_failslab+0xd6/0x130 [ 1605.278547] __kmalloc_track_caller+0x2bc/0x400 [ 1605.283209] ? kvasprintf_const+0x55/0x180 [ 1605.287439] kvasprintf+0xa8/0x100 [ 1605.290976] ? bust_spinlocks+0xc0/0xc0 08:33:15 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[], 0x28}}, 0x0) (async) socket(0x241a9c77caccbcc9, 0x800, 0xa2cf) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000100)) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) [ 1605.294951] kvasprintf_const+0x55/0x180 [ 1605.299008] kobject_set_name_vargs+0x56/0x150 [ 1605.303582] device_create_groups_vargs+0x1a2/0x250 [ 1605.308605] device_create_vargs+0x3a/0x50 [ 1605.312840] bdi_register_va.part.0+0x35/0x650 [ 1605.317417] bdi_register_va+0x63/0x80 [ 1605.321300] super_setup_bdi_name+0x123/0x220 [ 1605.325791] ? kill_block_super+0xe0/0xe0 [ 1605.329934] ? do_raw_spin_unlock+0x164/0x220 [ 1605.334431] fuse_fill_super+0x937/0x15c0 [ 1605.338580] ? fuse_get_root_inode+0xc0/0xc0 [ 1605.342981] ? up_write+0x17/0x60 08:33:15 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000c95ef9000000000003000000850000007e0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff9, 0xc5, &(0x7f00000001c0)=""/197, 0x1f00, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000000c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x7, 0xffffffff, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x34, 0x36, 0x31, 0x64, 0x64, 0x31, 0x63, 0x34, 0x38, 0x35, 0x66, 0x33, 0x33, 0x61, 0x62, 0x34]}, &(0x7f0000000140)={0x0, "c5821c78987f0d12433f706e3e57cd30458721085f8d326cf984f6820cce3a58f4e978b2a93c5b798d0100008000", 0x32}, 0x48, 0xfffffffffffffffc) [ 1605.346429] ? register_shrinker+0x15f/0x220 [ 1605.350840] ? sget_userns+0x768/0xc10 [ 1605.354730] ? get_anon_bdev+0x1c0/0x1c0 [ 1605.358784] ? sget+0xd9/0x110 [ 1605.361973] ? fuse_get_root_inode+0xc0/0xc0 [ 1605.366390] mount_nodev+0x4c/0xf0 [ 1605.369933] mount_fs+0x92/0x2a0 [ 1605.373302] vfs_kern_mount.part.0+0x5b/0x470 [ 1605.377795] do_mount+0xe65/0x2a30 [ 1605.381334] ? __do_page_fault+0x159/0xad0 [ 1605.385573] ? retint_kernel+0x2d/0x2d [ 1605.389458] ? copy_mount_string+0x40/0x40 [ 1605.393691] ? memset+0x20/0x40 [ 1605.396965] ? copy_mount_options+0x1fa/0x2f0 [ 1605.401458] ? copy_mnt_ns+0xa30/0xa30 [ 1605.405342] SyS_mount+0xa8/0x120 [ 1605.408790] ? copy_mnt_ns+0xa30/0xa30 [ 1605.412672] do_syscall_64+0x1d5/0x640 [ 1605.416558] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1605.421735] RIP: 0033:0x7f2196c8261a [ 1605.425434] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1605.433140] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1605.440403] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 08:33:15 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000c95ef9000000000003000000850000007e0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff9, 0xc5, &(0x7f00000001c0)=""/197, 0x1f00, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000000c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x7, 0xffffffff, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x34, 0x36, 0x31, 0x64, 0x64, 0x31, 0x63, 0x34, 0x38, 0x35, 0x66, 0x33, 0x33, 0x61, 0x62, 0x34]}, &(0x7f0000000140)={0x0, "c5821c78987f0d12433f706e3e57cd30458721085f8d326cf984f6820cce3a58f4e978b2a93c5b798d0100008000", 0x32}, 0x48, 0xfffffffffffffffc) 08:33:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x40}}, 0x18) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}, {@fowner_lt}, {@dont_appraise}]}}) 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgrp(0x0) capset(&(0x7f0000000200)={0x19980330, r3}, 0x0) (async) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, r2, {{0xffffffffffffff80, 0x2c4, 0x1, r3}}}, 0x28) [ 1605.447670] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1605.454934] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1605.462194] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:15 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 29) 08:33:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x5059, 0x80000001, 0x0, {0x0, 0x5, 0x48, 0x5, 0x8, 0xffffffff, 0xff, 0x7fffffff, 0x10001, 0x8000, 0x1, r1, 0xee00, 0xffff, 0x2}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}]}}) 08:33:15 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) 08:33:15 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000c95ef9000000000003000000850000007e0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff9, 0xc5, &(0x7f00000001c0)=""/197, 0x1f00, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000000c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x7, 0xffffffff, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x34, 0x36, 0x31, 0x64, 0x64, 0x31, 0x63, 0x34, 0x38, 0x35, 0x66, 0x33, 0x33, 0x61, 0x62, 0x34]}, &(0x7f0000000140)={0x0, "c5821c78987f0d12433f706e3e57cd30458721085f8d326cf984f6820cce3a58f4e978b2a93c5b798d0100008000", 0x32}, 0x48, 0xfffffffffffffffc) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) (async) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000c95ef9000000000003000000850000007e0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xfffffff9, 0xc5, &(0x7f00000001c0)=""/197, 0x1f00, 0x4, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000000c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x7, 0xffffffff, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @auto=[0x34, 0x36, 0x31, 0x64, 0x64, 0x31, 0x63, 0x34, 0x38, 0x35, 0x66, 0x33, 0x33, 0x61, 0x62, 0x34]}, &(0x7f0000000140)={0x0, "c5821c78987f0d12433f706e3e57cd30458721085f8d326cf984f6820cce3a58f4e978b2a93c5b798d0100008000", 0x32}, 0x48, 0xfffffffffffffffc) (async) 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000027c0)=ANY=[@ANYBLOB="a8000023040e6891", @ANYRES64=0x0, @ANYBLOB="000000000000000005000000000000000400000000040000282d2a26000000000100000000000000080000000000000001000000bf0900005b000000000000000000000000000000090000000000000003000000040b00003a2b270000000000020000000000000007000000000000000400000001000080726f6f7400000000030000000000000001010000000000000000000008000000"], 0xa8) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x3}}, 0x18) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002380), 0x2, 0x0) getresuid(&(0x7f00000023c0)=0x0, &(0x7f0000002400), &(0x7f0000002440)) getresuid(&(0x7f0000002480), &(0x7f00000024c0)=0x0, &(0x7f0000002500)) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002740), 0x2, 0x0) write$FUSE_OPEN(r7, &(0x7f0000002780)={0x20, 0x0, r1, {0x0, 0x4}}, 0x20) mount$fuse(0x0, &(0x7f0000002300)='./file0\x00', &(0x7f0000002340), 0x4, &(0x7f0000002540)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x101}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@appraise}, {@uid_lt={'uid<', r5}}, {@fowner_gt={'fowner>', r2}}, {@fowner_gt={'fowner>', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+\xd5$!\x1b'}}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@obj_user={'obj_user', 0x3d, '\'-^'}}]}}) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r8, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r8, &(0x7f0000002080)={0x60, 0x0, r9}, 0x60) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r11 = getegid() write$FUSE_CREATE_OPEN(r0, &(0x7f0000002240)={0xa0, 0x0, r9, {{0x2, 0x2, 0x6, 0x800, 0x20004, 0x8000, {0x4, 0xff, 0x2cec7a6b, 0x6, 0x3, 0x100000000, 0x6, 0x6, 0x2, 0x2000, 0x200, r10, r11, 0xffff, 0xd4b}}, {0x0, 0x10}}}, 0xa0) 08:33:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x40}}, 0x18) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, 'rootmode'}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}, {@fowner_lt}, {@dont_appraise}]}}) 08:33:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x5059, 0x80000001, 0x0, {0x0, 0x5, 0x48, 0x5, 0x8, 0xffffffff, 0xff, 0x7fffffff, 0x10001, 0x8000, 0x1, r1, 0xee00, 0xffff, 0x2}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) (async) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x5059, 0x80000001, 0x0, {0x0, 0x5, 0x48, 0x5, 0x8, 0xffffffff, 0xff, 0x7fffffff, 0x10001, 0x8000, 0x1, r1, 0xee00, 0xffff, 0x2}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}]}}) (async) 08:33:15 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) 08:33:15 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1605.627323] FAULT_INJECTION: forcing a failure. [ 1605.627323] name failslab, interval 1, probability 0, space 0, times 0 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000027c0)=ANY=[@ANYBLOB="a8000023040e6891", @ANYRES64=0x0, @ANYBLOB="000000000000000005000000000000000400000000040000282d2a26000000000100000000000000080000000000000001000000bf0900005b000000000000000000000000000000090000000000000003000000040b00003a2b270000000000020000000000000007000000000000000400000001000080726f6f7400000000030000000000000001010000000000000000000008000000"], 0xa8) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x3}}, 0x18) (async, rerun: 64) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async, rerun: 64) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002380), 0x2, 0x0) (async, rerun: 32) getresuid(&(0x7f00000023c0)=0x0, &(0x7f0000002400), &(0x7f0000002440)) (rerun: 32) getresuid(&(0x7f0000002480), &(0x7f00000024c0)=0x0, &(0x7f0000002500)) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002740), 0x2, 0x0) write$FUSE_OPEN(r7, &(0x7f0000002780)={0x20, 0x0, r1, {0x0, 0x4}}, 0x20) (async) mount$fuse(0x0, &(0x7f0000002300)='./file0\x00', &(0x7f0000002340), 0x4, &(0x7f0000002540)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x101}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@appraise}, {@uid_lt={'uid<', r5}}, {@fowner_gt={'fowner>', r2}}, {@fowner_gt={'fowner>', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+\xd5$!\x1b'}}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@obj_user={'obj_user', 0x3d, '\'-^'}}]}}) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r8, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r8, &(0x7f0000002080)={0x60, 0x0, r9}, 0x60) (async) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) (async, rerun: 32) r11 = getegid() (rerun: 32) write$FUSE_CREATE_OPEN(r0, &(0x7f0000002240)={0xa0, 0x0, r9, {{0x2, 0x2, 0x6, 0x800, 0x20004, 0x8000, {0x4, 0xff, 0x2cec7a6b, 0x6, 0x3, 0x100000000, 0x6, 0x6, 0x2, 0x2000, 0x200, r10, r11, 0xffff, 0xd4b}}, {0x0, 0x10}}}, 0xa0) [ 1605.699479] CPU: 0 PID: 10571 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1605.707379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1605.716722] Call Trace: [ 1605.719312] dump_stack+0x1b2/0x281 [ 1605.722946] should_fail.cold+0x10a/0x149 [ 1605.727096] should_failslab+0xd6/0x130 [ 1605.731066] __kmalloc_track_caller+0x2bc/0x400 [ 1605.735732] ? kvasprintf_const+0x55/0x180 [ 1605.739970] kvasprintf+0xa8/0x100 [ 1605.743511] ? bust_spinlocks+0xc0/0xc0 08:33:15 executing program 0: getitimer(0x2, &(0x7f0000002280)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB="662441f84f76cd0339d59dcb6f52f9a30a6fcec729c3c84c31042d00b0908692af80d3712191d918a3e2539a171ad2e0d7cd0637b5f736d1b0a60e269f9acab2d8ddd8ed4122cd92f1897962c387c1e78dcf75b95ff9d73b23c1cc2ab00500747e56bdbbfe78a30a342e48d42e9f23129cd8a436baf6ad3826c7b7664b4814cf5541992b3d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30facb30303030ff03000030301032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="1b599d8ac0695258ccc4b046de66db8575cb99a30c41fdee5c2569ff6b86d7ec07c825e972729b626862f3fe0c70f6094a954d533d0716150aa1b5752369fc21b709997a6e96ca21bf0dfadcd9a254b5314f771d909ade6aced736337d5e8d91302bdac00904"]) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000040)=r4) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r6, &(0x7f0000002080)={0x60, 0x0, r7, {{0x0, 0x0, 0x0, 0x0, 0x100000000, 0xfffffffd}}}, 0x60) write$FUSE_IOCTL(r4, &(0x7f00000022c0)={0x20, 0x0, r7, {0x0, 0x4, 0x4, 0x20}}, 0x20) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x20, &(0x7f0000002640)=ANY=[@ANYBLOB="66643d6b5ea4dc0583d77faf03202dad1a2f2721b721091d3e0c29b9480fe01bb5c31f005d254c2a3c3f30df829fb6034bc98920d11f4d096bc703ada766f1431aeac54430b9413a97", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132c0f64470eee26e303030302c75f1ccab5be0adcd22f233fa4c61ef80e053aca22cc7a9949ded7470618a2014ac1b0935843f3cfc3b8d1188c4d49385c7b054fffdfb9c757590dd444339665743ade1e199a501a7dc34b04d5689a86a0367cc65dd93df52e1e20f1a742e3e54d6c80eb8771b557f319ea1b046b690e6364f2672a69cab9fcd2a32deb13a3d1c8f216eaeac54aefec9348f86e9db9859a2454304de994c3ff0006d3e406675d551e71d28", @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,max_read=0x0000000000000081,blksize=0x0000000000000a00,max_read=0x0000000000000006,fsmagic=0x0000000000000040,smackfshat=/dev/fuse\x00,\x00']) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="29000000030082c9d3f3743f0164000004000000000000000800000000000000726f6f746d6f646500"], 0x29) [ 1605.747485] kvasprintf_const+0x55/0x180 [ 1605.751543] kobject_set_name_vargs+0x56/0x150 [ 1605.756123] device_create_groups_vargs+0x1a2/0x250 [ 1605.761137] device_create_vargs+0x3a/0x50 [ 1605.765376] bdi_register_va.part.0+0x35/0x650 [ 1605.769955] bdi_register_va+0x63/0x80 [ 1605.773836] super_setup_bdi_name+0x123/0x220 [ 1605.778327] ? kill_block_super+0xe0/0xe0 [ 1605.782473] ? do_raw_spin_unlock+0x164/0x220 [ 1605.786971] fuse_fill_super+0x937/0x15c0 [ 1605.791120] ? fuse_get_root_inode+0xc0/0xc0 [ 1605.795521] ? up_write+0x17/0x60 08:33:15 executing program 0: getitimer(0x2, &(0x7f0000002280)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB="662441f84f76cd0339d59dcb6f52f9a30a6fcec729c3c84c31042d00b0908692af80d3712191d918a3e2539a171ad2e0d7cd0637b5f736d1b0a60e269f9acab2d8ddd8ed4122cd92f1897962c387c1e78dcf75b95ff9d73b23c1cc2ab00500747e56bdbbfe78a30a342e48d42e9f23129cd8a436baf6ad3826c7b7664b4814cf5541992b3d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30facb30303030ff03000030301032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="1b599d8ac0695258ccc4b046de66db8575cb99a30c41fdee5c2569ff6b86d7ec07c825e972729b626862f3fe0c70f6094a954d533d0716150aa1b5752369fc21b709997a6e96ca21bf0dfadcd9a254b5314f771d909ade6aced736337d5e8d91302bdac00904"]) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000040)=r4) (async) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r6, &(0x7f0000002080)={0x60, 0x0, r7, {{0x0, 0x0, 0x0, 0x0, 0x100000000, 0xfffffffd}}}, 0x60) (async) write$FUSE_IOCTL(r4, &(0x7f00000022c0)={0x20, 0x0, r7, {0x0, 0x4, 0x4, 0x20}}, 0x20) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x20, &(0x7f0000002640)=ANY=[@ANYBLOB="66643d6b5ea4dc0583d77faf03202dad1a2f2721b721091d3e0c29b9480fe01bb5c31f005d254c2a3c3f30df829fb6034bc98920d11f4d096bc703ada766f1431aeac54430b9413a97", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132c0f64470eee26e303030302c75f1ccab5be0adcd22f233fa4c61ef80e053aca22cc7a9949ded7470618a2014ac1b0935843f3cfc3b8d1188c4d49385c7b054fffdfb9c757590dd444339665743ade1e199a501a7dc34b04d5689a86a0367cc65dd93df52e1e20f1a742e3e54d6c80eb8771b557f319ea1b046b690e6364f2672a69cab9fcd2a32deb13a3d1c8f216eaeac54aefec9348f86e9db9859a2454304de994c3ff0006d3e406675d551e71d28", @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,max_read=0x0000000000000081,blksize=0x0000000000000a00,max_read=0x0000000000000006,fsmagic=0x0000000000000040,smackfshat=/dev/fuse\x00,\x00']) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="29000000030082c9d3f3743f0164000004000000000000000800000000000000726f6f746d6f646500"], 0x29) [ 1605.798964] ? register_shrinker+0x15f/0x220 [ 1605.803366] ? sget_userns+0x768/0xc10 [ 1605.807257] ? get_anon_bdev+0x1c0/0x1c0 [ 1605.811310] ? sget+0xd9/0x110 [ 1605.814498] ? fuse_get_root_inode+0xc0/0xc0 [ 1605.818901] mount_nodev+0x4c/0xf0 [ 1605.822439] mount_fs+0x92/0x2a0 [ 1605.825803] vfs_kern_mount.part.0+0x5b/0x470 [ 1605.830314] do_mount+0xe65/0x2a30 [ 1605.833853] ? __do_page_fault+0x159/0xad0 [ 1605.838081] ? retint_kernel+0x2d/0x2d [ 1605.841963] ? copy_mount_string+0x40/0x40 [ 1605.846191] ? memset+0x20/0x40 [ 1605.849465] ? copy_mount_options+0x1fa/0x2f0 [ 1605.853945] ? copy_mnt_ns+0xa30/0xa30 [ 1605.857817] SyS_mount+0xa8/0x120 [ 1605.861250] ? copy_mnt_ns+0xa30/0xa30 [ 1605.865114] do_syscall_64+0x1d5/0x640 [ 1605.868984] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1605.874160] RIP: 0033:0x7f2196c8261a [ 1605.877861] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1605.885552] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1605.892802] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 08:33:15 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 30) 08:33:15 executing program 0: getitimer(0x2, &(0x7f0000002280)) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r3 = getegid() write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)=ANY=[@ANYBLOB="662441f84f76cd0339d59dcb6f52f9a30a6fcec729c3c84c31042d00b0908692af80d3712191d918a3e2539a171ad2e0d7cd0637b5f736d1b0a60e269f9acab2d8ddd8ed4122cd92f1897962c387c1e78dcf75b95ff9d73b23c1cc2ab00500747e56bdbbfe78a30a342e48d42e9f23129cd8a436baf6ad3826c7b7664b4814cf5541992b3d", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30facb30303030ff03000030301032303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="1b599d8ac0695258ccc4b046de66db8575cb99a30c41fdee5c2569ff6b86d7ec07c825e972729b626862f3fe0c70f6094a954d533d0716150aa1b5752369fc21b709997a6e96ca21bf0dfadcd9a254b5314f771d909ade6aced736337d5e8d91302bdac00904"]) (async, rerun: 32) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000000040)=r4) (async) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r6, &(0x7f0000002080)={0x60, 0x0, r7, {{0x0, 0x0, 0x0, 0x0, 0x100000000, 0xfffffffd}}}, 0x60) (async, rerun: 64) write$FUSE_IOCTL(r4, &(0x7f00000022c0)={0x20, 0x0, r7, {0x0, 0x4, 0x4, 0x20}}, 0x20) (async, rerun: 64) read$FUSE(r1, &(0x7f0000000240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x20, &(0x7f0000002640)=ANY=[@ANYBLOB="66643d6b5ea4dc0583d77faf03202dad1a2f2721b721091d3e0c29b9480fe01bb5c31f005d254c2a3c3f30df829fb6034bc98920d11f4d096bc703ada766f1431aeac54430b9413a97", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132c0f64470eee26e303030302c75f1ccab5be0adcd22f233fa4c61ef80e053aca22cc7a9949ded7470618a2014ac1b0935843f3cfc3b8d1188c4d49385c7b054fffdfb9c757590dd444339665743ade1e199a501a7dc34b04d5689a86a0367cc65dd93df52e1e20f1a742e3e54d6c80eb8771b557f319ea1b046b690e6364f2672a69cab9fcd2a32deb13a3d1c8f216eaeac54aefec9348f86e9db9859a2454304de994c3ff0006d3e406675d551e71d28", @ANYRESDEC=r8, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,max_read=0x0000000000000081,blksize=0x0000000000000a00,max_read=0x0000000000000006,fsmagic=0x0000000000000040,smackfshat=/dev/fuse\x00,\x00']) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_ENTRY(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="29000000030082c9d3f3743f0164000004000000000000000800000000000000726f6f746d6f646500"], 0x29) 08:33:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getresuid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) write$FUSE_ATTR(r0, &(0x7f0000000140)={0x78, 0x0, 0x0, {0x5059, 0x80000001, 0x0, {0x0, 0x5, 0x48, 0x5, 0x8, 0xffffffff, 0xff, 0x7fffffff, 0x10001, 0x8000, 0x1, r1, 0xee00, 0xffff, 0x2}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}]}}) 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000027c0)=ANY=[@ANYBLOB="a8000023040e6891", @ANYRES64=0x0, @ANYBLOB="000000000000000005000000000000000400000000040000282d2a26000000000100000000000000080000000000000001000000bf0900005b000000000000000000000000000000090000000000000003000000040b00003a2b270000000000020000000000000007000000000000000400000001000080726f6f7400000000030000000000000001010000000000000000000008000000"], 0xa8) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x3}}, 0x18) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002380), 0x2, 0x0) (async) getresuid(&(0x7f00000023c0)=0x0, &(0x7f0000002400), &(0x7f0000002440)) (async) getresuid(&(0x7f0000002480), &(0x7f00000024c0)=0x0, &(0x7f0000002500)) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002740), 0x2, 0x0) write$FUSE_OPEN(r7, &(0x7f0000002780)={0x20, 0x0, r1, {0x0, 0x4}}, 0x20) (async) mount$fuse(0x0, &(0x7f0000002300)='./file0\x00', &(0x7f0000002340), 0x4, &(0x7f0000002540)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}, {@blksize}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x101}}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xc00}}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@appraise}, {@uid_lt={'uid<', r5}}, {@fowner_gt={'fowner>', r2}}, {@fowner_gt={'fowner>', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+\xd5$!\x1b'}}, {@fsmagic={'fsmagic', 0x3d, 0x80000001}}, {@obj_user={'obj_user', 0x3d, '\'-^'}}]}}) (async) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r8, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r8, &(0x7f0000002080)={0x60, 0x0, r9}, 0x60) (async) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) (async) r11 = getegid() write$FUSE_CREATE_OPEN(r0, &(0x7f0000002240)={0xa0, 0x0, r9, {{0x2, 0x2, 0x6, 0x800, 0x20004, 0x8000, {0x4, 0xff, 0x2cec7a6b, 0x6, 0x3, 0x100000000, 0x6, 0x6, 0x2, 0x2000, 0x200, r10, r11, 0xffff, 0xd4b}}, {0x0, 0x10}}}, 0xa0) 08:33:15 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) 08:33:15 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1605.900055] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1605.907302] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1605.914548] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:15 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r2, &(0x7f0000000200)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x2, 0x3}}, 0x28) [ 1606.001281] FAULT_INJECTION: forcing a failure. [ 1606.001281] name failslab, interval 1, probability 0, space 0, times 0 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r2, &(0x7f0000000200)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) read$FUSE(r2, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) [ 1606.067691] CPU: 0 PID: 10624 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1606.075590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.084937] Call Trace: [ 1606.087520] dump_stack+0x1b2/0x281 [ 1606.091152] should_fail.cold+0x10a/0x149 [ 1606.095302] should_failslab+0xd6/0x130 [ 1606.099276] __kmalloc_track_caller+0x2bc/0x400 [ 1606.103942] ? kstrdup_const+0x35/0x60 [ 1606.107820] kstrdup+0x36/0x70 [ 1606.111004] kstrdup_const+0x35/0x60 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r2, &(0x7f0000000200)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) read$FUSE(r2, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) 08:33:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x24, 0x3, 0x0, {0x0, 0x3, 0x0, ')*['}}, 0x24) [ 1606.114716] __kernfs_new_node+0x2e/0x470 [ 1606.118865] kernfs_create_dir_ns+0x8c/0x200 [ 1606.123279] sysfs_create_dir_ns+0xb7/0x1d0 [ 1606.127598] kobject_add_internal+0x28b/0x930 [ 1606.132093] kobject_add+0x11f/0x180 [ 1606.135804] ? kset_create_and_add+0x190/0x190 [ 1606.140391] device_add+0x33f/0x15c0 [ 1606.144108] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1606.149552] ? kfree_const+0x33/0x40 [ 1606.153261] ? device_is_dependent+0x2a0/0x2a0 [ 1606.157836] ? kfree+0x1f0/0x250 [ 1606.161204] device_create_groups_vargs+0x1dc/0x250 [ 1606.166222] device_create_vargs+0x3a/0x50 [ 1606.170453] bdi_register_va.part.0+0x35/0x650 [ 1606.175033] bdi_register_va+0x63/0x80 [ 1606.178918] super_setup_bdi_name+0x123/0x220 [ 1606.183416] ? kill_block_super+0xe0/0xe0 [ 1606.187552] ? do_raw_spin_unlock+0x164/0x220 [ 1606.192054] fuse_fill_super+0x937/0x15c0 [ 1606.196188] ? fuse_get_root_inode+0xc0/0xc0 [ 1606.200579] ? up_write+0x17/0x60 [ 1606.204013] ? register_shrinker+0x15f/0x220 [ 1606.208403] ? sget_userns+0x768/0xc10 [ 1606.212277] ? get_anon_bdev+0x1c0/0x1c0 [ 1606.216321] ? sget+0xd9/0x110 [ 1606.219491] ? fuse_get_root_inode+0xc0/0xc0 [ 1606.223878] mount_nodev+0x4c/0xf0 [ 1606.227401] mount_fs+0x92/0x2a0 [ 1606.230756] vfs_kern_mount.part.0+0x5b/0x470 [ 1606.235239] do_mount+0xe65/0x2a30 [ 1606.238756] ? __do_page_fault+0x159/0xad0 [ 1606.242968] ? retint_kernel+0x2d/0x2d [ 1606.246830] ? copy_mount_string+0x40/0x40 [ 1606.251049] ? memset+0x20/0x40 [ 1606.254312] ? copy_mount_options+0x1fa/0x2f0 [ 1606.258780] ? copy_mnt_ns+0xa30/0xa30 [ 1606.262658] SyS_mount+0xa8/0x120 [ 1606.266093] ? copy_mnt_ns+0xa30/0xa30 [ 1606.269964] do_syscall_64+0x1d5/0x640 [ 1606.273838] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1606.279004] RIP: 0033:0x7f2196c8261a [ 1606.282689] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1606.290379] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1606.297632] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1606.304880] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:16 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 31) 08:33:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x24, 0x3, 0x0, {0x0, 0x3, 0x0, ')*['}}, 0x24) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x24, 0x3, 0x0, {0x0, 0x3, 0x0, ')*['}}, 0x24) (async) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000004540)='/sys/module/cpia2', 0x80000, 0x7) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) add_key$keyring(&(0x7f0000002240), &(0x7f0000002300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000022c0)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, '\xe1{[/^!}'}}, 0x28) r4 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$get_persistent(0x16, r1, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) r6 = accept(r5, 0x0, &(0x7f0000004380)) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000004500)={&(0x7f00000043c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000044c0)={&(0x7f0000004400)=ANY=[@ANYBLOB="e99f0600", @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf25030000001400020076657468315f766c616e00000000000005000400010000000900010073797a300000000014000200766c616e30008000000000000000000005000400020000000900030073797a30000000001400020000000000000000000000140002006d6163766c616e3100"/134], 0x8c}, 0x1, 0x0, 0x0, 0x20008081}, 0x40000) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002280)={r2, r1, r7}, 0xc) 08:33:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1a400a4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x2, 0x3}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x2, 0x3}}, 0x28) (async) 08:33:16 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1606.312139] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1606.319389] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 [ 1606.330891] kobject_add_internal failed for 0:59 (error: -12 parent: bdi) 08:33:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1a400a4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000004540)='/sys/module/cpia2', 0x80000, 0x7) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) add_key$keyring(&(0x7f0000002240), &(0x7f0000002300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000022c0)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, '\xe1{[/^!}'}}, 0x28) r4 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$get_persistent(0x16, r1, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) r6 = accept(r5, 0x0, &(0x7f0000004380)) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000004500)={&(0x7f00000043c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000044c0)={&(0x7f0000004400)=ANY=[@ANYBLOB="e99f0600", @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf25030000001400020076657468315f766c616e00000000000005000400010000000900010073797a300000000014000200766c616e30008000000000000000000005000400020000000900030073797a30000000001400020000000000000000000000140002006d6163766c616e3100"/134], 0x8c}, 0x1, 0x0, 0x0, 0x20008081}, 0x40000) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002280)={r2, r1, r7}, 0xc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000004540)='/sys/module/cpia2', 0x80000, 0x7) (async) read$FUSE(r0, &(0x7f0000004580)={0x2020}, 0x2020) (async) add_key$keyring(&(0x7f0000002240), &(0x7f0000002300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) (async) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000022c0)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, '\xe1{[/^!}'}}, 0x28) (async) add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x0}, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, r4) (async) keyctl$get_persistent(0x16, r1, r4) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) (async) accept(r5, 0x0, &(0x7f0000004380)) (async) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000004500)={&(0x7f00000043c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000044c0)={&(0x7f0000004400)=ANY=[@ANYBLOB="e99f0600", @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf25030000001400020076657468315f766c616e00000000000005000400010000000900010073797a300000000014000200766c616e30008000000000000000000005000400020000000900030073797a30000000001400020000000000000000000000140002006d6163766c616e3100"/134], 0x8c}, 0x1, 0x0, 0x0, 0x20008081}, 0x40000) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) (async) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002280)={r2, r1, r7}, 0xc) (async) 08:33:16 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) [ 1606.447022] FAULT_INJECTION: forcing a failure. [ 1606.447022] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.486092] CPU: 1 PID: 10688 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1606.493986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.503337] Call Trace: [ 1606.505926] dump_stack+0x1b2/0x281 [ 1606.509560] should_fail.cold+0x10a/0x149 [ 1606.513709] should_failslab+0xd6/0x130 [ 1606.517679] __kmalloc_track_caller+0x2bc/0x400 [ 1606.522343] ? kstrdup_const+0x35/0x60 [ 1606.526228] kstrdup+0x36/0x70 [ 1606.529415] kstrdup_const+0x35/0x60 [ 1606.533125] __kernfs_new_node+0x2e/0x470 [ 1606.537271] kernfs_create_dir_ns+0x8c/0x200 [ 1606.541674] sysfs_create_dir_ns+0xb7/0x1d0 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000004540)='/sys/module/cpia2', 0x80000, 0x7) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) add_key$keyring(&(0x7f0000002240), &(0x7f0000002300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000022c0)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, '\xe1{[/^!}'}}, 0x28) r4 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, r4) keyctl$get_persistent(0x16, r1, r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) r6 = accept(r5, 0x0, &(0x7f0000004380)) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000004500)={&(0x7f00000043c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000044c0)={&(0x7f0000004400)=ANY=[@ANYBLOB="e99f0600", @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf25030000001400020076657468315f766c616e00000000000005000400010000000900010073797a300000000014000200766c616e30008000000000000000000005000400020000000900030073797a30000000001400020000000000000000000000140002006d6163766c616e3100"/134], 0x8c}, 0x1, 0x0, 0x0, 0x20008081}, 0x40000) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002280)={r2, r1, r7}, 0xc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000004540)='/sys/module/cpia2', 0x80000, 0x7) (async) read$FUSE(r0, &(0x7f0000004580)={0x2020}, 0x2020) (async) add_key$keyring(&(0x7f0000002240), &(0x7f0000002300)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) (async) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000022c0)={0x28, 0x3, 0x0, {0x0, 0x7, 0x0, '\xe1{[/^!}'}}, 0x28) (async) add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x0}, 0x0, 0x0, 0x0) (async) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, r4) (async) keyctl$get_persistent(0x16, r1, r4) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) (async) accept(r5, 0x0, &(0x7f0000004380)) (async) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000004500)={&(0x7f00000043c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000044c0)={&(0x7f0000004400)=ANY=[@ANYBLOB="e99f0600", @ANYRES16=0x0, @ANYBLOB="000127bd7000fddbdf25030000001400020076657468315f766c616e00000000000005000400010000000900010073797a300000000014000200766c616e30008000000000000000000005000400020000000900030073797a30000000001400020000000000000000000000140002006d6163766c616e3100"/134], 0x8c}, 0x1, 0x0, 0x0, 0x20008081}, 0x40000) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002340)={0x2020}, 0x2020) (async) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002280)={r2, r1, r7}, 0xc) (async) 08:33:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x2, 0x3}}, 0x28) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffff9) [ 1606.545992] kobject_add_internal+0x28b/0x930 [ 1606.550495] kobject_add+0x11f/0x180 [ 1606.554207] ? kset_create_and_add+0x190/0x190 [ 1606.558798] device_add+0x33f/0x15c0 [ 1606.562506] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1606.567956] ? kfree_const+0x33/0x40 [ 1606.571665] ? device_is_dependent+0x2a0/0x2a0 [ 1606.576242] ? kfree+0x1f0/0x250 [ 1606.579608] device_create_groups_vargs+0x1dc/0x250 [ 1606.584620] device_create_vargs+0x3a/0x50 [ 1606.588854] bdi_register_va.part.0+0x35/0x650 [ 1606.593436] bdi_register_va+0x63/0x80 [ 1606.597321] super_setup_bdi_name+0x123/0x220 [ 1606.601814] ? kill_block_super+0xe0/0xe0 [ 1606.605958] ? do_raw_spin_unlock+0x164/0x220 [ 1606.610457] fuse_fill_super+0x937/0x15c0 [ 1606.614591] ? fuse_get_root_inode+0xc0/0xc0 [ 1606.618974] ? up_write+0x17/0x60 [ 1606.622409] ? register_shrinker+0x15f/0x220 [ 1606.626797] ? sget_userns+0x768/0xc10 [ 1606.630666] ? get_anon_bdev+0x1c0/0x1c0 [ 1606.634701] ? sget+0xd9/0x110 [ 1606.637870] ? fuse_get_root_inode+0xc0/0xc0 [ 1606.642262] mount_nodev+0x4c/0xf0 [ 1606.645780] mount_fs+0x92/0x2a0 [ 1606.649128] vfs_kern_mount.part.0+0x5b/0x470 [ 1606.655425] do_mount+0xe65/0x2a30 [ 1606.658945] ? __do_page_fault+0x159/0xad0 [ 1606.663157] ? retint_kernel+0x2d/0x2d [ 1606.667020] ? copy_mount_string+0x40/0x40 [ 1606.671231] ? memset+0x20/0x40 [ 1606.674484] ? copy_mount_options+0x1fa/0x2f0 [ 1606.678952] ? copy_mnt_ns+0xa30/0xa30 [ 1606.682813] SyS_mount+0xa8/0x120 [ 1606.686242] ? copy_mnt_ns+0xa30/0xa30 [ 1606.690112] do_syscall_64+0x1d5/0x640 [ 1606.693986] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1606.699151] RIP: 0033:0x7f2196c8261a [ 1606.702836] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1606.710517] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1606.717761] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1606.725006] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1606.732254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1606.739500] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1a400a4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffff9) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffff9) (async) 08:33:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x24, 0x3, 0x0, {0x0, 0x3, 0x0, ')*['}}, 0x24) 08:33:16 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) 08:33:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002200)={0x10, 0x0, r1}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x100}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 08:33:16 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 32) [ 1606.776665] kobject_add_internal failed for 0:61 (error: -12 parent: bdi) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffff9) 08:33:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10009, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfc00000000}}, {@allow_other}, {@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x800000000000000}}, {@smackfsroot={'smackfsroot', 0x3d, '\'-,'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 08:33:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002200)={0x10, 0x0, r1}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x100}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) 08:33:16 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1606.871374] FAULT_INJECTION: forcing a failure. [ 1606.871374] name failslab, interval 1, probability 0, space 0, times 0 [ 1606.922661] CPU: 0 PID: 10772 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1606.930558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1606.939906] Call Trace: [ 1606.942516] dump_stack+0x1b2/0x281 [ 1606.946150] should_fail.cold+0x10a/0x149 [ 1606.950297] should_failslab+0xd6/0x130 [ 1606.950322] kmem_cache_alloc+0x28e/0x3c0 [ 1606.950336] __kernfs_new_node+0x6f/0x470 [ 1606.950348] kernfs_create_dir_ns+0x8c/0x200 [ 1606.950359] sysfs_create_dir_ns+0xb7/0x1d0 08:33:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1606.950371] kobject_add_internal+0x28b/0x930 [ 1606.950385] kobject_add+0x11f/0x180 [ 1606.950394] ? kset_create_and_add+0x190/0x190 [ 1606.950415] device_add+0x33f/0x15c0 [ 1606.950426] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1606.950435] ? kfree_const+0x33/0x40 [ 1606.950445] ? device_is_dependent+0x2a0/0x2a0 [ 1607.001446] ? kfree+0x1f0/0x250 [ 1607.004817] device_create_groups_vargs+0x1dc/0x250 [ 1607.009833] device_create_vargs+0x3a/0x50 [ 1607.014071] bdi_register_va.part.0+0x35/0x650 [ 1607.018654] bdi_register_va+0x63/0x80 [ 1607.022538] super_setup_bdi_name+0x123/0x220 [ 1607.027029] ? kill_block_super+0xe0/0xe0 [ 1607.031190] ? do_raw_spin_unlock+0x164/0x220 [ 1607.035690] fuse_fill_super+0x937/0x15c0 [ 1607.039925] ? fuse_get_root_inode+0xc0/0xc0 [ 1607.044324] ? up_write+0x17/0x60 [ 1607.047756] ? register_shrinker+0x15f/0x220 [ 1607.052146] ? sget_userns+0x768/0xc10 [ 1607.056015] ? get_anon_bdev+0x1c0/0x1c0 [ 1607.060054] ? sget+0xd9/0x110 [ 1607.063227] ? fuse_get_root_inode+0xc0/0xc0 [ 1607.067617] mount_nodev+0x4c/0xf0 [ 1607.071135] mount_fs+0x92/0x2a0 [ 1607.074484] vfs_kern_mount.part.0+0x5b/0x470 [ 1607.078958] do_mount+0xe65/0x2a30 [ 1607.082476] ? __do_page_fault+0x159/0xad0 [ 1607.086687] ? retint_kernel+0x2d/0x2d [ 1607.090551] ? copy_mount_string+0x40/0x40 [ 1607.094769] ? memset+0x20/0x40 [ 1607.098023] ? copy_mount_options+0x1fa/0x2f0 [ 1607.102493] ? copy_mnt_ns+0xa30/0xa30 [ 1607.106355] SyS_mount+0xa8/0x120 [ 1607.109784] ? copy_mnt_ns+0xa30/0xa30 [ 1607.113652] do_syscall_64+0x1d5/0x640 [ 1607.117525] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1607.122697] RIP: 0033:0x7f2196c8261a [ 1607.126384] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1607.134069] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1607.141314] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1607.148560] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1607.155803] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1607.163047] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:16 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 33) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10009, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfc00000000}}, {@allow_other}, {@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x800000000000000}}, {@smackfsroot={'smackfsroot', 0x3d, '\'-,'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10009, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfc00000000}}, {@allow_other}, {@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x800000000000000}}, {@smackfsroot={'smackfsroot', 0x3d, '\'-,'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) (async) 08:33:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) 08:33:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002200)={0x10, 0x0, r1}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x100}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000002200)={0x10, 0x0, r1}, 0x10) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x100}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}) (async) 08:33:16 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1607.174907] kobject_add_internal failed for 0:60 (error: -12 parent: bdi) 08:33:16 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="c4e92361382e0ca1759e882be8450fb51f2cfb74e5b69b08cd283e178a554b109fb2537f2eadcc8bc5af7466393950381c705f3061d3832666e4bfd1b9cd84fdd55a24b62c336d16dc4a3514f0d228b5ca5d3640b498778669ca9c600f7c6f8f994261c6254c4cdab4c883904669eb6e254a82d36281486e1204ec07d27c32ade2131eda0b29dde59378ed4203ebe2e8f96816749b42c3d127fc2b27ffcaf69bdfa45161b9f79657a839374dc8ac85340e1325e1f6fd93e5786e0b32bc69476d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:16 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1607.248526] FAULT_INJECTION: forcing a failure. [ 1607.248526] name failslab, interval 1, probability 0, space 0, times 0 [ 1607.290436] CPU: 0 PID: 10807 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1607.298333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1607.307677] Call Trace: [ 1607.310260] dump_stack+0x1b2/0x281 [ 1607.313889] should_fail.cold+0x10a/0x149 [ 1607.318038] should_failslab+0xd6/0x130 [ 1607.322011] kmem_cache_alloc+0x28e/0x3c0 [ 1607.326161] __kernfs_new_node+0x6f/0x470 [ 1607.330310] kernfs_new_node+0x7b/0xe0 [ 1607.334193] __kernfs_create_file+0x3d/0x320 08:33:17 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1607.338602] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1607.343271] device_create_file+0xc8/0x100 [ 1607.347501] ? acpi_platform_notify_remove+0x1f0/0x1f0 [ 1607.352771] device_add+0x37a/0x15c0 [ 1607.356483] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1607.361926] ? kfree_const+0x33/0x40 [ 1607.365632] ? device_is_dependent+0x2a0/0x2a0 [ 1607.370208] ? kfree+0x1f0/0x250 [ 1607.373574] device_create_groups_vargs+0x1dc/0x250 [ 1607.378588] device_create_vargs+0x3a/0x50 [ 1607.382824] bdi_register_va.part.0+0x35/0x650 08:33:17 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) [ 1607.387402] bdi_register_va+0x63/0x80 [ 1607.391286] super_setup_bdi_name+0x123/0x220 [ 1607.395778] ? kill_block_super+0xe0/0xe0 [ 1607.399919] ? do_raw_spin_unlock+0x164/0x220 [ 1607.404419] fuse_fill_super+0x937/0x15c0 [ 1607.408568] ? fuse_get_root_inode+0xc0/0xc0 [ 1607.412969] ? up_write+0x17/0x60 [ 1607.416416] ? register_shrinker+0x15f/0x220 [ 1607.420818] ? sget_userns+0x768/0xc10 [ 1607.424707] ? get_anon_bdev+0x1c0/0x1c0 [ 1607.428770] ? sget+0xd9/0x110 [ 1607.431977] ? fuse_get_root_inode+0xc0/0xc0 [ 1607.436383] mount_nodev+0x4c/0xf0 08:33:17 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x66, 0x32, 0x62, 0x62, 0x39, 0x36, 0x61, 0x36, 0x61, 0x38, 0x36, 0x61, 0x32, 0x30]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) keyctl$clear(0x7, r2) keyctl$get_persistent(0x16, 0x0, r0) add_key$keyring(&(0x7f0000002240), &(0x7f0000002280)={'syz', 0x2}, 0x0, 0x0, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, r3, r4) [ 1607.439923] mount_fs+0x92/0x2a0 [ 1607.443290] vfs_kern_mount.part.0+0x5b/0x470 [ 1607.447869] do_mount+0xe65/0x2a30 [ 1607.451405] ? __do_page_fault+0x159/0xad0 [ 1607.455633] ? retint_kernel+0x2d/0x2d [ 1607.459515] ? copy_mount_string+0x40/0x40 [ 1607.463742] ? memset+0x20/0x40 [ 1607.467017] ? copy_mount_options+0x1fa/0x2f0 [ 1607.471505] ? copy_mnt_ns+0xa30/0xa30 [ 1607.475389] SyS_mount+0xa8/0x120 [ 1607.478834] ? copy_mnt_ns+0xa30/0xa30 [ 1607.482724] do_syscall_64+0x1d5/0x640 [ 1607.486611] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1607.491788] RIP: 0033:0x7f2196c8261a [ 1607.495486] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1607.503186] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1607.510442] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1607.517697] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1607.524964] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1607.532223] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 34) 08:33:17 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'/11, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:17 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x66, 0x32, 0x62, 0x62, 0x39, 0x36, 0x61, 0x36, 0x61, 0x38, 0x36, 0x61, 0x32, 0x30]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) keyctl$clear(0x7, r2) keyctl$get_persistent(0x16, 0x0, r0) add_key$keyring(&(0x7f0000002240), &(0x7f0000002280)={'syz', 0x2}, 0x0, 0x0, r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, r3, r4) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x66, 0x32, 0x62, 0x62, 0x39, 0x36, 0x61, 0x36, 0x61, 0x38, 0x36, 0x61, 0x32, 0x30]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) (async) keyctl$clear(0x7, r2) (async) keyctl$get_persistent(0x16, 0x0, r0) (async) add_key$keyring(&(0x7f0000002240), &(0x7f0000002280)={'syz', 0x2}, 0x0, 0x0, r1) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) (async) keyctl$get_persistent(0x16, r3, r4) (async) 08:33:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="c4e92361382e0ca1759e882be8450fb51f2cfb74e5b69b08cd283e178a554b109fb2537f2eadcc8bc5af7466393950381c705f3061d3832666e4bfd1b9cd84fdd55a24b62c336d16dc4a3514f0d228b5ca5d3640b498778669ca9c600f7c6f8f994261c6254c4cdab4c883904669eb6e254a82d36281486e1204ec07d27c32ade2131eda0b29dde59378ed4203ebe2e8f96816749b42c3d127fc2b27ffcaf69bdfa45161b9f79657a839374dc8ac85340e1325e1f6fd93e5786e0b32bc69476d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="c4e92361382e0ca1759e882be8450fb51f2cfb74e5b69b08cd283e178a554b109fb2537f2eadcc8bc5af7466393950381c705f3061d3832666e4bfd1b9cd84fdd55a24b62c336d16dc4a3514f0d228b5ca5d3640b498778669ca9c600f7c6f8f994261c6254c4cdab4c883904669eb6e254a82d36281486e1204ec07d27c32ade2131eda0b29dde59378ed4203ebe2e8f96816749b42c3d127fc2b27ffcaf69bdfa45161b9f79657a839374dc8ac85340e1325e1f6fd93e5786e0b32bc69476d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:33:17 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000080)) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0xb}}, 0x20) 08:33:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10009, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfc00000000}}, {@allow_other}, {@allow_other}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x800000000000000}}, {@smackfsroot={'smackfsroot', 0x3d, '\'-,'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}}) 08:33:17 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000080)) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0xb}}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) (async) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000080)) (async) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0xb}}, 0x20) (async) 08:33:17 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x32, 0x64, 0x66, 0x32, 0x62, 0x62, 0x39, 0x36, 0x61, 0x36, 0x61, 0x38, 0x36, 0x61, 0x32, 0x30]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) (async) keyctl$clear(0x7, r2) (async) keyctl$get_persistent(0x16, 0x0, r0) add_key$keyring(&(0x7f0000002240), &(0x7f0000002280)={'syz', 0x2}, 0x0, 0x0, r1) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r4 = add_key$keyring(&(0x7f0000002140), &(0x7f0000002180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, r3, r4) 08:33:17 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108100, &(0x7f0000002200)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, '}r\xb2\t\xe2\xe6\x8ft2\x83n\xc3\xfe\xb2\xac.j\x81\x92\x91D@(\xc2\xf7\xe4\x9fB\x05K]\xcb$n\xde\xc7\xf4t_\xa75\xac'}}, {@euid_lt={'euid<', r0}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}]}}) 08:33:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="c4e92361382e0ca1759e882be8450fb51f2cfb74e5b69b08cd283e178a554b109fb2537f2eadcc8bc5af7466393950381c705f3061d3832666e4bfd1b9cd84fdd55a24b62c336d16dc4a3514f0d228b5ca5d3640b498778669ca9c600f7c6f8f994261c6254c4cdab4c883904669eb6e254a82d36281486e1204ec07d27c32ade2131eda0b29dde59378ed4203ebe2e8f96816749b42c3d127fc2b27ffcaf69bdfa45161b9f79657a839374dc8ac85340e1325e1f6fd93e5786e0b32bc69476d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 1607.637065] FAULT_INJECTION: forcing a failure. [ 1607.637065] name failslab, interval 1, probability 0, space 0, times 0 08:33:17 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:17 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000080)) (async) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0xb}}, 0x20) [ 1607.718745] CPU: 1 PID: 10859 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1607.726644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1607.735995] Call Trace: [ 1607.738580] dump_stack+0x1b2/0x281 [ 1607.742218] should_fail.cold+0x10a/0x149 [ 1607.746368] should_failslab+0xd6/0x130 [ 1607.750343] kmem_cache_alloc+0x28e/0x3c0 [ 1607.754495] __kernfs_new_node+0x6f/0x470 [ 1607.758647] kernfs_new_node+0x7b/0xe0 [ 1607.762536] kernfs_create_link+0x27/0x160 [ 1607.766768] sysfs_do_create_link_sd+0x90/0x120 [ 1607.771431] sysfs_create_link+0x5f/0xc0 [ 1607.775488] device_add+0x461/0x15c0 [ 1607.779206] ? kfree_const+0x33/0x40 [ 1607.782916] ? device_is_dependent+0x2a0/0x2a0 [ 1607.787491] ? kfree+0x1f0/0x250 [ 1607.790855] device_create_groups_vargs+0x1dc/0x250 [ 1607.795871] device_create_vargs+0x3a/0x50 [ 1607.800108] bdi_register_va.part.0+0x35/0x650 [ 1607.804677] bdi_register_va+0x63/0x80 [ 1607.808542] super_setup_bdi_name+0x123/0x220 [ 1607.813012] ? kill_block_super+0xe0/0xe0 [ 1607.817136] ? do_raw_spin_unlock+0x164/0x220 [ 1607.821610] fuse_fill_super+0x937/0x15c0 [ 1607.825737] ? fuse_get_root_inode+0xc0/0xc0 [ 1607.830124] ? up_write+0x17/0x60 [ 1607.833553] ? register_shrinker+0x15f/0x220 [ 1607.837939] ? sget_userns+0x768/0xc10 [ 1607.841803] ? get_anon_bdev+0x1c0/0x1c0 [ 1607.845838] ? sget+0xd9/0x110 [ 1607.849006] ? fuse_get_root_inode+0xc0/0xc0 [ 1607.853392] mount_nodev+0x4c/0xf0 [ 1607.856906] mount_fs+0x92/0x2a0 [ 1607.860256] vfs_kern_mount.part.0+0x5b/0x470 [ 1607.864726] do_mount+0xe65/0x2a30 [ 1607.868244] ? __do_page_fault+0x159/0xad0 [ 1607.872453] ? retint_kernel+0x2d/0x2d [ 1607.876318] ? copy_mount_string+0x40/0x40 [ 1607.880526] ? memset+0x20/0x40 [ 1607.883781] ? copy_mount_options+0x1fa/0x2f0 [ 1607.888249] ? copy_mnt_ns+0xa30/0xa30 [ 1607.892113] SyS_mount+0xa8/0x120 [ 1607.895540] ? copy_mnt_ns+0xa30/0xa30 [ 1607.899402] do_syscall_64+0x1d5/0x640 [ 1607.903268] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1607.908431] RIP: 0033:0x7f2196c8261a [ 1607.912116] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 35) 08:33:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fb87ffff"]) 08:33:17 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108100, &(0x7f0000002200)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, '}r\xb2\t\xe2\xe6\x8ft2\x83n\xc3\xfe\xb2\xac.j\x81\x92\x91D@(\xc2\xf7\xe4\x9fB\x05K]\xcb$n\xde\xc7\xf4t_\xa75\xac'}}, {@euid_lt={'euid<', r0}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}]}}) 08:33:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) pipe2$watch_queue(&(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r5, &(0x7f0000002480)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000044c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f55705f69643d49faff0b95932b258ba2cb3e1559fbc8d8fbe1166589184588e3975e0fd501fc6957a75d23b24a8492c84c617d0c079175e6ff178f39ef9b98e83b41929d14325571bcc947729e7a7ff2b5b9ffe77286899858911f02addc900831724721b2702ef2d6c7532c8fef924165451209987ae8753c6e80aca4c101a5df9a5e86a7d8ef2c1581de11b750a734cb8b28de892b1df79c1d4c7ec5d1cab288968784d2f7163af1c25ac1017daa42f75debfef63087376be06b6695398ceec57e", @ANYRESDEC=r4, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1001, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303030302c7375626a5f747970653d3a26c02923bb5b2c6f626a5f726f6c653d2d7b2c61756469742c736d61636b6673666c6f6f723d2f6465762f66757365002c666f776e65723e", @ANYRESDEC=r6, @ANYBLOB="2c636f6a7070726169736577cee67b41dbe7d4b97369672c00b9976371bd31b766a54cdd"]) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002380)={0x6c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1f}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 08:33:17 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneightbl={0x14, 0x42, 0x1, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:17 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r0, &(0x7f0000002280)=&(0x7f0000002240), &(0x7f00000022c0)=0x18) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1607.919799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1607.927046] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1607.934294] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1607.941539] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1607.948783] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:17 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x108100, &(0x7f0000002200)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@obj_user={'obj_user', 0x3d, '}r\xb2\t\xe2\xe6\x8ft2\x83n\xc3\xfe\xb2\xac.j\x81\x92\x91D@(\xc2\xf7\xe4\x9fB\x05K]\xcb$n\xde\xc7\xf4t_\xa75\xac'}}, {@euid_lt={'euid<', r0}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, 'group_id'}}]}}) 08:33:17 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneightbl={0x14, 0x42, 0x1, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) pipe2$watch_queue(&(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r5, &(0x7f0000002480)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000044c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f55705f69643d49faff0b95932b258ba2cb3e1559fbc8d8fbe1166589184588e3975e0fd501fc6957a75d23b24a8492c84c617d0c079175e6ff178f39ef9b98e83b41929d14325571bcc947729e7a7ff2b5b9ffe77286899858911f02addc900831724721b2702ef2d6c7532c8fef924165451209987ae8753c6e80aca4c101a5df9a5e86a7d8ef2c1581de11b750a734cb8b28de892b1df79c1d4c7ec5d1cab288968784d2f7163af1c25ac1017daa42f75debfef63087376be06b6695398ceec57e", @ANYRESDEC=r4, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1001, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303030302c7375626a5f747970653d3a26c02923bb5b2c6f626a5f726f6c653d2d7b2c61756469742c736d61636b6673666c6f6f723d2f6465762f66757365002c666f776e65723e", @ANYRESDEC=r6, @ANYBLOB="2c636f6a7070726169736577cee67b41dbe7d4b97369672c00b9976371bd31b766a54cdd"]) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002380)={0x6c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1f}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000002440), 0x80) (async) read$FUSE(r5, &(0x7f0000002480)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000044c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f55705f69643d49faff0b95932b258ba2cb3e1559fbc8d8fbe1166589184588e3975e0fd501fc6957a75d23b24a8492c84c617d0c079175e6ff178f39ef9b98e83b41929d14325571bcc947729e7a7ff2b5b9ffe77286899858911f02addc900831724721b2702ef2d6c7532c8fef924165451209987ae8753c6e80aca4c101a5df9a5e86a7d8ef2c1581de11b750a734cb8b28de892b1df79c1d4c7ec5d1cab288968784d2f7163af1c25ac1017daa42f75debfef63087376be06b6695398ceec57e", @ANYRESDEC=r4, @ANYBLOB=',\x00']) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1001, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303030302c7375626a5f747970653d3a26c02923bb5b2c6f626a5f726f6c653d2d7b2c61756469742c736d61636b6673666c6f6f723d2f6465762f66757365002c666f776e65723e", @ANYRESDEC=r6, @ANYBLOB="2c636f6a7070726169736577cee67b41dbe7d4b97369672c00b9976371bd31b766a54cdd"]) (async) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002380)={0x6c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1f}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) (async) 08:33:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fb87ffff"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fb87ffff"]) (async) [ 1608.053368] FAULT_INJECTION: forcing a failure. [ 1608.053368] name failslab, interval 1, probability 0, space 0, times 0 [ 1608.093942] CPU: 1 PID: 10921 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1608.101842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1608.111191] Call Trace: [ 1608.113780] dump_stack+0x1b2/0x281 [ 1608.117407] should_fail.cold+0x10a/0x149 [ 1608.121554] should_failslab+0xd6/0x130 [ 1608.125527] kmem_cache_alloc+0x28e/0x3c0 [ 1608.129674] __kernfs_new_node+0x6f/0x470 [ 1608.133822] kernfs_new_node+0x7b/0xe0 [ 1608.137706] kernfs_create_link+0x27/0x160 [ 1608.141939] sysfs_do_create_link_sd+0x90/0x120 [ 1608.146605] sysfs_create_link+0x5f/0xc0 [ 1608.150675] device_add+0x461/0x15c0 [ 1608.154384] ? kfree_const+0x33/0x40 [ 1608.158093] ? device_is_dependent+0x2a0/0x2a0 [ 1608.162668] ? kfree+0x1f0/0x250 [ 1608.166035] device_create_groups_vargs+0x1dc/0x250 [ 1608.171050] device_create_vargs+0x3a/0x50 [ 1608.175288] bdi_register_va.part.0+0x35/0x650 [ 1608.179869] bdi_register_va+0x63/0x80 [ 1608.183754] super_setup_bdi_name+0x123/0x220 [ 1608.188245] ? kill_block_super+0xe0/0xe0 08:33:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = getegid() (async) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) pipe2$watch_queue(&(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) read$FUSE(r5, &(0x7f0000002480)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000044c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f55705f69643d49faff0b95932b258ba2cb3e1559fbc8d8fbe1166589184588e3975e0fd501fc6957a75d23b24a8492c84c617d0c079175e6ff178f39ef9b98e83b41929d14325571bcc947729e7a7ff2b5b9ffe77286899858911f02addc900831724721b2702ef2d6c7532c8fef924165451209987ae8753c6e80aca4c101a5df9a5e86a7d8ef2c1581de11b750a734cb8b28de892b1df79c1d4c7ec5d1cab288968784d2f7163af1c25ac1017daa42f75debfef63087376be06b6695398ceec57e", @ANYRESDEC=r4, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x1001, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r4, @ANYBLOB="2c626c6b73697a653d3078303030303030303030303030303030302c7375626a5f747970653d3a26c02923bb5b2c6f626a5f726f6c653d2d7b2c61756469742c736d61636b6673666c6f6f723d2f6465762f66757365002c666f776e65723e", @ANYRESDEC=r6, @ANYBLOB="2c636f6a7070726169736577cee67b41dbe7d4b97369672c00b9976371bd31b766a54cdd"]) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002380)={0x6c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x1f}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x2}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 08:33:17 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1608.192388] ? do_raw_spin_unlock+0x164/0x220 [ 1608.196883] fuse_fill_super+0x937/0x15c0 [ 1608.201034] ? fuse_get_root_inode+0xc0/0xc0 [ 1608.205438] ? up_write+0x17/0x60 [ 1608.208884] ? register_shrinker+0x15f/0x220 [ 1608.213285] ? sget_userns+0x768/0xc10 [ 1608.217179] ? get_anon_bdev+0x1c0/0x1c0 [ 1608.221235] ? sget+0xd9/0x110 [ 1608.224424] ? fuse_get_root_inode+0xc0/0xc0 [ 1608.228828] mount_nodev+0x4c/0xf0 [ 1608.232361] mount_fs+0x92/0x2a0 [ 1608.235723] vfs_kern_mount.part.0+0x5b/0x470 [ 1608.240218] do_mount+0xe65/0x2a30 [ 1608.243753] ? __do_page_fault+0x159/0xad0 [ 1608.247986] ? retint_kernel+0x2d/0x2d [ 1608.251864] ? copy_mount_string+0x40/0x40 [ 1608.256088] ? memset+0x20/0x40 [ 1608.259361] ? copy_mount_options+0x1fa/0x2f0 [ 1608.263832] ? copy_mnt_ns+0xa30/0xa30 [ 1608.267695] SyS_mount+0xa8/0x120 [ 1608.271123] ? copy_mnt_ns+0xa30/0xa30 [ 1608.274988] do_syscall_64+0x1d5/0x640 [ 1608.278865] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1608.284029] RIP: 0033:0x7f2196c8261a 08:33:18 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 36) 08:33:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fa=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 08:33:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fb87ffff"]) 08:33:18 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0x4080000) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1608.287713] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1608.295394] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1608.302638] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1608.309885] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1608.317129] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1608.324378] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:18 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@getneightbl={0x14, 0x42, 0x1, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='y\x00']) 08:33:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:18 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0x4080000) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fa=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 08:33:18 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x51, 0x65, 0x63, 0x94, 0x36, 0x63, 0x31, 0x30, 0x0, 0x34, 0x31, 0x33, 0x65, 0x31, 0x35, 0x36]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3ebd8784edb0d63cc0c2978921085663f1b30584f6820cce3a62f4e978b2a93c5b798d3dcc0fb500", 0x1c}, 0x48, 0xfffffffffffffff8) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/raw', 0x8002, 0x12d) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) 08:33:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='y\x00']) [ 1608.473319] FAULT_INJECTION: forcing a failure. [ 1608.473319] name failslab, interval 1, probability 0, space 0, times 0 [ 1608.554959] CPU: 1 PID: 10988 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1608.562864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1608.572212] Call Trace: [ 1608.574795] dump_stack+0x1b2/0x281 [ 1608.578424] should_fail.cold+0x10a/0x149 [ 1608.582574] should_failslab+0xd6/0x130 [ 1608.586552] kmem_cache_alloc+0x28e/0x3c0 [ 1608.590687] __kernfs_new_node+0x6f/0x470 [ 1608.594812] kernfs_new_node+0x7b/0xe0 [ 1608.598685] kernfs_create_link+0x27/0x160 [ 1608.602897] sysfs_do_create_link_sd+0x90/0x120 [ 1608.607540] sysfs_create_link+0x5f/0xc0 [ 1608.611579] device_add+0x749/0x15c0 [ 1608.615273] ? kfree_const+0x33/0x40 [ 1608.618965] ? device_is_dependent+0x2a0/0x2a0 [ 1608.623524] ? kfree+0x1f0/0x250 [ 1608.626873] device_create_groups_vargs+0x1dc/0x250 [ 1608.631865] device_create_vargs+0x3a/0x50 [ 1608.636097] bdi_register_va.part.0+0x35/0x650 [ 1608.640658] bdi_register_va+0x63/0x80 [ 1608.644525] super_setup_bdi_name+0x123/0x220 [ 1608.648999] ? kill_block_super+0xe0/0xe0 [ 1608.653128] ? do_raw_spin_unlock+0x164/0x220 [ 1608.657603] fuse_fill_super+0x937/0x15c0 [ 1608.661727] ? fuse_get_root_inode+0xc0/0xc0 [ 1608.666114] ? up_write+0x17/0x60 [ 1608.669544] ? register_shrinker+0x15f/0x220 [ 1608.673928] ? sget_userns+0x768/0xc10 [ 1608.677796] ? get_anon_bdev+0x1c0/0x1c0 [ 1608.681831] ? sget+0xd9/0x110 [ 1608.685003] ? fuse_get_root_inode+0xc0/0xc0 [ 1608.689389] mount_nodev+0x4c/0xf0 [ 1608.692905] mount_fs+0x92/0x2a0 [ 1608.696254] vfs_kern_mount.part.0+0x5b/0x470 [ 1608.700739] do_mount+0xe65/0x2a30 [ 1608.704258] ? __do_page_fault+0x159/0xad0 [ 1608.708471] ? retint_kernel+0x2d/0x2d [ 1608.712336] ? copy_mount_string+0x40/0x40 [ 1608.716551] ? memset+0x20/0x40 [ 1608.719805] ? copy_mount_options+0x1fa/0x2f0 [ 1608.724275] ? copy_mnt_ns+0xa30/0xa30 [ 1608.728142] SyS_mount+0xa8/0x120 [ 1608.731570] ? copy_mnt_ns+0xa30/0xa30 [ 1608.735433] do_syscall_64+0x1d5/0x640 [ 1608.739300] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1608.744465] RIP: 0033:0x7f2196c8261a [ 1608.748152] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:18 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 37) 08:33:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:18 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000040)=0x4080000) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fa=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fa=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) 08:33:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='y\x00']) 08:33:18 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x51, 0x65, 0x63, 0x94, 0x36, 0x63, 0x31, 0x30, 0x0, 0x34, 0x31, 0x33, 0x65, 0x31, 0x35, 0x36]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3ebd8784edb0d63cc0c2978921085663f1b30584f6820cce3a62f4e978b2a93c5b798d3dcc0fb500", 0x1c}, 0x48, 0xfffffffffffffff8) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/raw', 0x8002, 0x12d) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x51, 0x65, 0x63, 0x94, 0x36, 0x63, 0x31, 0x30, 0x0, 0x34, 0x31, 0x33, 0x65, 0x31, 0x35, 0x36]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3ebd8784edb0d63cc0c2978921085663f1b30584f6820cce3a62f4e978b2a93c5b798d3dcc0fb500", 0x1c}, 0x48, 0xfffffffffffffff8) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/raw', 0x8002, 0x12d) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) (async) [ 1608.755836] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1608.763090] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1608.770346] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1608.777592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1608.784837] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x3}}, 0x18) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_STATFS(r2, &(0x7f00000001c0)={0x60, 0x0, 0x0, {{0x1119, 0x80, 0x8000000000000000, 0x10000, 0x2, 0x1, 0xfff, 0xa6}}}, 0x60) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cff"]) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x9, 0xfffffffffffff000}}, 0x28) 08:33:18 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x51, 0x65, 0x63, 0x94, 0x36, 0x63, 0x31, 0x30, 0x0, 0x34, 0x31, 0x33, 0x65, 0x31, 0x35, 0x36]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3ebd8784edb0d63cc0c2978921085663f1b30584f6820cce3a62f4e978b2a93c5b798d3dcc0fb500", 0x1c}, 0x48, 0xfffffffffffffff8) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/raw', 0x8002, 0x12d) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f0000000140)=0x1) [ 1608.880346] FAULT_INJECTION: forcing a failure. [ 1608.880346] name failslab, interval 1, probability 0, space 0, times 0 08:33:18 executing program 5: socketpair(0x1, 0x80000, 0x8, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000b80)={&(0x7f00000003c0), 0xc, &(0x7f0000000b40)={&(0x7f0000000700)=@bridge_getlink={0x424, 0x12, 0x300, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r1, 0x401, 0x52006}, [@IFLA_MTU={0x8, 0x4, 0xffffff45}, @IFLA_VFINFO_LIST={0x4c, 0x16, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x6ea, 0xeae, 0x8000}}, @IFLA_VF_VLAN={0x10, 0x2, {0xff, 0xcbc, 0x4574}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x800, 0x8}}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x32, 0x2}}]}]}, @IFLA_WEIGHT={0x8, 0xf, 0x7}, @IFLA_VFINFO_LIST={0x3a8, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x0, 0x4}}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x9, 0x4f0, 0x0, 0x88a8}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0xffff0add, 0x478, 0x6}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x800, 0x5ed, 0x200, 0x8100}}, {0x14, 0x1, {0x7, 0xaa, 0xfff, 0x8100}}, {0x14, 0x1, {0x7fff, 0xf3c, 0xac1, 0x8100}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x1}}, @IFLA_VF_TRUST={0xc, 0x9, {0x2, 0x9}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x7, 0x8001}}]}, {0xa0, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x3f, @broadcast}}, @IFLA_VF_RATE={0x10, 0x6, {0xaf, 0x10001, 0x2}}, @IFLA_VF_MAC={0x28, 0x1, {0xd4, @broadcast}}, @IFLA_VF_VLAN={0x10, 0x2, {0x9, 0x467, 0x5}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xffffffff, 0x2}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x9}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x17c370e1}}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7fffffff, @random="cab597f5c815"}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xb3a, 0x2}}]}, {0xdc, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x6, @multicast}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x6fa, 0x16, 0x10001, 0x8100}}, {0x14, 0x1, {0x3, 0xabe, 0x6, 0x88a8}}, {0x14, 0x1, {0x400, 0x37a, 0x100000}}, {0x14, 0x1, {0x7, 0x87c, 0x5, 0x8100}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xf4, 0x5}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x0, 0x2c6, 0x9, 0x8100}}]}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x7, 0xffffff01}}, @IFLA_VF_MAC={0x28, 0x1, {0x5, @broadcast}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x16b, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x101}}]}, {0xb4, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x400, 0x2040}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x401, 0x9}}, @IFLA_VF_VLAN_LIST={0x90, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x2, 0x5a4, 0xb97, 0x88a8}}, {0x14, 0x1, {0xcc, 0x111, 0x8, 0x8100}}, {0x14, 0x1, {0x8, 0x471, 0x6, 0x88a8}}, {0x14, 0x1, {0x4, 0xfda, 0x4}}, {0x14, 0x1, {0x9, 0x872, 0xff38, 0x8100}}, {0x14, 0x1, {0x40, 0x45f, 0x100, 0x88a8}}, {0x14, 0x1, {0x0, 0xab4, 0x400, 0x8100}}]}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x54, 0xffff}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x7}}, @IFLA_VF_RATE={0x10, 0x6, {0x1, 0x8, 0x7fffffff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xbe, 0x1}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6, 0x9}}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xd6d, 0x7fffffff}}]}]}]}, 0x424}, 0x1, 0x0, 0x0, 0x4}, 0x8800) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x604, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r3) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1001800, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}], [{@pcr}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 08:33:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x3}}, 0x18) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1608.955709] CPU: 0 PID: 11018 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1608.963623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1608.972974] Call Trace: [ 1608.975560] dump_stack+0x1b2/0x281 [ 1608.979191] should_fail.cold+0x10a/0x149 [ 1608.983338] should_failslab+0xd6/0x130 [ 1608.987307] kmem_cache_alloc+0x28e/0x3c0 [ 1608.991456] __kernfs_new_node+0x6f/0x470 [ 1608.995613] kernfs_new_node+0x7b/0xe0 [ 1608.999499] __kernfs_create_file+0x3d/0x320 [ 1609.003906] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1609.008586] internal_create_group+0x22b/0x710 [ 1609.013174] sysfs_create_groups+0x92/0x130 [ 1609.017495] device_add+0x7e5/0x15c0 [ 1609.021203] ? kfree_const+0x33/0x40 [ 1609.024908] ? device_is_dependent+0x2a0/0x2a0 [ 1609.029480] ? kfree+0x1f0/0x250 [ 1609.032844] device_create_groups_vargs+0x1dc/0x250 [ 1609.037855] device_create_vargs+0x3a/0x50 [ 1609.042091] bdi_register_va.part.0+0x35/0x650 [ 1609.046670] bdi_register_va+0x63/0x80 [ 1609.050555] super_setup_bdi_name+0x123/0x220 [ 1609.055045] ? kill_block_super+0xe0/0xe0 [ 1609.059188] ? do_raw_spin_unlock+0x164/0x220 [ 1609.063687] fuse_fill_super+0x937/0x15c0 [ 1609.067836] ? fuse_get_root_inode+0xc0/0xc0 [ 1609.072240] ? up_write+0x17/0x60 [ 1609.075685] ? register_shrinker+0x15f/0x220 [ 1609.080088] ? sget_userns+0x768/0xc10 [ 1609.083978] ? get_anon_bdev+0x1c0/0x1c0 [ 1609.088030] ? sget+0xd9/0x110 [ 1609.091205] ? fuse_get_root_inode+0xc0/0xc0 [ 1609.095592] mount_nodev+0x4c/0xf0 [ 1609.099109] mount_fs+0x92/0x2a0 [ 1609.102469] vfs_kern_mount.part.0+0x5b/0x470 [ 1609.106951] do_mount+0xe65/0x2a30 [ 1609.110479] ? __do_page_fault+0x159/0xad0 [ 1609.114698] ? retint_kernel+0x2d/0x2d [ 1609.118562] ? copy_mount_string+0x40/0x40 [ 1609.122785] ? memset+0x20/0x40 [ 1609.126053] ? copy_mount_options+0x1fa/0x2f0 [ 1609.130533] ? copy_mnt_ns+0xa30/0xa30 [ 1609.134405] SyS_mount+0xa8/0x120 [ 1609.137834] ? copy_mnt_ns+0xa30/0xa30 [ 1609.141706] do_syscall_64+0x1d5/0x640 [ 1609.145582] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1609.150755] RIP: 0033:0x7f2196c8261a 08:33:18 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 38) 08:33:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_STATFS(r2, &(0x7f00000001c0)={0x60, 0x0, 0x0, {{0x1119, 0x80, 0x8000000000000000, 0x10000, 0x2, 0x1, 0xfff, 0xa6}}}, 0x60) (async, rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cff"]) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x9, 0xfffffffffffff000}}, 0x28) 08:33:18 executing program 5: socketpair(0x1, 0x80000, 0x8, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000b80)={&(0x7f00000003c0), 0xc, &(0x7f0000000b40)={&(0x7f0000000700)=@bridge_getlink={0x424, 0x12, 0x300, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r1, 0x401, 0x52006}, [@IFLA_MTU={0x8, 0x4, 0xffffff45}, @IFLA_VFINFO_LIST={0x4c, 0x16, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x6ea, 0xeae, 0x8000}}, @IFLA_VF_VLAN={0x10, 0x2, {0xff, 0xcbc, 0x4574}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x800, 0x8}}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x32, 0x2}}]}]}, @IFLA_WEIGHT={0x8, 0xf, 0x7}, @IFLA_VFINFO_LIST={0x3a8, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x0, 0x4}}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x9, 0x4f0, 0x0, 0x88a8}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0xffff0add, 0x478, 0x6}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x800, 0x5ed, 0x200, 0x8100}}, {0x14, 0x1, {0x7, 0xaa, 0xfff, 0x8100}}, {0x14, 0x1, {0x7fff, 0xf3c, 0xac1, 0x8100}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x1}}, @IFLA_VF_TRUST={0xc, 0x9, {0x2, 0x9}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x7, 0x8001}}]}, {0xa0, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x3f, @broadcast}}, @IFLA_VF_RATE={0x10, 0x6, {0xaf, 0x10001, 0x2}}, @IFLA_VF_MAC={0x28, 0x1, {0xd4, @broadcast}}, @IFLA_VF_VLAN={0x10, 0x2, {0x9, 0x467, 0x5}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xffffffff, 0x2}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x9}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x17c370e1}}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7fffffff, @random="cab597f5c815"}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xb3a, 0x2}}]}, {0xdc, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x6, @multicast}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x6fa, 0x16, 0x10001, 0x8100}}, {0x14, 0x1, {0x3, 0xabe, 0x6, 0x88a8}}, {0x14, 0x1, {0x400, 0x37a, 0x100000}}, {0x14, 0x1, {0x7, 0x87c, 0x5, 0x8100}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xf4, 0x5}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x0, 0x2c6, 0x9, 0x8100}}]}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x7, 0xffffff01}}, @IFLA_VF_MAC={0x28, 0x1, {0x5, @broadcast}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x16b, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x101}}]}, {0xb4, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x400, 0x2040}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x401, 0x9}}, @IFLA_VF_VLAN_LIST={0x90, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x2, 0x5a4, 0xb97, 0x88a8}}, {0x14, 0x1, {0xcc, 0x111, 0x8, 0x8100}}, {0x14, 0x1, {0x8, 0x471, 0x6, 0x88a8}}, {0x14, 0x1, {0x4, 0xfda, 0x4}}, {0x14, 0x1, {0x9, 0x872, 0xff38, 0x8100}}, {0x14, 0x1, {0x40, 0x45f, 0x100, 0x88a8}}, {0x14, 0x1, {0x0, 0xab4, 0x400, 0x8100}}]}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x54, 0xffff}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x7}}, @IFLA_VF_RATE={0x10, 0x6, {0x1, 0x8, 0x7fffffff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xbe, 0x1}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6, 0x9}}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xd6d, 0x7fffffff}}]}]}]}, 0x424}, 0x1, 0x0, 0x0, 0x4}, 0x8800) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x604, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r3) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1001800, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}], [{@pcr}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) socketpair(0x1, 0x80000, 0x8, &(0x7f0000000380)) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) (async) sendmsg$nl_route(r0, &(0x7f0000000b80)={&(0x7f00000003c0), 0xc, &(0x7f0000000b40)={&(0x7f0000000700)=@bridge_getlink={0x424, 0x12, 0x300, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r1, 0x401, 0x52006}, [@IFLA_MTU={0x8, 0x4, 0xffffff45}, @IFLA_VFINFO_LIST={0x4c, 0x16, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x6ea, 0xeae, 0x8000}}, @IFLA_VF_VLAN={0x10, 0x2, {0xff, 0xcbc, 0x4574}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x800, 0x8}}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x32, 0x2}}]}]}, @IFLA_WEIGHT={0x8, 0xf, 0x7}, @IFLA_VFINFO_LIST={0x3a8, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x0, 0x4}}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x9, 0x4f0, 0x0, 0x88a8}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0xffff0add, 0x478, 0x6}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x800, 0x5ed, 0x200, 0x8100}}, {0x14, 0x1, {0x7, 0xaa, 0xfff, 0x8100}}, {0x14, 0x1, {0x7fff, 0xf3c, 0xac1, 0x8100}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x1}}, @IFLA_VF_TRUST={0xc, 0x9, {0x2, 0x9}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x7, 0x8001}}]}, {0xa0, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x3f, @broadcast}}, @IFLA_VF_RATE={0x10, 0x6, {0xaf, 0x10001, 0x2}}, @IFLA_VF_MAC={0x28, 0x1, {0xd4, @broadcast}}, @IFLA_VF_VLAN={0x10, 0x2, {0x9, 0x467, 0x5}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xffffffff, 0x2}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x9}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x17c370e1}}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7fffffff, @random="cab597f5c815"}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xb3a, 0x2}}]}, {0xdc, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x6, @multicast}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x6fa, 0x16, 0x10001, 0x8100}}, {0x14, 0x1, {0x3, 0xabe, 0x6, 0x88a8}}, {0x14, 0x1, {0x400, 0x37a, 0x100000}}, {0x14, 0x1, {0x7, 0x87c, 0x5, 0x8100}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xf4, 0x5}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x0, 0x2c6, 0x9, 0x8100}}]}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x7, 0xffffff01}}, @IFLA_VF_MAC={0x28, 0x1, {0x5, @broadcast}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x16b, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x101}}]}, {0xb4, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x400, 0x2040}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x401, 0x9}}, @IFLA_VF_VLAN_LIST={0x90, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x2, 0x5a4, 0xb97, 0x88a8}}, {0x14, 0x1, {0xcc, 0x111, 0x8, 0x8100}}, {0x14, 0x1, {0x8, 0x471, 0x6, 0x88a8}}, {0x14, 0x1, {0x4, 0xfda, 0x4}}, {0x14, 0x1, {0x9, 0x872, 0xff38, 0x8100}}, {0x14, 0x1, {0x40, 0x45f, 0x100, 0x88a8}}, {0x14, 0x1, {0x0, 0xab4, 0x400, 0x8100}}]}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x54, 0xffff}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x7}}, @IFLA_VF_RATE={0x10, 0x6, {0x1, 0x8, 0x7fffffff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xbe, 0x1}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6, 0x9}}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xd6d, 0x7fffffff}}]}]}]}, 0x424}, 0x1, 0x0, 0x0, 0x4}, 0x8800) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x24}}, 0x0) (async) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x604, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r3) (async) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1001800, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}], [{@pcr}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) (async) 08:33:18 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, r1) 08:33:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x3}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1609.154446] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1609.162137] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1609.169395] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1609.176639] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1609.183886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1609.191133] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:18 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, r1) 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:19 executing program 5: socketpair(0x1, 0x80000, 0x8, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000440)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000b80)={&(0x7f00000003c0), 0xc, &(0x7f0000000b40)={&(0x7f0000000700)=@bridge_getlink={0x424, 0x12, 0x300, 0x70bd2d, 0x25dfdbff, {0x7, 0x0, 0x0, r1, 0x401, 0x52006}, [@IFLA_MTU={0x8, 0x4, 0xffffff45}, @IFLA_VFINFO_LIST={0x4c, 0x16, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x6ea, 0xeae, 0x8000}}, @IFLA_VF_VLAN={0x10, 0x2, {0xff, 0xcbc, 0x4574}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x800, 0x8}}]}, {0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x32, 0x2}}]}]}, @IFLA_WEIGHT={0x8, 0xf, 0x7}, @IFLA_VFINFO_LIST={0x3a8, 0x16, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x0, 0x4}}]}, {0x98, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x9, 0x4f0, 0x0, 0x88a8}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0xffff0add, 0x478, 0x6}}, @IFLA_VF_VLAN_LIST={0x40, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x800, 0x5ed, 0x200, 0x8100}}, {0x14, 0x1, {0x7, 0xaa, 0xfff, 0x8100}}, {0x14, 0x1, {0x7fff, 0xf3c, 0xac1, 0x8100}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x1}}, @IFLA_VF_TRUST={0xc, 0x9, {0x2, 0x9}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x7, 0x8001}}]}, {0xa0, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x3f, @broadcast}}, @IFLA_VF_RATE={0x10, 0x6, {0xaf, 0x10001, 0x2}}, @IFLA_VF_MAC={0x28, 0x1, {0xd4, @broadcast}}, @IFLA_VF_VLAN={0x10, 0x2, {0x9, 0x467, 0x5}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xffffffff, 0x2}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x9}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x17c370e1}}]}, {0x38, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7fffffff, @random="cab597f5c815"}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0xb3a, 0x2}}]}, {0xdc, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x6, @multicast}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x6fa, 0x16, 0x10001, 0x8100}}, {0x14, 0x1, {0x3, 0xabe, 0x6, 0x88a8}}, {0x14, 0x1, {0x400, 0x37a, 0x100000}}, {0x14, 0x1, {0x7, 0x87c, 0x5, 0x8100}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xf4, 0x5}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x0, 0x2c6, 0x9, 0x8100}}]}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x7, 0xffffff01}}, @IFLA_VF_MAC={0x28, 0x1, {0x5, @broadcast}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x16b, 0x200}}, @IFLA_VF_TRUST={0xc, 0x9, {0x4, 0x101}}]}, {0xb4, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x400, 0x2040}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x401, 0x9}}, @IFLA_VF_VLAN_LIST={0x90, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x2, 0x5a4, 0xb97, 0x88a8}}, {0x14, 0x1, {0xcc, 0x111, 0x8, 0x8100}}, {0x14, 0x1, {0x8, 0x471, 0x6, 0x88a8}}, {0x14, 0x1, {0x4, 0xfda, 0x4}}, {0x14, 0x1, {0x9, 0x872, 0xff38, 0x8100}}, {0x14, 0x1, {0x40, 0x45f, 0x100, 0x88a8}}, {0x14, 0x1, {0x0, 0xab4, 0x400, 0x8100}}]}]}, {0x54, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x54, 0xffff}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0x7}}, @IFLA_VF_RATE={0x10, 0x6, {0x1, 0x8, 0x7fffffff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0xbe, 0x1}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6, 0x9}}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x5, 0xd6d, 0x7fffffff}}]}]}]}, 0x424}, 0x1, 0x0, 0x0, 0x4}, 0x8800) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_LNS_MODE={0x5}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6}]}, 0x24}}, 0x0) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x604, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r6, 0x8004e500, &(0x7f0000000040)=r3) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x1001800, &(0x7f0000000200)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}], [{@pcr}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) (async) keyctl$search(0xa, r0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x0}, r1) (async) [ 1609.286526] FAULT_INJECTION: forcing a failure. [ 1609.286526] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.324646] CPU: 0 PID: 11062 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1609.332549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1609.341903] Call Trace: [ 1609.344491] dump_stack+0x1b2/0x281 [ 1609.348122] should_fail.cold+0x10a/0x149 [ 1609.352275] should_failslab+0xd6/0x130 [ 1609.356247] kmem_cache_alloc+0x28e/0x3c0 [ 1609.360395] __kernfs_new_node+0x6f/0x470 [ 1609.364541] kernfs_new_node+0x7b/0xe0 [ 1609.368430] __kernfs_create_file+0x3d/0x320 [ 1609.372837] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1609.377500] internal_create_group+0x22b/0x710 [ 1609.382082] sysfs_create_groups+0x92/0x130 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) getresuid(&(0x7f00000023c0), &(0x7f0000002400)=0x0, &(0x7f0000002440)) r2 = getegid() read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000006780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000008c80)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r9, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r9, &(0x7f0000002080)={0x60, 0x0, r10}, 0x60) write$FUSE_POLL(r7, &(0x7f000000ae40)={0x18, 0x0, r10, {0x9}}, 0x18) syz_fuse_handle_req(r0, &(0x7f0000000200)="e6a0efa6a4a3506e3af468a3298c1820ac1d9c0d4804f0101b30b1e821a2f3c30e48096bad47c2e951276d330a0f6822bb9c45c2ccb68c5f6774a0b42183d1eddb780c6fc88c81a4a7131d492d7c340615702cb24e8040606548ede2a3b43d2570df30a869094affe2e3d08074b406498614fa1f4cc6bd51423aaedff8e310ae4c94a9f59f4740904d64ded6794c29cc9ed324d2e4a99877c3bfd8326f5a16eb61695960578d34d4a8b1acd67ced75d3ab1503788d042588506a80b9390b300a26f86ee7769dcdf587718eff7fc695bea9cadb4ee1765d263f28794e8a52789c9b8cd8268e329828325157f70ed1d4a4aa83164487f1bb49c658d5a27caaa0d2bfc301700eef387f3d8faa905928634bb26ed6630c0d2941073374c1885cffaf7b6efb70f03e38223cdac3695018e55a440ce5e480ae263b90b890670fa34cce7cd56dadabfe985059b52ff17819f1f73bfde309f4eecd8dd8c3fdb032603f186931de1b13476aaf00a0f4e2d038226a99e4f667f3cef7383227c1e1c8128dde6f13748ec7138ca0a38f0017a36ab5687fe7eee215186e4bc3a459d5e99a47c68d0d3614d382d7c39b1a5aa3fddbf69e5f4d8a43a608e8a806455320508f4513c64e22dbc2f26745c1b64e4d6104d4623ac81a134182cd9f02ed5674682593fed62a9309899463e6857f4fc238425e13d82c070980d0559f769fc209b89f72e9da59076476ed91302e81bb29c090b5f0e62031a09279faa0bb9b4a0cb4586b4c368366cd704dcb0a680a0130f51e14063415f649659dea034930b07743a372b7e240d501b331a151a4ded449d8dc9f5f3373d0e76e99962edf986a3da840aed8972ba487ad445c08824167263d4a80ec36053f2720045785e0b2881685c3fc31b3a24fa4afb5b84960a05bcbf13135487bb4d641445472f4144344219a745890e18c57b66f96bc155ee0ed86521ea05d36babf849514e23c0c88fcfe573a01667d8ff5f44cf107ca8bd7c5c7d557d9cb28c06e6ea27f44a9807096473172b321f6e4bdba5a81131a04e0c3cfc191f231d2fafc77b3220c27a55db1bf1d4f2dbf7c328c5f97b5a5fd5123763ef62d721dffded294689b76e19aae3af535f19adce85507a73e5f6f82124a9acad24a16151712d24843cd740a32e1588c826dbaaf930c3b847cfdc51c55a028be4817471d3bf9855df36e7a67a9798050f378ae5f2334e4dfd6a618d4be8929c4650b8c61476e8fb094d685643bf702f0833cfafc5a32762f6558269360a31cd92e6a1e403d9886cf53d5f04801f1086a6f3d00b11ee861813fdda4cbaa4434bd3b8c6c938ec4954ba43c2494d95b9120e791360a8e14d5d3cb00c3e3dc016bcc377aa59a4a74f7e8c344293af24db98eda623648df9c4e35812f20e839808739b2e6db3308e5c6d2d2c8ccd6bf5eb5ad6a08577f3f090fd0fa8ae6a7410000af9b13ed8c0c077533677f5dab43a443c7ce3c41386c22ba9487d0e13798e9fc9cfa0a53d5a4036848290bff716f68bf02f06549ec40aa1c5cdca7b4fa8a82a391cee08093db9b15bc55d29d3cbb17aae05dbb012277425efb4b849fa8e965a341e0a968957f54d47759d147d46f0995de1cd158c3e4ad3bfffe60e0ed6f3d27f80f97432e11517bdbcd4f5b6fc3111b5f7ca1220181139a3900f4279427d53ae0470e9d3325efd0d01ad60c83641581ddfdea6503be334b42900144a6d54182ce6b687e6c10cd3bf5d72286a4956517f09033ab583d9a19a69e7b8e8adb4d19aac00fabb1fdb5dd9389f423342b7da222ae0a76bcbf609b36698fde2bb7ade408cb0b658d3aff8da4e4ddc7f3303eff58e99c796b1c02fcc2246f4ae983096c181ea70869f9da905c14cb7961a82e312d0ead2b49b962bdc3c93d26045233388094e2971be73c22d07ee9cf59583c41c1e0fca0fdc568faac71facfee5f3156a00dd0d8000049d7c797c1663957235ad8327b8551ea86fb12d7c853591e0ad3682833e76fd6b6f57fcd736b13cfc7c9a965c946d73a4cd5f8d9936bb010ebcf6477c3be5dfb06718ea87b5cd00ea7262e58f56dc0680acea77733abca0d8dd9e7e88a4bac724ee3e0181566809dd831050b6564d99e86fda14efdb5e748b13e465baf73e9f1c4696c7c8ec48f7be3b888e8c0c0c99a5f371d702ec0ce79603adeae1a9d058055ab40728d24b78648cdcc990115f4a210d259a5a8c1a3f59b0a36d28e37c4df13eabf064eaa3c373c98467b54f0e7054810128b34b3b3e22f67e313e9e1342e8035908c9613e56208e0a288eb62d624f60c1d5a6591105a59ebddd4cd89ad053b9c622ccea61393a3f824dd4e094522bade5e9778f9fe2253bf54e38551295453ce251ed63ac3c1dd0dc4ce711f271af213d226826df5957359988ae65d227250082bca77cf27c8bacc2d1f79e636a05901bd1247244535b1e807d7c18bed143c812778bf071bd3a26bf5b9414e305aad4ee240f903d5bec5d0409c4f94752a1a62cbf0a96d79f86311bbe77db0f4fd8bfd6a61a323eb65b6c3ff9785f4e6b96b3052f47db124e4fb3d38c8141e5c38cc973b41b734faf809163934186e25c2de06aa7c2b4c57090c8b9b697de7745ef8ba893a95d9858a50e658562606ee9de3dc9907af69df30845115ed8aa6a194cab69f206ac1cb924710abadee799cd6b29bf1fa2158c14f59b1d4794e38a5af01fdc0d276b7291cffbc17cce5b70320b316f32a11d9a12c5480ce020ecf0a8c1216976244db8df6f95da1a6668d07643cc291bcf5dcc631d73439942ae3228a6dfd7a259a652e591e5bd9fef879e6807820997e79817b69908a1a825c1375730f4f58f0cc182625a70b9428a0b024e7502c1b55ab0cd29d886e360ae326cec200123c5e5c5a7d65c8c7897ea6dbabfa6e1aa6e6be7432928be41cf505455cf08812a7859f47beb2bde326c314c090aa1cadb051a838d2d32a0e229f98f10cacbf8054a7321294094852e74adc66d838c8653617fe24546943d9ce1916f0a04dd4004cc8c77de33f6b6200308b8f26f6400a292c442148136013aaadc3e21caca80c4099bbc54d5d598f8463b11218b99ac0040f7cb2ef65b446376bbdcdbd4b30c6a227dec4bbd1943793b7e442fe8bc1a3a22e762a3e95d79ce68d093cb2fd705a1df74d06361f1db408071ed7e95d26d02948cbadf9d151433828073d9ca15ed7b8127878a4ce28e46da0d38668c841346d2f2b90da03326bd90548c8cb16fa23539ec3a1a245f620f81c6705991ecb2bddb32d83233731f5e70264dc7c05fc2b2cee0a04a9e37b92bcde80f25a9971af8b668dba1b611db39c6711451b3ef8feedaa557df697a46baa71330e1c270f8a70fe15ac0bf71a033a65fbd163643633c7da3bea8a0a2d4271540dfcaa0b7d27f5c979eb61de7da32a144ee8c8f38e7c4ce1613f1a51299948c21be9a4fbb252896ce512cf5ae9f5f9014b2571107323fb99e8023d3f4c0c9c5e71ab6ba027cacd5191bdf54022aa241e5d85d7c84260c40cef41bc86a68349d407a513659962543f500f5590d1f22e563fc387ea5be7a2a000f5c9f88d69101ee00a5d50b75202c9eb1aa5f84ff6e77b6fde127adfd997b20bb887d361d4124093502c08d98cdf497a8ad3797a2fb523008a90061c455077195cdc41920bf3df7c4b5cf52696aaa66f856d396e961518f1f66669e9caa0577fb3e0c36db2dc3c18352c6b6b145499b6281a7f05da758e9701d11c3a4be9cd589211d3bfa482e041a7ccd27edd19854e6d7c16ef4938779a6aed321e25ad9411389e1fc1a3663fd5df93e4a03fcef41a3312445f4b39e0b42895647b07fabc7f7a1c17add040d668245e3976aa3bfabe3d6b80191b26b34f12f940a1749294cf74fd60a223daafad847b17d36b8d092e38541d9950300db72452bb71dafb10049e6caf205555df69577d21ab5ff71f52ef5b7d3fc5d4cdeb9e558d165a7ae08ea7eb392fe3aecbbe6d6ad41e81080edc494d5e7048621b7c454d9d62f6832d50b0a9f02e8237d4fbeae7b7d7458e1c24122d2e85cb33fb1d18ecbbcddea8231e1454961edb36e99f59bfa89e57facbe859b7132f47b72505e34c278ebeb2173a586e10a0fef7dd9430209d4717ff16517cca43c8a6a6e7bdbdacc9feabcb2389f851f8a9ab28b969f4045fe2a98c3a4f2d9abbd35e0b7884f01d8be38ee9237210cab6af0abc6cefd050a5efec0510688a72361be8353ba7cc88946c3d8577e4484798c38a6f34b0fa1e7667963e0b8031537a04cd37299776780a941f4def4849897eb7e1134cf65c1f050efb46e123d4f955a51957a105da68f145a6f9e0228f2fa88adb244678573f7d58e4ab0b9d83e80ee454010c519535ac35e28ef74f99cff3e1ba1d69c18faae7ffb635d43da5407be25cd9769882d4429f7ae58f12ed0bbb9795e914057b69a40dcfa7943dc30ca48d0657a5c8b2d49e81360905836f2d19e741874b7531ec25b36e082ca10dd2e8405521f86724373ce3988e18722ebd5d4ebc8623321ab3d25fa9513ba9f732bf8ebec419afd05eed2982010bee30f0076eaf9b23adb05b88a037279f4b8c90d0912599546ec1ed8af0d8b95ea37a5d31db9dc876e2739f077186c2d4e5615e37e2fb01099e9d2c3c9c142b50441e51151e6b0d0c082a5a1849621467225a8ee9caf0c2c7758cc09b0c09b7c65b3feca626e5efc0c56314df9b80a1b71d8d0f49c3b08e73587297e0f1ea797b809be38b31bf03af91cdad0918c3ecbd2fa4b6694412c7d58d134b1cc1fac73a72a95561d1383c43ce15a47fa29699387e6e6b4a806c62d5b25b087ffe87af353c29fd3c873bd215133287f3208944e54fd1cd9d62495d0490c3cf4e1b379b58dd4bfd006b772a1de24fdc0e8271b5b32ba05c432982b7a33c1fd580b008cc704ffd8d519bc4a864736e78fc45234ee965a643204f25d4a007f9d8ea47534f62f8ba9d30ce89022d848f5e35a1efee0bda6dbe26d8818486348f3d9eb23da94ccc365907e20ab46bfea3fc0fe5284e7b7ddeda247329e391fd26b63ea732858678ed113ef4875db198c531af8711192050cd76078e5b21968d4df8811c21f885ff6526d2d433e43f6d76e8fe7730f6faadd316e75969e89b2509d7412965b23407b9236e4b575fbd31ad185a1708dbea0e6bfffa7a28d9411d3706ea269b76bcc8ae16f626a4b2db2cf1d96064aa934db92437e290884823ab49debcd6af81947f1ec5af577fb31e943baace05500cd9fe1ec7e05d44eec29fb7927b886800c8a0365cf4d81397bd1ea5c3e34f589c0a345ca11a57f26a7016470dfa334e29d15892bf2b61d6714ad2f41e8c585080f170cba2de86f0816a52bbcc41ce3008613998cb0ce35fa5b7a0e7619c4704795243fff6e7c6a624643b5c912692e6343dab6ee648d30e4d904258af5775cfd2d11308bda2638ddbcb7385502188416fbc9aaeff51a457d1030a2c556a07dff5dde75e9c08ced63d83dc9ab38512a3803a18fee834526676f1c6802220a33dccd48f95a3ed5e0d1fd549f2482464cfce3629fa1226e069e99ea53217a26bc752934ad8f7d9a6b5180a4dc4d2cb4bdd2613e89caf69a19438d9f05852f77fc26db138358809c11e544132df586bc9cc8b7e83537f98189987bdd74437341222a17f360c81dd613ae84a192725c16bfe8ed8333298295629077da39d3a2d83773478a326302275bfda020da1423ac4f4a85e3c6ecb0d56b00d64b92eca4fb383e3330296dbf48f9a02e1d6756712a41375c850d15091ac6e0a97d2b359d64ae0d099e3ef8e356ea8ae558a1a43f7abc431cb8bb1388c2b66ba605ad1bbf211764c492a58d5d7d329dd069248cb08a7b12cc21440667e1383413b27d9a998ae611efe19f3225c5d36f773187dbec95329c444c2a0d49775bbbfb89a7aa2d0367def1f049f02a181010076ec9db433c3634d52f970abcb0d8bf4868136c249fb41d7d3e7fe8408d28a2f5ee2c7997b5c32f6746b5ba4d36121dc86ee4a3a7074a5b79aea824efac0f1dba5f5de2e5dcf89de692d4c02a8821316153bf288896cff4c47fd6a1428b29e4db3c6825a10dd050cb39768d588a129dd6e3db86f488bd0cda67c044e28524572ad1b4baa52b7b44c846a5e8ab307275821869959b66a411eaa25f2eba88317df21dfdfad8c2573b2282ca31af00cdff28149a9a69b472bb5a2962e90be7dadd10c1c271389221ad886e2f565b83678e17dedf4e4120c200470c10a282d2537e77d98b8ff3b7fe29fc96c003cf56aabc639ccc7d5349825fad74d804237245087323eeb9c2a12a63a8acd03f1a7f853040ba34107bc13b84034b1957979a14b0fd12134bbd5ed7b7bf0d1d033d76f487cf6de04e83db82807850a0e4902e080f62578376f9e3f42dce095fda82e63aa9080d80c809925221d28412526a95d9a1e64da0ebdd366921235e3add3b6bcea773d0b1979dad24ab744e91f7197a7f56a0f4e96243914164f50fafc9c67c2d9024af15280bc7558338290eb3bebeef0717149ab5bc5b5f81a51dcbd1b42d28b9483bf190d310459eb554f5cc590afe6e100228ce36a90f089f210613be66e8a118a3be776c60c064dda1cbde9f5523959b8f35406892682e95541129cd59c30ceb931f18e4a1b4f7c82b8fa35ab9e190051540fbe80f8c9f08689850c6e9edfb1e104f9ddaea15fef65e3a2dac4d1d65997536e49af6d407a547517138cfce38636aacacd6a370b7995e4f32c910d66bc94739dcd3b667c6dc925dea5bebea03891a01a08a51c2f62e080979e2a2f64217c1e8c4043fd73741699edf1343552219f9a9c58b8143d65fa3468b6a641ec485a04a594d50cc9bf22a08df2d2b8837c595a880698decbb03ad348f65d589d7ff82820b0504654c261cf9394bdff0406ac63d135c8c4023f17bbf1e6cde01f3e5b051a2aeb37100d82bd24e567b98d551fb892d46e3b5e9706f65f8a8d2be1382dd6e5392d7b598ab739a770f11cab5be0524d0b70cb442c0f472dbb20ec7b52ad99df7db4bdce78a826d3ea428b909a49fafbab06acae6c87b519448a1b70ecce08178200c879e5d15a485b113db253468b388156d071b03c5f9d4439c4e4601eefaa064c4cd6d5e69520e9973cd4a0895c49d166606154bb496816ca0f45d2777c3d441b4b56b92fe3723e977d3470c4bd264854fb3da825ab1366927f442442d356724534902e36ca674025eebde2275fece24dfe134ec930e990d353aea9f490ca2746dbbaac45377c775a07e81e5705a8bad672637d0487f53df1581d69e0bb20a59b5ad73723c58fa7a3b8585c4a747ff4fd35ee55f7a22fbb8c5d239da3b5dccbe9848aaf910293c64c672e2b2a8056a1af86aedb1ba374925ee18d1ca48cae12c169e59508cd636f8dac81ff11c7a711820da923c705ec639a286d91bdd5dd653cf636a07de8f1ffb2142dfa27b57ede8f061654028f443eae4b976a479b92c2a7d8b9c7f24efb73e069939e92107ef4229cc9598ee1cbcb87b13d25f4981bc9ca3051e8dd4056d6b5a9c127d6705aebe57a3bbc9dd2be360f6dd7ccc43307d5b69476921d3dbf9f6376067bce0da1c0aa50ae25122af7f84d8cab5256c52d2748ca6cdc74a8d6a84e738c3f490e997043753d9a2ddcd5a7a7be28653ce445ebb749e77916f1782a724479bc037d13d9bad9c0d26b8c7b35e99001b261ef095501c6f511f5859401730fd97cf72cbc74aab535c482daf9f01feae627534a30a6e7034910aaaf37329263e73a8076c176d7c3a9fd51fab33050adebdc052bf29248921b2ce1ecea531c277e8c494faa4ba19a8e3d97dc737e2b944d5ad10cefac59e891cd8da9ff365b59a678bc94a7028dec05c90e1f091b5f5cbc4138718e32b2f015718062cc0d57184c871fef442176789cd89df685e0f225968f30eef25ab35f600d17e62ed074c1c11e57fcb45da52845b2f1bb81f86448d7256a7913ed0d812695bb33148f35212c34aea0969388a91e2726ddbea0b7944603bc8653b4bc9a2f6d7e9f1b6d25db2fed22622c9ae7f5f10d2529580ba9b768bc905aef580e4a07f79cd3cca124a77328124ed156541415be42df15685422b8cd0dc153024f64617bfcff5253f708083e2cfb0506194b804d97a0ec298aafccc7f5a11b5dd1aefbccc2e0a257e9a80a35518420efc837e812ce10a776b040c42242261b93d02b49203f2aa3c0e65abf77db28ae9e3307c3ad71023c5e17e8754a046aa7696c73810e96718f97c8e05bcd09df83103f5b14dd776cc56636c4aa095cfd558018ac1919c18ef638f52020bd44afcc8161c9b3629c5c24dc1b0b2c08baeabf5c365fef3700ec2e6262f7e66935e86e358ad6dab47686ff9c40724720cdc96a61c3d991fc687cb4734a78bb1d731671392ef856cd403cd62adafca7f3202a38e22e5d870f4ae4c9bc81af3337c9311b99a9bd701a2294cb192dcff9c9ee3f761920c0f18a67188864dbe16202dca63297788cfe8f57d2a6f911206d442272e7bd5000c5973f10cb5f6e046cd045097ad636918066593e168be7ea5b6b245ad921b6bd49de9763111b8689bcbc4efe9ac54805f0ccfb381ac3aacd8112c20bce96a17c186e5ca835cec2ff23f5c1c6e17e2c1570d30849a2df44b3bd60f9fb72cca35b88f5c962c0e28eb451f3590748f61ba6e9b0f6340d21cc427af1ca335b2569f397410b9c927f35c283e99d61ed4d483b28fd570a088ebe1e391edbc31a20269f485b16429356b48cf9671012ebe0d95fb22ef2ed5ca698e008eb0b657125998f056db36e0c4aec9b1afff0d587dd0b730f78caccdd2d0458d49db0dd1f281acf522c4d3623003b5904a86a84d2fec33fe8186725b83ff822e41e88305aee31a8f97d2e723fcbd5410d90a64f0cceb2410eeac0971b7416d6c1fd2a346189213e881d3925df3a325a126dbaf6b02d36cb7c8bbdadcb663e3e57c97ea201ea29aa80edcb4d8c12ccb20bae0ec712e8e122c9b00f48d2c07d8ec71996dc23b22d27e233b4aaa18b874fe80fe519ea3b038b6d560571d9702352d6931a749a192264c629db9af4f37c8bb9551979d28e2d2da0084447faa968ab0c885444ca59c0ca49be6fe6a1d06f1aec42fd5ed45a7c3a7cc0c8dca8c91a5f9656646592038df27973bde92551c6b89e4c9ad7e7d2ef4cf1a2cad84a285618a4d4e9af32be3dfaab1065f92f3f25eac20a861e13aafff584c9b24cd26373827ad272d4e695d8553b51941b9803b8b33f5735fa6988e688753ab9059d19c87c342ebbde323a2c3a5058cf8a549c24490e8a2f45ce0b479158aab1053f0c0a2c2401ac3010d1ee2855e3a34512a647a040336fb03a7a772839d8bf72469d323af62e20f58562e8a6b909c0daa840c4ea5f0c2211b25944ae8e3b71ca368876e2ba0d69bf3aa1f84d6905b9178c5ffadf0e2592b53ae21f1330c162f65d9ec0fd9e7b61e80f740a459cfcb17916bda98ba1cd4e35c2f76f319d520812c5e6832d7be53d702a77b5042f462288bf367e6b52f05dad5caeaa77a36fa7ca0bf29341aa6980f6fd51c6878efd3f5c577fead9014136d6fd7afa66f8021a6e87ed5e5e089dcda13f394948509a0b46a287f06ce98ae45db4bff58a842e3ff0c231e4c09f4abda6200317ecf628a8c65089b5e37c240443bc3dae3cb31b25acb858f5f9e7be674e6ee9da99bda5e1d4067a660fd58e857f2fd410d740bc095c850ac82cbec963c99e6b2271a5684bfe3e1bde40cb9d7d2cc438a4f6917aa0db4fbe1785e78a41849bd398cdcbc860510569e3895075041aed716c75d827b3847eca9d51a98dc7949f648d9f00fc0fee092951ccacad4374d0f196d4f5ac458339944b70a537aa71e8f01f516551fdaa9d4c356c3c60ff28ab2e03235b35b7fbf8e28954ff6d65f7c67f1271a17f099cbd877d4d97c3e253842a7e668fd2453a06c02bf76256860130be44442567e8bc3ef6084ba006fca1fbbc74c6081877b410bde687c34ef0776142b26ffd4117654289ea830d3a22a4790f50098fc000f2eea6a15ab866d43601fa375a4c181454ecde43b7036edd7af86dde5f6270f2b33879fde0e147636c1507294b28d4d8a25f3ebe0883f3c3cd5285f398ab5f6ee8180798136f867caf67f072f54f6004f5777308251016d00f8fe265f0787dce9f5e0f95078afda514ebdb99c2597b6dc52bc66bde84193d020e178cc678bf6f558c3b6348facca2c9d7b9974fddb586edc4fe7eab7dc7495dcb2c9eae8dd71b3332132ff07aa51f3ac9a47b6d29144d445bf2c2987992229fdae59343330375673b7e851cc9f9acf2c78f6f1b62414b5bf7af4cccc5b08c49f89ff0e1962e79ada3c2248330de772719b1c1a40c2ba136ea8e29397720fb4d250cb956dfa50b2257d6cb94ec8e301ff63f96de06ce1c5872d880a39cee3dd1b0fb612f5c67869c424a3c4c54d00f1db442b62ff96eb6943a29e6e76bc6a5172b0b92ad7968c59bd344fe5e53419ae3d06a71eac15325be72cdea153773c939ec162c2510750cbc4e6c6df0e378653ef86a7c23965952d41ac41e6b96107cd5e9fbb3d97f62d8f3d0f4f229a7e8e3dc6d3088322fc4bdad716b7c2ee578f967017bb029c97e91d6acdb846635be4ce53164f96976ed28219c169c80657ec00cab36195494dd99cb0ff8446b254126c1036885933f42f27f918c4b31c90d6d7ce35d6465c7a8c585ef4320f1046f22743917f0553393d817fad82f60e3300622551cd51cd9c427991874e229a6dd18c1cd387e5ad5e842c9a9d5246258cfe1b54974a526b14c0923189dcfe2fa22ef6d90f53f87974524c5934a95dd5351720bd92809be487022c75220b0a9355c3d075ade7a90ef91cd0724bec70c9875e613f3207401aac14613641428a37b0ca9ca332470793e25caf89a9124705ec1f35eacd7c9df94880c8a4e18a500b2f97c92dc1247dcad570537318ffc761d6bb6366261c834929dadd6b50a7eebb5622761577470ff89ce73084ab500947c06cddcc7965571e7448d8630321e267d0b93abe844f873cf02a3c5927ad7c985634334d9902efe53af987ebaf4d546fe6cd644367bad421b4d9589836eee9db94dcdeea0d7c57d2c4fc70b2b29c9a906036ad0c6d189fe312608828cda0c5bbbc87cf3a7607bb25e4b507e482ef1ed5c04c1a945b98f0867fda700d264699493866be80d80d7d5b511f2c788b7cec6bcca788bbc9acc16e9e9a70d557b5928ca30a9631414345936fab424def053b49ac895dc528aff7bd0c61ab9ece4b7c492b9dd5ac69554cde0c5c10c43d7de79416ddea7a16207c34d4a1d47b434ff10c65811a79d6fc0c14473f3d87b30ed4fb7b74f86a1d34b8988b75b1fa39f1fb65e7e9b147784998175958bc275b7a5e40ce145c64644baebcb3919a84b4f9db437fae07ca79c1d77d6a7f573b984a37eb1693fb16561c35ec2115d0aea3723babef7d3d8c0e6a477c0ac24426407d4245b0532fe529a413c6b55706321c8a92e28c6101506e0251edbcbf2177bd046329de289805b2c", 0x2000, &(0x7f000000adc0)={&(0x7f0000000080)={0x50, 0x0, 0x8000000000000001, {0x7, 0x24, 0x80000000, 0x10008, 0x7fff, 0x2, 0x5, 0xfffff61f}}, &(0x7f0000000100)={0x18}, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x5, {0x8}}, &(0x7f0000000180)={0x18, 0x0, 0x1cb, {0x5}}, &(0x7f0000002200)={0x18, 0x0, 0x4, {0x400}}, &(0x7f0000002240)={0x28, 0x0, 0x6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, &(0x7f0000002280)={0x60, 0x0, 0x2, {{0xfff, 0x9, 0x4, 0x0, 0x2, 0x101, 0x1000, 0x9}}}, &(0x7f0000002300)={0x18, 0x0, 0x80000001, {0x1}}, &(0x7f0000002340)={0x1a, 0x0, 0x1ce94af, {'/dev/fuse\x00'}}, &(0x7f0000002380)={0x20, 0x0, 0x8, {0x0, 0x4}}, &(0x7f0000002480)={0x78, 0xb218e69c28fc4498, 0x19a, {0x1f, 0x6, 0x0, {0x1, 0x2, 0xffff, 0x3, 0x2, 0x80000001, 0xb24, 0xff, 0x3ddd, 0x2000, 0x2, r1, 0xee00, 0x9, 0xfffeffff}}}, &(0x7f0000002500)={0x90, 0x0, 0x0, {0x0, 0x2, 0x3, 0x9, 0x7ff, 0x7, {0x1, 0x7, 0x9, 0x1, 0xffffffff00000000, 0x2, 0x3, 0x2, 0x4, 0x0, 0x40, 0x0, r2, 0xddfb, 0x8}}}, &(0x7f00000025c0)={0x130, 0x0, 0xffff, [{0x5, 0x82, 0xa, 0x7, '/dev/fuse\x00'}, {0x0, 0x3, 0xa, 0x5, '/dev/fuse\x00'}, {0x6, 0x1, 0xa, 0xc1f4, '/dev/fuse\x00'}, {0x4, 0x3, 0x1, 0x200, '}'}, {0x2, 0x7, 0xa, 0x0, '/dev/fuse\x00'}, {0x1, 0x9, 0xa, 0x0, '/dev/fuse\x00'}, {0x2, 0x2, 0x0, 0xffff}, {0x4, 0x101, 0x1, 0x1, '.'}]}, &(0x7f00000087c0)={0x498, 0x0, 0x9, [{{0x2, 0x2, 0x5, 0x7, 0x1, 0x7fe, {0x3, 0x9, 0x8, 0x3f, 0x5, 0xa3e, 0xd4, 0x2, 0x3, 0x8000, 0x1, 0xee01, r3, 0x1fb6cfc7, 0x7}}, {0x3, 0x8, 0xa, 0x101, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x1000, 0x5, 0x55, 0x91, {0x1, 0x101, 0x8, 0x5, 0x8, 0x123c000000000000, 0x2, 0x20, 0x7, 0x8000, 0x2da, r4, 0x0, 0x10001, 0x4}}, {0x0, 0x2, 0xa, 0x400, '/dev/fuse\x00'}}, {{0x0, 0x3, 0x2, 0x0, 0x80000000, 0x1, {0x5, 0x3bd, 0x80000001, 0x36, 0x0, 0x3, 0x100, 0x800, 0x8, 0x1000, 0x5, 0xee01, 0x0, 0xffff07be, 0x7}}, {0x0, 0xffffffffffff7fff, 0xa, 0x4, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x2, 0x8, 0x3, 0x10000, {0x5, 0xa719, 0x8, 0xfffffffffffffffa, 0x80000000, 0x1ff, 0x9, 0x1, 0x2, 0x4000, 0x7, 0xffffffffffffffff, 0xffffffffffffffff, 0x800, 0xfffffffb}}, {0x3, 0xffff, 0x5, 0x53a, ')\xc4@!%'}}, {{0x2, 0x3, 0x3dd, 0x6, 0x1f, 0x3, {0x1, 0x6, 0x101, 0x8da2, 0x8, 0x3, 0x3, 0x5, 0x0, 0x6000, 0x1ff, 0xffffffffffffffff, 0x0, 0x1f, 0xff}}, {0x5, 0xfffffffffffffffb, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x2, 0x3, 0x4, 0x3, 0x4, {0x0, 0x9dc, 0x3, 0x5, 0xfffffffffffffffc, 0xff, 0x4, 0x8, 0x252, 0x4000, 0xbd, r5, 0xee00, 0x800, 0x1}}, {0x5, 0x100000001, 0xa, 0xff, '/dev/fuse\x00'}}, {{0x0, 0x0, 0x3, 0x1b8c, 0xfffffe00, 0x9, {0x5, 0x6d, 0x2, 0x0, 0xffffffffffffffff, 0x5, 0x7fff, 0x10000, 0xd637, 0x8000, 0x1f, 0xffffffffffffffff, 0x0, 0x141, 0x2d}}, {0x6, 0x0, 0x7, 0x2, '+:&!$.!'}}]}, &(0x7f000000acc0)={0xa0, 0x0, 0x0, {{0x1, 0x3, 0x4, 0x9, 0x2f5680e2, 0x773, {0x3, 0x2, 0x3, 0x2, 0x7fff, 0x200000, 0x1, 0x8000, 0x7, 0x4000, 0xfffffffb, r6, 0x0, 0x5de, 0xa78}}}}, &(0x7f000000ad80)={0x20, 0x0, 0x7, {0xff, 0x0, 0x8, 0x558b}}}) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0xef4}}, 0x18) 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, 0xfffffffffffffffc) [ 1609.386398] device_add+0x7e5/0x15c0 [ 1609.390104] ? kfree_const+0x33/0x40 [ 1609.393811] ? device_is_dependent+0x2a0/0x2a0 [ 1609.398389] ? kfree+0x1f0/0x250 [ 1609.401755] device_create_groups_vargs+0x1dc/0x250 [ 1609.406767] device_create_vargs+0x3a/0x50 [ 1609.411004] bdi_register_va.part.0+0x35/0x650 [ 1609.415585] bdi_register_va+0x63/0x80 [ 1609.419473] super_setup_bdi_name+0x123/0x220 [ 1609.423962] ? kill_block_super+0xe0/0xe0 [ 1609.428101] ? do_raw_spin_unlock+0x164/0x220 [ 1609.432595] fuse_fill_super+0x937/0x15c0 [ 1609.436742] ? fuse_get_root_inode+0xc0/0xc0 [ 1609.441149] ? up_write+0x17/0x60 [ 1609.444592] ? register_shrinker+0x15f/0x220 [ 1609.448996] ? sget_userns+0x768/0xc10 [ 1609.452888] ? get_anon_bdev+0x1c0/0x1c0 [ 1609.456945] ? sget+0xd9/0x110 [ 1609.460134] ? fuse_get_root_inode+0xc0/0xc0 [ 1609.464545] mount_nodev+0x4c/0xf0 [ 1609.468078] mount_fs+0x92/0x2a0 [ 1609.471446] vfs_kern_mount.part.0+0x5b/0x470 [ 1609.475941] do_mount+0xe65/0x2a30 [ 1609.479476] ? __do_page_fault+0x159/0xad0 [ 1609.483702] ? retint_kernel+0x2d/0x2d [ 1609.487583] ? copy_mount_string+0x40/0x40 [ 1609.491832] ? memset+0x20/0x40 [ 1609.495104] ? copy_mount_options+0x1fa/0x2f0 [ 1609.499592] ? copy_mnt_ns+0xa30/0xa30 [ 1609.503473] SyS_mount+0xa8/0x120 [ 1609.506919] ? copy_mnt_ns+0xa30/0xa30 [ 1609.510802] do_syscall_64+0x1d5/0x640 [ 1609.514679] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1609.519842] RIP: 0033:0x7f2196c8261a [ 1609.523532] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) (async) keyctl$get_persistent(0x16, 0xee01, 0xfffffffffffffffc) 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) getresuid(&(0x7f00000023c0), &(0x7f0000002400)=0x0, &(0x7f0000002440)) r2 = getegid() read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000006780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000008c80)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r9, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r9, &(0x7f0000002080)={0x60, 0x0, r10}, 0x60) write$FUSE_POLL(r7, &(0x7f000000ae40)={0x18, 0x0, r10, {0x9}}, 0x18) syz_fuse_handle_req(r0, &(0x7f0000000200)="e6a0efa6a4a3506e3af468a3298c1820ac1d9c0d4804f0101b30b1e821a2f3c30e48096bad47c2e951276d330a0f6822bb9c45c2ccb68c5f6774a0b42183d1eddb780c6fc88c81a4a7131d492d7c340615702cb24e8040606548ede2a3b43d2570df30a869094affe2e3d08074b406498614fa1f4cc6bd51423aaedff8e310ae4c94a9f59f4740904d64ded6794c29cc9ed324d2e4a99877c3bfd8326f5a16eb61695960578d34d4a8b1acd67ced75d3ab1503788d042588506a80b9390b300a26f86ee7769dcdf587718eff7fc695bea9cadb4ee1765d263f28794e8a52789c9b8cd8268e329828325157f70ed1d4a4aa83164487f1bb49c658d5a27caaa0d2bfc301700eef387f3d8faa905928634bb26ed6630c0d2941073374c1885cffaf7b6efb70f03e38223cdac3695018e55a440ce5e480ae263b90b890670fa34cce7cd56dadabfe985059b52ff17819f1f73bfde309f4eecd8dd8c3fdb032603f186931de1b13476aaf00a0f4e2d038226a99e4f667f3cef7383227c1e1c8128dde6f13748ec7138ca0a38f0017a36ab5687fe7eee215186e4bc3a459d5e99a47c68d0d3614d382d7c39b1a5aa3fddbf69e5f4d8a43a608e8a806455320508f4513c64e22dbc2f26745c1b64e4d6104d4623ac81a134182cd9f02ed5674682593fed62a9309899463e6857f4fc238425e13d82c070980d0559f769fc209b89f72e9da59076476ed91302e81bb29c090b5f0e62031a09279faa0bb9b4a0cb4586b4c368366cd704dcb0a680a0130f51e14063415f649659dea034930b07743a372b7e240d501b331a151a4ded449d8dc9f5f3373d0e76e99962edf986a3da840aed8972ba487ad445c08824167263d4a80ec36053f2720045785e0b2881685c3fc31b3a24fa4afb5b84960a05bcbf13135487bb4d641445472f4144344219a745890e18c57b66f96bc155ee0ed86521ea05d36babf849514e23c0c88fcfe573a01667d8ff5f44cf107ca8bd7c5c7d557d9cb28c06e6ea27f44a9807096473172b321f6e4bdba5a81131a04e0c3cfc191f231d2fafc77b3220c27a55db1bf1d4f2dbf7c328c5f97b5a5fd5123763ef62d721dffded294689b76e19aae3af535f19adce85507a73e5f6f82124a9acad24a16151712d24843cd740a32e1588c826dbaaf930c3b847cfdc51c55a028be4817471d3bf9855df36e7a67a9798050f378ae5f2334e4dfd6a618d4be8929c4650b8c61476e8fb094d685643bf702f0833cfafc5a32762f6558269360a31cd92e6a1e403d9886cf53d5f04801f1086a6f3d00b11ee861813fdda4cbaa4434bd3b8c6c938ec4954ba43c2494d95b9120e791360a8e14d5d3cb00c3e3dc016bcc377aa59a4a74f7e8c344293af24db98eda623648df9c4e35812f20e839808739b2e6db3308e5c6d2d2c8ccd6bf5eb5ad6a08577f3f090fd0fa8ae6a7410000af9b13ed8c0c077533677f5dab43a443c7ce3c41386c22ba9487d0e13798e9fc9cfa0a53d5a4036848290bff716f68bf02f06549ec40aa1c5cdca7b4fa8a82a391cee08093db9b15bc55d29d3cbb17aae05dbb012277425efb4b849fa8e965a341e0a968957f54d47759d147d46f0995de1cd158c3e4ad3bfffe60e0ed6f3d27f80f97432e11517bdbcd4f5b6fc3111b5f7ca1220181139a3900f4279427d53ae0470e9d3325efd0d01ad60c83641581ddfdea6503be334b42900144a6d54182ce6b687e6c10cd3bf5d72286a4956517f09033ab583d9a19a69e7b8e8adb4d19aac00fabb1fdb5dd9389f423342b7da222ae0a76bcbf609b36698fde2bb7ade408cb0b658d3aff8da4e4ddc7f3303eff58e99c796b1c02fcc2246f4ae983096c181ea70869f9da905c14cb7961a82e312d0ead2b49b962bdc3c93d26045233388094e2971be73c22d07ee9cf59583c41c1e0fca0fdc568faac71facfee5f3156a00dd0d8000049d7c797c1663957235ad8327b8551ea86fb12d7c853591e0ad3682833e76fd6b6f57fcd736b13cfc7c9a965c946d73a4cd5f8d9936bb010ebcf6477c3be5dfb06718ea87b5cd00ea7262e58f56dc0680acea77733abca0d8dd9e7e88a4bac724ee3e0181566809dd831050b6564d99e86fda14efdb5e748b13e465baf73e9f1c4696c7c8ec48f7be3b888e8c0c0c99a5f371d702ec0ce79603adeae1a9d058055ab40728d24b78648cdcc990115f4a210d259a5a8c1a3f59b0a36d28e37c4df13eabf064eaa3c373c98467b54f0e7054810128b34b3b3e22f67e313e9e1342e8035908c9613e56208e0a288eb62d624f60c1d5a6591105a59ebddd4cd89ad053b9c622ccea61393a3f824dd4e094522bade5e9778f9fe2253bf54e38551295453ce251ed63ac3c1dd0dc4ce711f271af213d226826df5957359988ae65d227250082bca77cf27c8bacc2d1f79e636a05901bd1247244535b1e807d7c18bed143c812778bf071bd3a26bf5b9414e305aad4ee240f903d5bec5d0409c4f94752a1a62cbf0a96d79f86311bbe77db0f4fd8bfd6a61a323eb65b6c3ff9785f4e6b96b3052f47db124e4fb3d38c8141e5c38cc973b41b734faf809163934186e25c2de06aa7c2b4c57090c8b9b697de7745ef8ba893a95d9858a50e658562606ee9de3dc9907af69df30845115ed8aa6a194cab69f206ac1cb924710abadee799cd6b29bf1fa2158c14f59b1d4794e38a5af01fdc0d276b7291cffbc17cce5b70320b316f32a11d9a12c5480ce020ecf0a8c1216976244db8df6f95da1a6668d07643cc291bcf5dcc631d73439942ae3228a6dfd7a259a652e591e5bd9fef879e6807820997e79817b69908a1a825c1375730f4f58f0cc182625a70b9428a0b024e7502c1b55ab0cd29d886e360ae326cec200123c5e5c5a7d65c8c7897ea6dbabfa6e1aa6e6be7432928be41cf505455cf08812a7859f47beb2bde326c314c090aa1cadb051a838d2d32a0e229f98f10cacbf8054a7321294094852e74adc66d838c8653617fe24546943d9ce1916f0a04dd4004cc8c77de33f6b6200308b8f26f6400a292c442148136013aaadc3e21caca80c4099bbc54d5d598f8463b11218b99ac0040f7cb2ef65b446376bbdcdbd4b30c6a227dec4bbd1943793b7e442fe8bc1a3a22e762a3e95d79ce68d093cb2fd705a1df74d06361f1db408071ed7e95d26d02948cbadf9d151433828073d9ca15ed7b8127878a4ce28e46da0d38668c841346d2f2b90da03326bd90548c8cb16fa23539ec3a1a245f620f81c6705991ecb2bddb32d83233731f5e70264dc7c05fc2b2cee0a04a9e37b92bcde80f25a9971af8b668dba1b611db39c6711451b3ef8feedaa557df697a46baa71330e1c270f8a70fe15ac0bf71a033a65fbd163643633c7da3bea8a0a2d4271540dfcaa0b7d27f5c979eb61de7da32a144ee8c8f38e7c4ce1613f1a51299948c21be9a4fbb252896ce512cf5ae9f5f9014b2571107323fb99e8023d3f4c0c9c5e71ab6ba027cacd5191bdf54022aa241e5d85d7c84260c40cef41bc86a68349d407a513659962543f500f5590d1f22e563fc387ea5be7a2a000f5c9f88d69101ee00a5d50b75202c9eb1aa5f84ff6e77b6fde127adfd997b20bb887d361d4124093502c08d98cdf497a8ad3797a2fb523008a90061c455077195cdc41920bf3df7c4b5cf52696aaa66f856d396e961518f1f66669e9caa0577fb3e0c36db2dc3c18352c6b6b145499b6281a7f05da758e9701d11c3a4be9cd589211d3bfa482e041a7ccd27edd19854e6d7c16ef4938779a6aed321e25ad9411389e1fc1a3663fd5df93e4a03fcef41a3312445f4b39e0b42895647b07fabc7f7a1c17add040d668245e3976aa3bfabe3d6b80191b26b34f12f940a1749294cf74fd60a223daafad847b17d36b8d092e38541d9950300db72452bb71dafb10049e6caf205555df69577d21ab5ff71f52ef5b7d3fc5d4cdeb9e558d165a7ae08ea7eb392fe3aecbbe6d6ad41e81080edc494d5e7048621b7c454d9d62f6832d50b0a9f02e8237d4fbeae7b7d7458e1c24122d2e85cb33fb1d18ecbbcddea8231e1454961edb36e99f59bfa89e57facbe859b7132f47b72505e34c278ebeb2173a586e10a0fef7dd9430209d4717ff16517cca43c8a6a6e7bdbdacc9feabcb2389f851f8a9ab28b969f4045fe2a98c3a4f2d9abbd35e0b7884f01d8be38ee9237210cab6af0abc6cefd050a5efec0510688a72361be8353ba7cc88946c3d8577e4484798c38a6f34b0fa1e7667963e0b8031537a04cd37299776780a941f4def4849897eb7e1134cf65c1f050efb46e123d4f955a51957a105da68f145a6f9e0228f2fa88adb244678573f7d58e4ab0b9d83e80ee454010c519535ac35e28ef74f99cff3e1ba1d69c18faae7ffb635d43da5407be25cd9769882d4429f7ae58f12ed0bbb9795e914057b69a40dcfa7943dc30ca48d0657a5c8b2d49e81360905836f2d19e741874b7531ec25b36e082ca10dd2e8405521f86724373ce3988e18722ebd5d4ebc8623321ab3d25fa9513ba9f732bf8ebec419afd05eed2982010bee30f0076eaf9b23adb05b88a037279f4b8c90d0912599546ec1ed8af0d8b95ea37a5d31db9dc876e2739f077186c2d4e5615e37e2fb01099e9d2c3c9c142b50441e51151e6b0d0c082a5a1849621467225a8ee9caf0c2c7758cc09b0c09b7c65b3feca626e5efc0c56314df9b80a1b71d8d0f49c3b08e73587297e0f1ea797b809be38b31bf03af91cdad0918c3ecbd2fa4b6694412c7d58d134b1cc1fac73a72a95561d1383c43ce15a47fa29699387e6e6b4a806c62d5b25b087ffe87af353c29fd3c873bd215133287f3208944e54fd1cd9d62495d0490c3cf4e1b379b58dd4bfd006b772a1de24fdc0e8271b5b32ba05c432982b7a33c1fd580b008cc704ffd8d519bc4a864736e78fc45234ee965a643204f25d4a007f9d8ea47534f62f8ba9d30ce89022d848f5e35a1efee0bda6dbe26d8818486348f3d9eb23da94ccc365907e20ab46bfea3fc0fe5284e7b7ddeda247329e391fd26b63ea732858678ed113ef4875db198c531af8711192050cd76078e5b21968d4df8811c21f885ff6526d2d433e43f6d76e8fe7730f6faadd316e75969e89b2509d7412965b23407b9236e4b575fbd31ad185a1708dbea0e6bfffa7a28d9411d3706ea269b76bcc8ae16f626a4b2db2cf1d96064aa934db92437e290884823ab49debcd6af81947f1ec5af577fb31e943baace05500cd9fe1ec7e05d44eec29fb7927b886800c8a0365cf4d81397bd1ea5c3e34f589c0a345ca11a57f26a7016470dfa334e29d15892bf2b61d6714ad2f41e8c585080f170cba2de86f0816a52bbcc41ce3008613998cb0ce35fa5b7a0e7619c4704795243fff6e7c6a624643b5c912692e6343dab6ee648d30e4d904258af5775cfd2d11308bda2638ddbcb7385502188416fbc9aaeff51a457d1030a2c556a07dff5dde75e9c08ced63d83dc9ab38512a3803a18fee834526676f1c6802220a33dccd48f95a3ed5e0d1fd549f2482464cfce3629fa1226e069e99ea53217a26bc752934ad8f7d9a6b5180a4dc4d2cb4bdd2613e89caf69a19438d9f05852f77fc26db138358809c11e544132df586bc9cc8b7e83537f98189987bdd74437341222a17f360c81dd613ae84a192725c16bfe8ed8333298295629077da39d3a2d83773478a326302275bfda020da1423ac4f4a85e3c6ecb0d56b00d64b92eca4fb383e3330296dbf48f9a02e1d6756712a41375c850d15091ac6e0a97d2b359d64ae0d099e3ef8e356ea8ae558a1a43f7abc431cb8bb1388c2b66ba605ad1bbf211764c492a58d5d7d329dd069248cb08a7b12cc21440667e1383413b27d9a998ae611efe19f3225c5d36f773187dbec95329c444c2a0d49775bbbfb89a7aa2d0367def1f049f02a181010076ec9db433c3634d52f970abcb0d8bf4868136c249fb41d7d3e7fe8408d28a2f5ee2c7997b5c32f6746b5ba4d36121dc86ee4a3a7074a5b79aea824efac0f1dba5f5de2e5dcf89de692d4c02a8821316153bf288896cff4c47fd6a1428b29e4db3c6825a10dd050cb39768d588a129dd6e3db86f488bd0cda67c044e28524572ad1b4baa52b7b44c846a5e8ab307275821869959b66a411eaa25f2eba88317df21dfdfad8c2573b2282ca31af00cdff28149a9a69b472bb5a2962e90be7dadd10c1c271389221ad886e2f565b83678e17dedf4e4120c200470c10a282d2537e77d98b8ff3b7fe29fc96c003cf56aabc639ccc7d5349825fad74d804237245087323eeb9c2a12a63a8acd03f1a7f853040ba34107bc13b84034b1957979a14b0fd12134bbd5ed7b7bf0d1d033d76f487cf6de04e83db82807850a0e4902e080f62578376f9e3f42dce095fda82e63aa9080d80c809925221d28412526a95d9a1e64da0ebdd366921235e3add3b6bcea773d0b1979dad24ab744e91f7197a7f56a0f4e96243914164f50fafc9c67c2d9024af15280bc7558338290eb3bebeef0717149ab5bc5b5f81a51dcbd1b42d28b9483bf190d310459eb554f5cc590afe6e100228ce36a90f089f210613be66e8a118a3be776c60c064dda1cbde9f5523959b8f35406892682e95541129cd59c30ceb931f18e4a1b4f7c82b8fa35ab9e190051540fbe80f8c9f08689850c6e9edfb1e104f9ddaea15fef65e3a2dac4d1d65997536e49af6d407a547517138cfce38636aacacd6a370b7995e4f32c910d66bc94739dcd3b667c6dc925dea5bebea03891a01a08a51c2f62e080979e2a2f64217c1e8c4043fd73741699edf1343552219f9a9c58b8143d65fa3468b6a641ec485a04a594d50cc9bf22a08df2d2b8837c595a880698decbb03ad348f65d589d7ff82820b0504654c261cf9394bdff0406ac63d135c8c4023f17bbf1e6cde01f3e5b051a2aeb37100d82bd24e567b98d551fb892d46e3b5e9706f65f8a8d2be1382dd6e5392d7b598ab739a770f11cab5be0524d0b70cb442c0f472dbb20ec7b52ad99df7db4bdce78a826d3ea428b909a49fafbab06acae6c87b519448a1b70ecce08178200c879e5d15a485b113db253468b388156d071b03c5f9d4439c4e4601eefaa064c4cd6d5e69520e9973cd4a0895c49d166606154bb496816ca0f45d2777c3d441b4b56b92fe3723e977d3470c4bd264854fb3da825ab1366927f442442d356724534902e36ca674025eebde2275fece24dfe134ec930e990d353aea9f490ca2746dbbaac45377c775a07e81e5705a8bad672637d0487f53df1581d69e0bb20a59b5ad73723c58fa7a3b8585c4a747ff4fd35ee55f7a22fbb8c5d239da3b5dccbe9848aaf910293c64c672e2b2a8056a1af86aedb1ba374925ee18d1ca48cae12c169e59508cd636f8dac81ff11c7a711820da923c705ec639a286d91bdd5dd653cf636a07de8f1ffb2142dfa27b57ede8f061654028f443eae4b976a479b92c2a7d8b9c7f24efb73e069939e92107ef4229cc9598ee1cbcb87b13d25f4981bc9ca3051e8dd4056d6b5a9c127d6705aebe57a3bbc9dd2be360f6dd7ccc43307d5b69476921d3dbf9f6376067bce0da1c0aa50ae25122af7f84d8cab5256c52d2748ca6cdc74a8d6a84e738c3f490e997043753d9a2ddcd5a7a7be28653ce445ebb749e77916f1782a724479bc037d13d9bad9c0d26b8c7b35e99001b261ef095501c6f511f5859401730fd97cf72cbc74aab535c482daf9f01feae627534a30a6e7034910aaaf37329263e73a8076c176d7c3a9fd51fab33050adebdc052bf29248921b2ce1ecea531c277e8c494faa4ba19a8e3d97dc737e2b944d5ad10cefac59e891cd8da9ff365b59a678bc94a7028dec05c90e1f091b5f5cbc4138718e32b2f015718062cc0d57184c871fef442176789cd89df685e0f225968f30eef25ab35f600d17e62ed074c1c11e57fcb45da52845b2f1bb81f86448d7256a7913ed0d812695bb33148f35212c34aea0969388a91e2726ddbea0b7944603bc8653b4bc9a2f6d7e9f1b6d25db2fed22622c9ae7f5f10d2529580ba9b768bc905aef580e4a07f79cd3cca124a77328124ed156541415be42df15685422b8cd0dc153024f64617bfcff5253f708083e2cfb0506194b804d97a0ec298aafccc7f5a11b5dd1aefbccc2e0a257e9a80a35518420efc837e812ce10a776b040c42242261b93d02b49203f2aa3c0e65abf77db28ae9e3307c3ad71023c5e17e8754a046aa7696c73810e96718f97c8e05bcd09df83103f5b14dd776cc56636c4aa095cfd558018ac1919c18ef638f52020bd44afcc8161c9b3629c5c24dc1b0b2c08baeabf5c365fef3700ec2e6262f7e66935e86e358ad6dab47686ff9c40724720cdc96a61c3d991fc687cb4734a78bb1d731671392ef856cd403cd62adafca7f3202a38e22e5d870f4ae4c9bc81af3337c9311b99a9bd701a2294cb192dcff9c9ee3f761920c0f18a67188864dbe16202dca63297788cfe8f57d2a6f911206d442272e7bd5000c5973f10cb5f6e046cd045097ad636918066593e168be7ea5b6b245ad921b6bd49de9763111b8689bcbc4efe9ac54805f0ccfb381ac3aacd8112c20bce96a17c186e5ca835cec2ff23f5c1c6e17e2c1570d30849a2df44b3bd60f9fb72cca35b88f5c962c0e28eb451f3590748f61ba6e9b0f6340d21cc427af1ca335b2569f397410b9c927f35c283e99d61ed4d483b28fd570a088ebe1e391edbc31a20269f485b16429356b48cf9671012ebe0d95fb22ef2ed5ca698e008eb0b657125998f056db36e0c4aec9b1afff0d587dd0b730f78caccdd2d0458d49db0dd1f281acf522c4d3623003b5904a86a84d2fec33fe8186725b83ff822e41e88305aee31a8f97d2e723fcbd5410d90a64f0cceb2410eeac0971b7416d6c1fd2a346189213e881d3925df3a325a126dbaf6b02d36cb7c8bbdadcb663e3e57c97ea201ea29aa80edcb4d8c12ccb20bae0ec712e8e122c9b00f48d2c07d8ec71996dc23b22d27e233b4aaa18b874fe80fe519ea3b038b6d560571d9702352d6931a749a192264c629db9af4f37c8bb9551979d28e2d2da0084447faa968ab0c885444ca59c0ca49be6fe6a1d06f1aec42fd5ed45a7c3a7cc0c8dca8c91a5f9656646592038df27973bde92551c6b89e4c9ad7e7d2ef4cf1a2cad84a285618a4d4e9af32be3dfaab1065f92f3f25eac20a861e13aafff584c9b24cd26373827ad272d4e695d8553b51941b9803b8b33f5735fa6988e688753ab9059d19c87c342ebbde323a2c3a5058cf8a549c24490e8a2f45ce0b479158aab1053f0c0a2c2401ac3010d1ee2855e3a34512a647a040336fb03a7a772839d8bf72469d323af62e20f58562e8a6b909c0daa840c4ea5f0c2211b25944ae8e3b71ca368876e2ba0d69bf3aa1f84d6905b9178c5ffadf0e2592b53ae21f1330c162f65d9ec0fd9e7b61e80f740a459cfcb17916bda98ba1cd4e35c2f76f319d520812c5e6832d7be53d702a77b5042f462288bf367e6b52f05dad5caeaa77a36fa7ca0bf29341aa6980f6fd51c6878efd3f5c577fead9014136d6fd7afa66f8021a6e87ed5e5e089dcda13f394948509a0b46a287f06ce98ae45db4bff58a842e3ff0c231e4c09f4abda6200317ecf628a8c65089b5e37c240443bc3dae3cb31b25acb858f5f9e7be674e6ee9da99bda5e1d4067a660fd58e857f2fd410d740bc095c850ac82cbec963c99e6b2271a5684bfe3e1bde40cb9d7d2cc438a4f6917aa0db4fbe1785e78a41849bd398cdcbc860510569e3895075041aed716c75d827b3847eca9d51a98dc7949f648d9f00fc0fee092951ccacad4374d0f196d4f5ac458339944b70a537aa71e8f01f516551fdaa9d4c356c3c60ff28ab2e03235b35b7fbf8e28954ff6d65f7c67f1271a17f099cbd877d4d97c3e253842a7e668fd2453a06c02bf76256860130be44442567e8bc3ef6084ba006fca1fbbc74c6081877b410bde687c34ef0776142b26ffd4117654289ea830d3a22a4790f50098fc000f2eea6a15ab866d43601fa375a4c181454ecde43b7036edd7af86dde5f6270f2b33879fde0e147636c1507294b28d4d8a25f3ebe0883f3c3cd5285f398ab5f6ee8180798136f867caf67f072f54f6004f5777308251016d00f8fe265f0787dce9f5e0f95078afda514ebdb99c2597b6dc52bc66bde84193d020e178cc678bf6f558c3b6348facca2c9d7b9974fddb586edc4fe7eab7dc7495dcb2c9eae8dd71b3332132ff07aa51f3ac9a47b6d29144d445bf2c2987992229fdae59343330375673b7e851cc9f9acf2c78f6f1b62414b5bf7af4cccc5b08c49f89ff0e1962e79ada3c2248330de772719b1c1a40c2ba136ea8e29397720fb4d250cb956dfa50b2257d6cb94ec8e301ff63f96de06ce1c5872d880a39cee3dd1b0fb612f5c67869c424a3c4c54d00f1db442b62ff96eb6943a29e6e76bc6a5172b0b92ad7968c59bd344fe5e53419ae3d06a71eac15325be72cdea153773c939ec162c2510750cbc4e6c6df0e378653ef86a7c23965952d41ac41e6b96107cd5e9fbb3d97f62d8f3d0f4f229a7e8e3dc6d3088322fc4bdad716b7c2ee578f967017bb029c97e91d6acdb846635be4ce53164f96976ed28219c169c80657ec00cab36195494dd99cb0ff8446b254126c1036885933f42f27f918c4b31c90d6d7ce35d6465c7a8c585ef4320f1046f22743917f0553393d817fad82f60e3300622551cd51cd9c427991874e229a6dd18c1cd387e5ad5e842c9a9d5246258cfe1b54974a526b14c0923189dcfe2fa22ef6d90f53f87974524c5934a95dd5351720bd92809be487022c75220b0a9355c3d075ade7a90ef91cd0724bec70c9875e613f3207401aac14613641428a37b0ca9ca332470793e25caf89a9124705ec1f35eacd7c9df94880c8a4e18a500b2f97c92dc1247dcad570537318ffc761d6bb6366261c834929dadd6b50a7eebb5622761577470ff89ce73084ab500947c06cddcc7965571e7448d8630321e267d0b93abe844f873cf02a3c5927ad7c985634334d9902efe53af987ebaf4d546fe6cd644367bad421b4d9589836eee9db94dcdeea0d7c57d2c4fc70b2b29c9a906036ad0c6d189fe312608828cda0c5bbbc87cf3a7607bb25e4b507e482ef1ed5c04c1a945b98f0867fda700d264699493866be80d80d7d5b511f2c788b7cec6bcca788bbc9acc16e9e9a70d557b5928ca30a9631414345936fab424def053b49ac895dc528aff7bd0c61ab9ece4b7c492b9dd5ac69554cde0c5c10c43d7de79416ddea7a16207c34d4a1d47b434ff10c65811a79d6fc0c14473f3d87b30ed4fb7b74f86a1d34b8988b75b1fa39f1fb65e7e9b147784998175958bc275b7a5e40ce145c64644baebcb3919a84b4f9db437fae07ca79c1d77d6a7f573b984a37eb1693fb16561c35ec2115d0aea3723babef7d3d8c0e6a477c0ac24426407d4245b0532fe529a413c6b55706321c8a92e28c6101506e0251edbcbf2177bd046329de289805b2c", 0x2000, &(0x7f000000adc0)={&(0x7f0000000080)={0x50, 0x0, 0x8000000000000001, {0x7, 0x24, 0x80000000, 0x10008, 0x7fff, 0x2, 0x5, 0xfffff61f}}, &(0x7f0000000100)={0x18}, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x5, {0x8}}, &(0x7f0000000180)={0x18, 0x0, 0x1cb, {0x5}}, &(0x7f0000002200)={0x18, 0x0, 0x4, {0x400}}, &(0x7f0000002240)={0x28, 0x0, 0x6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, &(0x7f0000002280)={0x60, 0x0, 0x2, {{0xfff, 0x9, 0x4, 0x0, 0x2, 0x101, 0x1000, 0x9}}}, &(0x7f0000002300)={0x18, 0x0, 0x80000001, {0x1}}, &(0x7f0000002340)={0x1a, 0x0, 0x1ce94af, {'/dev/fuse\x00'}}, &(0x7f0000002380)={0x20, 0x0, 0x8, {0x0, 0x4}}, &(0x7f0000002480)={0x78, 0xb218e69c28fc4498, 0x19a, {0x1f, 0x6, 0x0, {0x1, 0x2, 0xffff, 0x3, 0x2, 0x80000001, 0xb24, 0xff, 0x3ddd, 0x2000, 0x2, r1, 0xee00, 0x9, 0xfffeffff}}}, &(0x7f0000002500)={0x90, 0x0, 0x0, {0x0, 0x2, 0x3, 0x9, 0x7ff, 0x7, {0x1, 0x7, 0x9, 0x1, 0xffffffff00000000, 0x2, 0x3, 0x2, 0x4, 0x0, 0x40, 0x0, r2, 0xddfb, 0x8}}}, &(0x7f00000025c0)={0x130, 0x0, 0xffff, [{0x5, 0x82, 0xa, 0x7, '/dev/fuse\x00'}, {0x0, 0x3, 0xa, 0x5, '/dev/fuse\x00'}, {0x6, 0x1, 0xa, 0xc1f4, '/dev/fuse\x00'}, {0x4, 0x3, 0x1, 0x200, '}'}, {0x2, 0x7, 0xa, 0x0, '/dev/fuse\x00'}, {0x1, 0x9, 0xa, 0x0, '/dev/fuse\x00'}, {0x2, 0x2, 0x0, 0xffff}, {0x4, 0x101, 0x1, 0x1, '.'}]}, &(0x7f00000087c0)={0x498, 0x0, 0x9, [{{0x2, 0x2, 0x5, 0x7, 0x1, 0x7fe, {0x3, 0x9, 0x8, 0x3f, 0x5, 0xa3e, 0xd4, 0x2, 0x3, 0x8000, 0x1, 0xee01, r3, 0x1fb6cfc7, 0x7}}, {0x3, 0x8, 0xa, 0x101, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x1000, 0x5, 0x55, 0x91, {0x1, 0x101, 0x8, 0x5, 0x8, 0x123c000000000000, 0x2, 0x20, 0x7, 0x8000, 0x2da, r4, 0x0, 0x10001, 0x4}}, {0x0, 0x2, 0xa, 0x400, '/dev/fuse\x00'}}, {{0x0, 0x3, 0x2, 0x0, 0x80000000, 0x1, {0x5, 0x3bd, 0x80000001, 0x36, 0x0, 0x3, 0x100, 0x800, 0x8, 0x1000, 0x5, 0xee01, 0x0, 0xffff07be, 0x7}}, {0x0, 0xffffffffffff7fff, 0xa, 0x4, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x2, 0x8, 0x3, 0x10000, {0x5, 0xa719, 0x8, 0xfffffffffffffffa, 0x80000000, 0x1ff, 0x9, 0x1, 0x2, 0x4000, 0x7, 0xffffffffffffffff, 0xffffffffffffffff, 0x800, 0xfffffffb}}, {0x3, 0xffff, 0x5, 0x53a, ')\xc4@!%'}}, {{0x2, 0x3, 0x3dd, 0x6, 0x1f, 0x3, {0x1, 0x6, 0x101, 0x8da2, 0x8, 0x3, 0x3, 0x5, 0x0, 0x6000, 0x1ff, 0xffffffffffffffff, 0x0, 0x1f, 0xff}}, {0x5, 0xfffffffffffffffb, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x2, 0x3, 0x4, 0x3, 0x4, {0x0, 0x9dc, 0x3, 0x5, 0xfffffffffffffffc, 0xff, 0x4, 0x8, 0x252, 0x4000, 0xbd, r5, 0xee00, 0x800, 0x1}}, {0x5, 0x100000001, 0xa, 0xff, '/dev/fuse\x00'}}, {{0x0, 0x0, 0x3, 0x1b8c, 0xfffffe00, 0x9, {0x5, 0x6d, 0x2, 0x0, 0xffffffffffffffff, 0x5, 0x7fff, 0x10000, 0xd637, 0x8000, 0x1f, 0xffffffffffffffff, 0x0, 0x141, 0x2d}}, {0x6, 0x0, 0x7, 0x2, '+:&!$.!'}}]}, &(0x7f000000acc0)={0xa0, 0x0, 0x0, {{0x1, 0x3, 0x4, 0x9, 0x2f5680e2, 0x773, {0x3, 0x2, 0x3, 0x2, 0x7fff, 0x200000, 0x1, 0x8000, 0x7, 0x4000, 0xfffffffb, r6, 0x0, 0x5de, 0xa78}}}}, &(0x7f000000ad80)={0x20, 0x0, 0x7, {0xff, 0x0, 0x8, 0x558b}}}) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0xef4}}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) getresuid(&(0x7f00000023c0), &(0x7f0000002400), &(0x7f0000002440)) (async) getegid() (async) read$FUSE(r0, &(0x7f0000002700)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000004740)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000006780)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000008c80)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r9, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r9, &(0x7f0000002080)={0x60, 0x0, r10}, 0x60) (async) write$FUSE_POLL(r7, &(0x7f000000ae40)={0x18, 0x0, r10, {0x9}}, 0x18) (async) syz_fuse_handle_req(r0, &(0x7f0000000200)="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", 0x2000, &(0x7f000000adc0)={&(0x7f0000000080)={0x50, 0x0, 0x8000000000000001, {0x7, 0x24, 0x80000000, 0x10008, 0x7fff, 0x2, 0x5, 0xfffff61f}}, &(0x7f0000000100)={0x18}, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x5, {0x8}}, &(0x7f0000000180)={0x18, 0x0, 0x1cb, {0x5}}, &(0x7f0000002200)={0x18, 0x0, 0x4, {0x400}}, &(0x7f0000002240)={0x28, 0x0, 0x6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, &(0x7f0000002280)={0x60, 0x0, 0x2, {{0xfff, 0x9, 0x4, 0x0, 0x2, 0x101, 0x1000, 0x9}}}, &(0x7f0000002300)={0x18, 0x0, 0x80000001, {0x1}}, &(0x7f0000002340)={0x1a, 0x0, 0x1ce94af, {'/dev/fuse\x00'}}, &(0x7f0000002380)={0x20, 0x0, 0x8, {0x0, 0x4}}, &(0x7f0000002480)={0x78, 0xb218e69c28fc4498, 0x19a, {0x1f, 0x6, 0x0, {0x1, 0x2, 0xffff, 0x3, 0x2, 0x80000001, 0xb24, 0xff, 0x3ddd, 0x2000, 0x2, r1, 0xee00, 0x9, 0xfffeffff}}}, &(0x7f0000002500)={0x90, 0x0, 0x0, {0x0, 0x2, 0x3, 0x9, 0x7ff, 0x7, {0x1, 0x7, 0x9, 0x1, 0xffffffff00000000, 0x2, 0x3, 0x2, 0x4, 0x0, 0x40, 0x0, r2, 0xddfb, 0x8}}}, &(0x7f00000025c0)={0x130, 0x0, 0xffff, [{0x5, 0x82, 0xa, 0x7, '/dev/fuse\x00'}, {0x0, 0x3, 0xa, 0x5, '/dev/fuse\x00'}, {0x6, 0x1, 0xa, 0xc1f4, '/dev/fuse\x00'}, {0x4, 0x3, 0x1, 0x200, '}'}, {0x2, 0x7, 0xa, 0x0, '/dev/fuse\x00'}, {0x1, 0x9, 0xa, 0x0, '/dev/fuse\x00'}, {0x2, 0x2, 0x0, 0xffff}, {0x4, 0x101, 0x1, 0x1, '.'}]}, &(0x7f00000087c0)={0x498, 0x0, 0x9, [{{0x2, 0x2, 0x5, 0x7, 0x1, 0x7fe, {0x3, 0x9, 0x8, 0x3f, 0x5, 0xa3e, 0xd4, 0x2, 0x3, 0x8000, 0x1, 0xee01, r3, 0x1fb6cfc7, 0x7}}, {0x3, 0x8, 0xa, 0x101, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x1000, 0x5, 0x55, 0x91, {0x1, 0x101, 0x8, 0x5, 0x8, 0x123c000000000000, 0x2, 0x20, 0x7, 0x8000, 0x2da, r4, 0x0, 0x10001, 0x4}}, {0x0, 0x2, 0xa, 0x400, '/dev/fuse\x00'}}, {{0x0, 0x3, 0x2, 0x0, 0x80000000, 0x1, {0x5, 0x3bd, 0x80000001, 0x36, 0x0, 0x3, 0x100, 0x800, 0x8, 0x1000, 0x5, 0xee01, 0x0, 0xffff07be, 0x7}}, {0x0, 0xffffffffffff7fff, 0xa, 0x4, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x2, 0x8, 0x3, 0x10000, {0x5, 0xa719, 0x8, 0xfffffffffffffffa, 0x80000000, 0x1ff, 0x9, 0x1, 0x2, 0x4000, 0x7, 0xffffffffffffffff, 0xffffffffffffffff, 0x800, 0xfffffffb}}, {0x3, 0xffff, 0x5, 0x53a, ')\xc4@!%'}}, {{0x2, 0x3, 0x3dd, 0x6, 0x1f, 0x3, {0x1, 0x6, 0x101, 0x8da2, 0x8, 0x3, 0x3, 0x5, 0x0, 0x6000, 0x1ff, 0xffffffffffffffff, 0x0, 0x1f, 0xff}}, {0x5, 0xfffffffffffffffb, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x2, 0x3, 0x4, 0x3, 0x4, {0x0, 0x9dc, 0x3, 0x5, 0xfffffffffffffffc, 0xff, 0x4, 0x8, 0x252, 0x4000, 0xbd, r5, 0xee00, 0x800, 0x1}}, {0x5, 0x100000001, 0xa, 0xff, '/dev/fuse\x00'}}, {{0x0, 0x0, 0x3, 0x1b8c, 0xfffffe00, 0x9, {0x5, 0x6d, 0x2, 0x0, 0xffffffffffffffff, 0x5, 0x7fff, 0x10000, 0xd637, 0x8000, 0x1f, 0xffffffffffffffff, 0x0, 0x141, 0x2d}}, {0x6, 0x0, 0x7, 0x2, '+:&!$.!'}}]}, &(0x7f000000acc0)={0xa0, 0x0, 0x0, {{0x1, 0x3, 0x4, 0x9, 0x2f5680e2, 0x773, {0x3, 0x2, 0x3, 0x2, 0x7fff, 0x200000, 0x1, 0x8000, 0x7, 0x4000, 0xfffffffb, r6, 0x0, 0x5de, 0xa78}}}}, &(0x7f000000ad80)={0x20, 0x0, 0x7, {0xff, 0x0, 0x8, 0x558b}}}) (async) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0xef4}}, 0x18) (async) 08:33:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_STATFS(r2, &(0x7f00000001c0)={0x60, 0x0, 0x0, {{0x1119, 0x80, 0x8000000000000000, 0x10000, 0x2, 0x1, 0xfff, 0xa6}}}, 0x60) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cff"]) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x9, 0xfffffffffffff000}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) write$FUSE_STATFS(r2, &(0x7f00000001c0)={0x60, 0x0, 0x0, {{0x1119, 0x80, 0x8000000000000000, 0x10000, 0x2, 0x1, 0xfff, 0xa6}}}, 0x60) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cff"]) (async) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x1, 0x9, 0xfffffffffffff000}}, 0x28) (async) 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1609.531319] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1609.538572] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1609.545816] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1609.553064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1609.560316] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@subj_type={'subj_type', 0x3d, '\xf6\x05\x00\x00\x00\x00\x00\x00\x00\b\xf0\x82\a\x8d\xcf\xf3\xe6\xb1'}}, {@fsname={'fsname', 0x3d, 'e'}}]}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, 'fd'}}, {@fsname={'fsname', 0x3d, '(I},v]'}}, {@smackfshat={'smackfshat', 0x3d, '--'}}, {@seclabel}, {@permit_directio}]}}) pipe2$watch_queue(&(0x7f0000000040), 0x80) 08:33:19 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 39) 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, r0) keyctl$get_persistent(0x16, 0xee01, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) keyctl$link(0x8, 0x0, r0) (async) keyctl$get_persistent(0x16, 0xee01, 0xfffffffffffffffc) (async) 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@subj_type={'subj_type', 0x3d, '\xf6\x05\x00\x00\x00\x00\x00\x00\x00\b\xf0\x82\a\x8d\xcf\xf3\xe6\xb1'}}, {@fsname={'fsname', 0x3d, 'e'}}]}}) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, 'fd'}}, {@fsname={'fsname', 0x3d, '(I},v]'}}, {@smackfshat={'smackfshat', 0x3d, '--'}}, {@seclabel}, {@permit_directio}]}}) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) getresuid(&(0x7f00000023c0), &(0x7f0000002400)=0x0, &(0x7f0000002440)) (async) r2 = getegid() read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(r0, &(0x7f0000006780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(r0, &(0x7f0000008c80)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) (async) r9 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r9, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r9, &(0x7f0000002080)={0x60, 0x0, r10}, 0x60) write$FUSE_POLL(r7, &(0x7f000000ae40)={0x18, 0x0, r10, {0x9}}, 0x18) (async) syz_fuse_handle_req(r0, &(0x7f0000000200)="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", 0x2000, &(0x7f000000adc0)={&(0x7f0000000080)={0x50, 0x0, 0x8000000000000001, {0x7, 0x24, 0x80000000, 0x10008, 0x7fff, 0x2, 0x5, 0xfffff61f}}, &(0x7f0000000100)={0x18}, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x5, {0x8}}, &(0x7f0000000180)={0x18, 0x0, 0x1cb, {0x5}}, &(0x7f0000002200)={0x18, 0x0, 0x4, {0x400}}, &(0x7f0000002240)={0x28, 0x0, 0x6, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, &(0x7f0000002280)={0x60, 0x0, 0x2, {{0xfff, 0x9, 0x4, 0x0, 0x2, 0x101, 0x1000, 0x9}}}, &(0x7f0000002300)={0x18, 0x0, 0x80000001, {0x1}}, &(0x7f0000002340)={0x1a, 0x0, 0x1ce94af, {'/dev/fuse\x00'}}, &(0x7f0000002380)={0x20, 0x0, 0x8, {0x0, 0x4}}, &(0x7f0000002480)={0x78, 0xb218e69c28fc4498, 0x19a, {0x1f, 0x6, 0x0, {0x1, 0x2, 0xffff, 0x3, 0x2, 0x80000001, 0xb24, 0xff, 0x3ddd, 0x2000, 0x2, r1, 0xee00, 0x9, 0xfffeffff}}}, &(0x7f0000002500)={0x90, 0x0, 0x0, {0x0, 0x2, 0x3, 0x9, 0x7ff, 0x7, {0x1, 0x7, 0x9, 0x1, 0xffffffff00000000, 0x2, 0x3, 0x2, 0x4, 0x0, 0x40, 0x0, r2, 0xddfb, 0x8}}}, &(0x7f00000025c0)={0x130, 0x0, 0xffff, [{0x5, 0x82, 0xa, 0x7, '/dev/fuse\x00'}, {0x0, 0x3, 0xa, 0x5, '/dev/fuse\x00'}, {0x6, 0x1, 0xa, 0xc1f4, '/dev/fuse\x00'}, {0x4, 0x3, 0x1, 0x200, '}'}, {0x2, 0x7, 0xa, 0x0, '/dev/fuse\x00'}, {0x1, 0x9, 0xa, 0x0, '/dev/fuse\x00'}, {0x2, 0x2, 0x0, 0xffff}, {0x4, 0x101, 0x1, 0x1, '.'}]}, &(0x7f00000087c0)={0x498, 0x0, 0x9, [{{0x2, 0x2, 0x5, 0x7, 0x1, 0x7fe, {0x3, 0x9, 0x8, 0x3f, 0x5, 0xa3e, 0xd4, 0x2, 0x3, 0x8000, 0x1, 0xee01, r3, 0x1fb6cfc7, 0x7}}, {0x3, 0x8, 0xa, 0x101, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x1000, 0x5, 0x55, 0x91, {0x1, 0x101, 0x8, 0x5, 0x8, 0x123c000000000000, 0x2, 0x20, 0x7, 0x8000, 0x2da, r4, 0x0, 0x10001, 0x4}}, {0x0, 0x2, 0xa, 0x400, '/dev/fuse\x00'}}, {{0x0, 0x3, 0x2, 0x0, 0x80000000, 0x1, {0x5, 0x3bd, 0x80000001, 0x36, 0x0, 0x3, 0x100, 0x800, 0x8, 0x1000, 0x5, 0xee01, 0x0, 0xffff07be, 0x7}}, {0x0, 0xffffffffffff7fff, 0xa, 0x4, '/dev/fuse\x00'}}, {{0x1, 0x2, 0x2, 0x8, 0x3, 0x10000, {0x5, 0xa719, 0x8, 0xfffffffffffffffa, 0x80000000, 0x1ff, 0x9, 0x1, 0x2, 0x4000, 0x7, 0xffffffffffffffff, 0xffffffffffffffff, 0x800, 0xfffffffb}}, {0x3, 0xffff, 0x5, 0x53a, ')\xc4@!%'}}, {{0x2, 0x3, 0x3dd, 0x6, 0x1f, 0x3, {0x1, 0x6, 0x101, 0x8da2, 0x8, 0x3, 0x3, 0x5, 0x0, 0x6000, 0x1ff, 0xffffffffffffffff, 0x0, 0x1f, 0xff}}, {0x5, 0xfffffffffffffffb, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x2, 0x3, 0x4, 0x3, 0x4, {0x0, 0x9dc, 0x3, 0x5, 0xfffffffffffffffc, 0xff, 0x4, 0x8, 0x252, 0x4000, 0xbd, r5, 0xee00, 0x800, 0x1}}, {0x5, 0x100000001, 0xa, 0xff, '/dev/fuse\x00'}}, {{0x0, 0x0, 0x3, 0x1b8c, 0xfffffe00, 0x9, {0x5, 0x6d, 0x2, 0x0, 0xffffffffffffffff, 0x5, 0x7fff, 0x10000, 0xd637, 0x8000, 0x1f, 0xffffffffffffffff, 0x0, 0x141, 0x2d}}, {0x6, 0x0, 0x7, 0x2, '+:&!$.!'}}]}, &(0x7f000000acc0)={0xa0, 0x0, 0x0, {{0x1, 0x3, 0x4, 0x9, 0x2f5680e2, 0x773, {0x3, 0x2, 0x3, 0x2, 0x7fff, 0x200000, 0x1, 0x8000, 0x7, 0x4000, 0xfffffffb, r6, 0x0, 0x5de, 0xa78}}}}, &(0x7f000000ad80)={0x20, 0x0, 0x7, {0xff, 0x0, 0x8, 0x558b}}}) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0xef4}}, 0x18) [ 1609.644436] FAULT_INJECTION: forcing a failure. [ 1609.644436] name failslab, interval 1, probability 0, space 0, times 0 [ 1609.681222] CPU: 0 PID: 11116 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 08:33:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x3f, 0x113}}, 0x30) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='#d=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2010"]) [ 1609.689130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1609.698475] Call Trace: [ 1609.701059] dump_stack+0x1b2/0x281 [ 1609.704683] should_fail.cold+0x10a/0x149 [ 1609.708830] should_failslab+0xd6/0x130 [ 1609.712803] kmem_cache_alloc+0x28e/0x3c0 [ 1609.716952] __kernfs_new_node+0x6f/0x470 [ 1609.721103] kernfs_new_node+0x7b/0xe0 [ 1609.724991] __kernfs_create_file+0x3d/0x320 [ 1609.729399] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1609.734068] internal_create_group+0x22b/0x710 [ 1609.738649] sysfs_create_groups+0x92/0x130 08:33:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x3f, 0x113}}, 0x30) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='#d=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2010"]) 08:33:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0x3f, 0x113}}, 0x30) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='#d=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2010"]) 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x100}}, 0x30) [ 1609.742965] device_add+0x7e5/0x15c0 [ 1609.746678] ? kfree_const+0x33/0x40 [ 1609.750390] ? device_is_dependent+0x2a0/0x2a0 [ 1609.754965] ? kfree+0x1f0/0x250 [ 1609.758334] device_create_groups_vargs+0x1dc/0x250 [ 1609.763347] device_create_vargs+0x3a/0x50 [ 1609.767577] bdi_register_va.part.0+0x35/0x650 [ 1609.772153] bdi_register_va+0x63/0x80 [ 1609.776035] super_setup_bdi_name+0x123/0x220 [ 1609.780527] ? kill_block_super+0xe0/0xe0 [ 1609.784668] ? do_raw_spin_unlock+0x164/0x220 [ 1609.789165] fuse_fill_super+0x937/0x15c0 08:33:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'wg0\x00', {0x2, 0x4e23, @broadcast}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x8, 0xfffffffa}}, 0x30) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757365725f6964ae3d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES32=r3]) 08:33:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'wg0\x00', {0x2, 0x4e23, @broadcast}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x8, 0xfffffffa}}, 0x30) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757365725f6964ae3d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES32=r3]) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'wg0\x00', {0x2, 0x4e23, @broadcast}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x8, 0xfffffffa}}, 0x30) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757365725f6964ae3d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES32=r3]) (async) [ 1609.793312] ? fuse_get_root_inode+0xc0/0xc0 [ 1609.797717] ? up_write+0x17/0x60 [ 1609.801159] ? register_shrinker+0x15f/0x220 [ 1609.805562] ? sget_userns+0x768/0xc10 [ 1609.809450] ? get_anon_bdev+0x1c0/0x1c0 [ 1609.813503] ? sget+0xd9/0x110 [ 1609.816691] ? fuse_get_root_inode+0xc0/0xc0 [ 1609.821093] mount_nodev+0x4c/0xf0 [ 1609.824631] mount_fs+0x92/0x2a0 [ 1609.827994] vfs_kern_mount.part.0+0x5b/0x470 [ 1609.832484] do_mount+0xe65/0x2a30 [ 1609.836019] ? __do_page_fault+0x159/0xad0 [ 1609.840244] ? retint_kernel+0x2d/0x2d 08:33:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}, {@uid_eq={'uid', 0x3d, r1}}, {@subj_type={'subj_type', 0x3d, '\xf6\x05\x00\x00\x00\x00\x00\x00\x00\b\xf0\x82\a\x8d\xcf\xf3\xe6\xb1'}}, {@fsname={'fsname', 0x3d, 'e'}}]}}) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x4000, &(0x7f00000002c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, 'fd'}}, {@fsname={'fsname', 0x3d, '(I},v]'}}, {@smackfshat={'smackfshat', 0x3d, '--'}}, {@seclabel}, {@permit_directio}]}}) pipe2$watch_queue(&(0x7f0000000040), 0x80) [ 1609.844132] ? copy_mount_string+0x40/0x40 [ 1609.848364] ? memset+0x20/0x40 [ 1609.851637] ? copy_mount_options+0x1fa/0x2f0 [ 1609.856135] ? copy_mnt_ns+0xa30/0xa30 [ 1609.860024] SyS_mount+0xa8/0x120 [ 1609.863471] ? copy_mnt_ns+0xa30/0xa30 [ 1609.867348] do_syscall_64+0x1d5/0x640 [ 1609.871234] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1609.876411] RIP: 0033:0x7f2196c8261a [ 1609.880119] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1609.887820] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a 08:33:19 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 40) 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x100}}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x100}}, 0x30) (async) 08:33:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x9, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) read$FUSE(r1, &(0x7f00000004c0)={0x2020}, 0x2020) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) read$FUSE(r1, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f0000004540)={0xf8, 0x0, r5, [{0x5, 0x0, 0x2, 0x1, 'fd'}, {0x6, 0x0, 0x3, 0x6, '}]^'}, {0x6, 0x7, 0x4, 0x0, '/#^\''}, {0x0, 0x7, 0xa, 0x80000001, '/dev/fuse\x00'}, {0x6, 0x5, 0x5, 0x1, 'fuse\x00'}, {0x0, 0xff, 0x2, 0x3d82, 'fd'}, {0x1, 0x7, 0x8, 0x8, 'group_id'}]}, 0xf8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 08:33:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'wg0\x00', {0x2, 0x4e23, @broadcast}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x8, 0xfffffffa}}, 0x30) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757365725f6964ae3d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES32=r3]) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'wg0\x00', {0x2, 0x4e23, @broadcast}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x8, 0xfffffffa}}, 0x30) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757365725f6964ae3d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES32=r3]) (async) 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r1, r0) 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1609.895080] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1609.902343] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1609.909600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1609.916856] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r1, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) keyctl$get_persistent(0x16, r1, r0) (async) 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x100}}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x3, 0x100}}, 0x30) (async) [ 1609.985753] FAULT_INJECTION: forcing a failure. [ 1609.985753] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.019892] CPU: 1 PID: 11202 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1610.027795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1610.037146] Call Trace: [ 1610.039731] dump_stack+0x1b2/0x281 [ 1610.043363] should_fail.cold+0x10a/0x149 [ 1610.047515] should_failslab+0xd6/0x130 [ 1610.051498] kmem_cache_alloc+0x28e/0x3c0 [ 1610.055656] __kernfs_new_node+0x6f/0x470 [ 1610.059811] kernfs_create_dir_ns+0x8c/0x200 [ 1610.064217] internal_create_group+0xe9/0x710 [ 1610.068712] dpm_sysfs_add+0x21/0x1c0 [ 1610.072512] device_add+0x977/0x15c0 [ 1610.076224] ? device_is_dependent+0x2a0/0x2a0 [ 1610.080802] ? kfree+0x1f0/0x250 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x9, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) read$FUSE(r1, &(0x7f00000004c0)={0x2020}, 0x2020) (async) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) (async) read$FUSE(r1, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f0000004540)={0xf8, 0x0, r5, [{0x5, 0x0, 0x2, 0x1, 'fd'}, {0x6, 0x0, 0x3, 0x6, '}]^'}, {0x6, 0x7, 0x4, 0x0, '/#^\''}, {0x0, 0x7, 0xa, 0x80000001, '/dev/fuse\x00'}, {0x6, 0x5, 0x5, 0x1, 'fuse\x00'}, {0x0, 0xff, 0x2, 0x3d82, 'fd'}, {0x1, 0x7, 0x8, 0x8, 'group_id'}]}, 0xf8) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (rerun: 32) 08:33:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1610.084169] device_create_groups_vargs+0x1dc/0x250 [ 1610.089181] device_create_vargs+0x3a/0x50 [ 1610.093412] bdi_register_va.part.0+0x35/0x650 [ 1610.097991] bdi_register_va+0x63/0x80 [ 1610.101883] super_setup_bdi_name+0x123/0x220 [ 1610.106378] ? kill_block_super+0xe0/0xe0 [ 1610.110533] ? do_raw_spin_unlock+0x164/0x220 [ 1610.115028] fuse_fill_super+0x937/0x15c0 [ 1610.119179] ? fuse_get_root_inode+0xc0/0xc0 [ 1610.123583] ? up_write+0x17/0x60 [ 1610.127032] ? register_shrinker+0x15f/0x220 [ 1610.131439] ? sget_userns+0x768/0xc10 [ 1610.135324] ? get_anon_bdev+0x1c0/0x1c0 [ 1610.139377] ? sget+0xd9/0x110 [ 1610.142563] ? fuse_get_root_inode+0xc0/0xc0 [ 1610.146966] mount_nodev+0x4c/0xf0 [ 1610.155200] mount_fs+0x92/0x2a0 [ 1610.158557] vfs_kern_mount.part.0+0x5b/0x470 [ 1610.163029] do_mount+0xe65/0x2a30 [ 1610.166554] ? __do_page_fault+0x159/0xad0 [ 1610.170765] ? retint_kernel+0x2d/0x2d [ 1610.174633] ? copy_mount_string+0x40/0x40 [ 1610.178846] ? memset+0x20/0x40 [ 1610.182103] ? copy_mount_options+0x1fa/0x2f0 [ 1610.186573] ? copy_mnt_ns+0xa30/0xa30 [ 1610.190434] SyS_mount+0xa8/0x120 [ 1610.193863] ? copy_mnt_ns+0xa30/0xa30 [ 1610.197727] do_syscall_64+0x1d5/0x640 [ 1610.201596] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1610.206771] RIP: 0033:0x7f2196c8261a [ 1610.210461] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1610.218162] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1610.225412] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 08:33:19 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 41) 08:33:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000002140)={0x2a, 0x4, 0x0, {0x2, 0x1ff, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, r2}, 0x20) 08:33:19 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) keyctl$get_persistent(0x16, r1, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0x2020) (async) keyctl$get_persistent(0x16, r1, r0) (async) 08:33:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) [ 1610.232657] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1610.239906] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1610.247151] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x9, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) read$FUSE(r1, &(0x7f00000004c0)={0x2020}, 0x2020) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) read$FUSE(r1, &(0x7f0000002500)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r3, &(0x7f0000004540)={0xf8, 0x0, r5, [{0x5, 0x0, 0x2, 0x1, 'fd'}, {0x6, 0x0, 0x3, 0x6, '}]^'}, {0x6, 0x7, 0x4, 0x0, '/#^\''}, {0x0, 0x7, 0xa, 0x80000001, '/dev/fuse\x00'}, {0x6, 0x5, 0x5, 0x1, 'fuse\x00'}, {0x0, 0xff, 0x2, 0x3d82, 'fd'}, {0x1, 0x7, 0x8, 0x8, 'group_id'}]}, 0xf8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x3, 0x9, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f00000004c0)={0x2020}, 0x2020) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) (async) read$FUSE(r1, &(0x7f0000002500)={0x2020}, 0x2020) (async) write$FUSE_DIRENT(r3, &(0x7f0000004540)={0xf8, 0x0, r5, [{0x5, 0x0, 0x2, 0x1, 'fd'}, {0x6, 0x0, 0x3, 0x6, '}]^'}, {0x6, 0x7, 0x4, 0x0, '/#^\''}, {0x0, 0x7, 0xa, 0x80000001, '/dev/fuse\x00'}, {0x6, 0x5, 0x5, 0x1, 'fuse\x00'}, {0x0, 0xff, 0x2, 0x3d82, 'fd'}, {0x1, 0x7, 0x8, 0x8, 'group_id'}]}, 0xf8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) (async) 08:33:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000002140)={0x2a, 0x4, 0x0, {0x2, 0x1ff, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, r2}, 0x20) 08:33:20 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1610.313167] FAULT_INJECTION: forcing a failure. [ 1610.313167] name failslab, interval 1, probability 0, space 0, times 0 [ 1610.342315] CPU: 1 PID: 11252 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1610.350216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1610.359567] Call Trace: 08:33:20 executing program 3: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x5, 0x4) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x0}, r1) 08:33:20 executing program 3: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x5, 0x4) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x0}, r1) accept$alg(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x5, 0x4) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) keyctl$search(0xa, r2, &(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x0}, r1) (async) [ 1610.362155] dump_stack+0x1b2/0x281 [ 1610.365783] should_fail.cold+0x10a/0x149 [ 1610.369934] should_failslab+0xd6/0x130 [ 1610.373907] kmem_cache_alloc+0x28e/0x3c0 [ 1610.378061] __kernfs_new_node+0x6f/0x470 [ 1610.382212] kernfs_create_dir_ns+0x8c/0x200 [ 1610.386622] internal_create_group+0xe9/0x710 [ 1610.391125] dpm_sysfs_add+0x21/0x1c0 [ 1610.394924] device_add+0x977/0x15c0 [ 1610.398635] ? device_is_dependent+0x2a0/0x2a0 [ 1610.403214] ? kfree+0x1f0/0x250 [ 1610.406584] device_create_groups_vargs+0x1dc/0x250 08:33:20 executing program 3: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000280)=0x5, 0x4) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x0}, r1) 08:33:20 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002ab57000fedbdf25080000000500220000000000050021000000000005001200080000000800090003001f00080009000400000005002100000000002c3c1807bd6c3eee38b1e2b6b40c3ebd8d1a202c49f0f889b813cb540b8c54af3bb18048c2a403d93dd4e9c5a06ea9ccc77091e5ec18e0882775c3112abcb4aa8628440859e69e6851f04504d3057a25cf07af7231d4f47a294a4d64e4283739268e52e3c7ea848cf9794f1bb6c3e97c894d24eda4a52d86f88f0fe3261408916739bc814cb063ddadfe8579e30778a2fa666da56a2d2560ef30e5c08a35aa7a2a9968de6bb8ada47f7c07bfe014c4ea67319c7891f43fb265a4f050381d52368719b38927a30ad6b74420b16f21ad42c11faee65dc4048b80be7c2277"], 0x44}, 0x1, 0x0, 0x0, 0x40084}, 0x801) [ 1610.411597] device_create_vargs+0x3a/0x50 [ 1610.415832] bdi_register_va.part.0+0x35/0x650 [ 1610.420416] bdi_register_va+0x63/0x80 [ 1610.424300] super_setup_bdi_name+0x123/0x220 [ 1610.428791] ? kill_block_super+0xe0/0xe0 [ 1610.432938] ? do_raw_spin_unlock+0x164/0x220 [ 1610.437437] fuse_fill_super+0x937/0x15c0 [ 1610.441583] ? fuse_get_root_inode+0xc0/0xc0 [ 1610.445987] ? up_write+0x17/0x60 [ 1610.449434] ? register_shrinker+0x15f/0x220 [ 1610.453841] ? sget_userns+0x768/0xc10 [ 1610.457772] ? get_anon_bdev+0x1c0/0x1c0 [ 1610.461826] ? sget+0xd9/0x110 [ 1610.465013] ? fuse_get_root_inode+0xc0/0xc0 [ 1610.469421] mount_nodev+0x4c/0xf0 [ 1610.472947] mount_fs+0x92/0x2a0 [ 1610.476291] vfs_kern_mount.part.0+0x5b/0x470 [ 1610.480765] do_mount+0xe65/0x2a30 [ 1610.484288] ? __do_page_fault+0x159/0xad0 [ 1610.488499] ? retint_kernel+0x2d/0x2d [ 1610.492361] ? copy_mount_string+0x40/0x40 [ 1610.496579] ? memset+0x20/0x40 [ 1610.499848] ? copy_mount_options+0x1fa/0x2f0 [ 1610.504329] ? copy_mnt_ns+0xa30/0xa30 [ 1610.508192] SyS_mount+0xa8/0x120 [ 1610.511624] ? copy_mnt_ns+0xa30/0xa30 [ 1610.515489] do_syscall_64+0x1d5/0x640 [ 1610.519355] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1610.524518] RIP: 0033:0x7f2196c8261a [ 1610.528208] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1610.535895] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1610.543139] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1610.550384] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:20 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 42) 08:33:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000002140)={0x2a, 0x4, 0x0, {0x2, 0x1ff, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, r2}, 0x20) 08:33:20 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0x40084}, 0x801) 08:33:20 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1610.557629] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1610.564877] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = getegid() write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}}) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}]}}) 08:33:20 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:33:20 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002ab57000fedbdf25080000000500220000000000050021000000000005001200080000000800090003001f00080009000400000005002100000000002c3c1807bd6c3eee38b1e2b6b40c3ebd8d1a202c49f0f889b813cb540b8c54af3bb18048c2a403d93dd4e9c5a06ea9ccc77091e5ec18e0882775c3112abcb4aa8628440859e69e6851f04504d3057a25cf07af7231d4f47a294a4d64e4283739268e52e3c7ea848cf9794f1bb6c3e97c894d24eda4a52d86f88f0fe3261408916739bc814cb063ddadfe8579e30778a2fa666da56a2d2560ef30e5c08a35aa7a2a9968de6bb8ada47f7c07bfe014c4ea67319c7891f43fb265a4f050381d52368719b38927a30ad6b74420b16f21ad42c11faee65dc4048b80be7c2277"], 0x44}, 0x1, 0x0, 0x0, 0x40084}, 0x801) 08:33:20 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r3, &(0x7f0000002080)={0x60, 0x0, r4}, 0x60) write$FUSE_STATFS(r2, &(0x7f0000000100)={0x60, 0x0, r4, {{0x9d3, 0xfffffffff45b4f43, 0x2, 0x1fc00000, 0x1, 0x70, 0x8, 0x400}}}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) [ 1610.625887] FAULT_INJECTION: forcing a failure. [ 1610.625887] name failslab, interval 1, probability 0, space 0, times 0 08:33:20 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:33:20 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:33:20 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1610.684952] CPU: 1 PID: 11318 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1610.692850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1610.702193] Call Trace: [ 1610.704779] dump_stack+0x1b2/0x281 [ 1610.708406] should_fail.cold+0x10a/0x149 [ 1610.712553] should_failslab+0xd6/0x130 [ 1610.716525] kmem_cache_alloc+0x28e/0x3c0 [ 1610.720671] __kernfs_new_node+0x6f/0x470 [ 1610.724819] kernfs_create_dir_ns+0x8c/0x200 [ 1610.729226] internal_create_group+0xe9/0x710 08:33:20 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) (async, rerun: 64) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async, rerun: 64) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r3, &(0x7f0000002080)={0x60, 0x0, r4}, 0x60) (async) write$FUSE_STATFS(r2, &(0x7f0000000100)={0x60, 0x0, r4, {{0x9d3, 0xfffffffff45b4f43, 0x2, 0x1fc00000, 0x1, 0x70, 0x8, 0x400}}}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) [ 1610.733725] dpm_sysfs_add+0x21/0x1c0 [ 1610.737521] device_add+0x977/0x15c0 [ 1610.741234] ? device_is_dependent+0x2a0/0x2a0 [ 1610.745809] ? kfree+0x1f0/0x250 [ 1610.749179] device_create_groups_vargs+0x1dc/0x250 [ 1610.754191] device_create_vargs+0x3a/0x50 [ 1610.758427] bdi_register_va.part.0+0x35/0x650 [ 1610.763013] bdi_register_va+0x63/0x80 [ 1610.766903] super_setup_bdi_name+0x123/0x220 [ 1610.771393] ? kill_block_super+0xe0/0xe0 [ 1610.775539] ? do_raw_spin_unlock+0x164/0x220 [ 1610.780038] fuse_fill_super+0x937/0x15c0 [ 1610.784188] ? fuse_get_root_inode+0xc0/0xc0 [ 1610.788584] ? up_write+0x17/0x60 [ 1610.792016] ? register_shrinker+0x15f/0x220 [ 1610.796400] ? sget_userns+0x768/0xc10 [ 1610.800270] ? get_anon_bdev+0x1c0/0x1c0 [ 1610.804309] ? sget+0xd9/0x110 [ 1610.807479] ? fuse_get_root_inode+0xc0/0xc0 [ 1610.811860] mount_nodev+0x4c/0xf0 [ 1610.815375] mount_fs+0x92/0x2a0 [ 1610.818722] vfs_kern_mount.part.0+0x5b/0x470 [ 1610.823202] do_mount+0xe65/0x2a30 [ 1610.826722] ? __do_page_fault+0x159/0xad0 [ 1610.830935] ? retint_kernel+0x2d/0x2d [ 1610.834799] ? copy_mount_string+0x40/0x40 [ 1610.839013] ? memset+0x20/0x40 [ 1610.842271] ? copy_mount_options+0x1fa/0x2f0 [ 1610.846742] ? copy_mnt_ns+0xa30/0xa30 [ 1610.850604] SyS_mount+0xa8/0x120 [ 1610.854031] ? copy_mnt_ns+0xa30/0xa30 [ 1610.857895] do_syscall_64+0x1d5/0x640 [ 1610.861763] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1610.866930] RIP: 0033:0x7f2196c8261a [ 1610.870614] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1610.878295] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a 08:33:20 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 43) 08:33:20 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}}) 08:33:20 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r3, &(0x7f0000002080)={0x60, 0x0, r4}, 0x60) write$FUSE_STATFS(r2, &(0x7f0000000100)={0x60, 0x0, r4, {{0x9d3, 0xfffffffff45b4f43, 0x2, 0x1fc00000, 0x1, 0x70, 0x8, 0x400}}}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) 08:33:20 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffffffffffff}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}]}}) 08:33:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = getegid() write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}}) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}}) (async) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}]}}) (async) 08:33:20 executing program 3: socket$kcm(0x29, 0x2, 0x0) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "d53c6ca7ec0840a798f9a076acf7174ccd654977b6b749490e690091266536770225d293a5cf3232c89254cd24af5411ff36f185344e1a115f82d1f2265b59ac", 0x1f}, 0x48, 0xfffffffffffffff8) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$negate(0xd, r0, 0x81, r0) keyctl$clear(0x7, r1) keyctl$link(0x8, r1, r0) [ 1610.885541] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1610.892784] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1610.900027] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1610.907271] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:20 executing program 3: socket$kcm(0x29, 0x2, 0x0) (async, rerun: 64) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (rerun: 64) keyctl$get_persistent(0x16, 0x0, r0) (async, rerun: 32) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "d53c6ca7ec0840a798f9a076acf7174ccd654977b6b749490e690091266536770225d293a5cf3232c89254cd24af5411ff36f185344e1a115f82d1f2265b59ac", 0x1f}, 0x48, 0xfffffffffffffff8) (async, rerun: 32) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) (async) keyctl$negate(0xd, r0, 0x81, r0) (async, rerun: 64) keyctl$clear(0x7, r1) (async, rerun: 64) keyctl$link(0x8, r1, r0) 08:33:20 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffffffffffff}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}]}}) 08:33:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) 08:33:20 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}}) [ 1610.992607] FAULT_INJECTION: forcing a failure. [ 1610.992607] name failslab, interval 1, probability 0, space 0, times 0 08:33:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = getegid() write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}}) (async) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}]}}) 08:33:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) [ 1611.049611] CPU: 1 PID: 11366 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1611.057518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1611.066865] Call Trace: [ 1611.069449] dump_stack+0x1b2/0x281 [ 1611.073078] should_fail.cold+0x10a/0x149 [ 1611.077228] should_failslab+0xd6/0x130 [ 1611.081202] kmem_cache_alloc+0x28e/0x3c0 [ 1611.085348] __kernfs_new_node+0x6f/0x470 [ 1611.089493] kernfs_new_node+0x7b/0xe0 [ 1611.093379] __kernfs_create_file+0x3d/0x320 [ 1611.097783] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1611.102448] sysfs_merge_group+0xdc/0x200 [ 1611.106601] dpm_sysfs_add+0x122/0x1c0 [ 1611.110481] device_add+0x977/0x15c0 [ 1611.114191] ? device_is_dependent+0x2a0/0x2a0 [ 1611.118770] ? kfree+0x1f0/0x250 [ 1611.122132] device_create_groups_vargs+0x1dc/0x250 [ 1611.127149] device_create_vargs+0x3a/0x50 [ 1611.131372] bdi_register_va.part.0+0x35/0x650 [ 1611.135931] bdi_register_va+0x63/0x80 [ 1611.139802] super_setup_bdi_name+0x123/0x220 [ 1611.144279] ? kill_block_super+0xe0/0xe0 [ 1611.148403] ? do_raw_spin_unlock+0x164/0x220 [ 1611.152881] fuse_fill_super+0x937/0x15c0 [ 1611.157013] ? fuse_get_root_inode+0xc0/0xc0 [ 1611.161395] ? up_write+0x17/0x60 [ 1611.164823] ? register_shrinker+0x15f/0x220 [ 1611.169210] ? sget_userns+0x768/0xc10 [ 1611.173083] ? get_anon_bdev+0x1c0/0x1c0 [ 1611.177118] ? sget+0xd9/0x110 [ 1611.180288] ? fuse_get_root_inode+0xc0/0xc0 [ 1611.184672] mount_nodev+0x4c/0xf0 [ 1611.188189] mount_fs+0x92/0x2a0 [ 1611.191536] vfs_kern_mount.part.0+0x5b/0x470 [ 1611.196006] do_mount+0xe65/0x2a30 [ 1611.199522] ? __do_page_fault+0x159/0xad0 [ 1611.203733] ? retint_kernel+0x2d/0x2d [ 1611.207597] ? copy_mount_string+0x40/0x40 [ 1611.211818] ? memset+0x20/0x40 [ 1611.215087] ? copy_mount_options+0x1fa/0x2f0 [ 1611.219563] ? copy_mnt_ns+0xa30/0xa30 [ 1611.223425] SyS_mount+0xa8/0x120 [ 1611.226856] ? copy_mnt_ns+0xa30/0xa30 [ 1611.230719] do_syscall_64+0x1d5/0x640 [ 1611.234584] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1611.239747] RIP: 0033:0x7f2196c8261a 08:33:21 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 44) 08:33:21 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) (async) 08:33:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@fowner_lt={'fowner<', 0xee01}}, {@uid_lt={'uid<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, r2}}]}}) 08:33:21 executing program 3: socket$kcm(0x29, 0x2, 0x0) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "d53c6ca7ec0840a798f9a076acf7174ccd654977b6b749490e690091266536770225d293a5cf3232c89254cd24af5411ff36f185344e1a115f82d1f2265b59ac", 0x1f}, 0x48, 0xfffffffffffffff8) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) (async, rerun: 32) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) (async, rerun: 32) keyctl$negate(0xd, r0, 0x81, r0) keyctl$clear(0x7, r1) (async) keyctl$link(0x8, r1, r0) 08:33:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffffffffffff}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x800}}]}}) 08:33:21 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}}) [ 1611.243432] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1611.251127] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1611.258378] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1611.265624] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1611.272872] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1611.280117] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:21 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, r0) 08:33:21 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}}) 08:33:21 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:33:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000340)=ANY=[@ANYRES64=r2], 0x2a) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = getegid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x28fa}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@default_permissions}], [{@obj_user={'obj_user', 0x3d, '-/:\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@dont_appraise}]}}) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@fowner_lt={'fowner<', 0xee01}}, {@uid_lt={'uid<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, r2}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000000140)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@fowner_lt={'fowner<', 0xee01}}, {@uid_lt={'uid<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, r2}}]}}) (async) 08:33:21 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) keyctl$search(0xa, 0x0, &(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, r0) [ 1611.376740] FAULT_INJECTION: forcing a failure. [ 1611.376740] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.470102] CPU: 0 PID: 11416 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1611.478009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1611.487357] Call Trace: [ 1611.489942] dump_stack+0x1b2/0x281 [ 1611.493580] should_fail.cold+0x10a/0x149 [ 1611.497730] should_failslab+0xd6/0x130 [ 1611.501704] kmem_cache_alloc+0x28e/0x3c0 [ 1611.505851] __kernfs_new_node+0x6f/0x470 [ 1611.509998] kernfs_new_node+0x7b/0xe0 [ 1611.513880] __kernfs_create_file+0x3d/0x320 [ 1611.518282] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1611.522959] sysfs_merge_group+0xdc/0x200 [ 1611.527109] dpm_sysfs_add+0x122/0x1c0 [ 1611.530993] device_add+0x977/0x15c0 [ 1611.534698] ? device_is_dependent+0x2a0/0x2a0 [ 1611.539257] ? kfree+0x1f0/0x250 [ 1611.542605] device_create_groups_vargs+0x1dc/0x250 [ 1611.547599] device_create_vargs+0x3a/0x50 [ 1611.551812] bdi_register_va.part.0+0x35/0x650 [ 1611.556370] bdi_register_va+0x63/0x80 [ 1611.560245] super_setup_bdi_name+0x123/0x220 [ 1611.564729] ? kill_block_super+0xe0/0xe0 [ 1611.568853] ? do_raw_spin_unlock+0x164/0x220 [ 1611.573327] fuse_fill_super+0x937/0x15c0 [ 1611.577452] ? fuse_get_root_inode+0xc0/0xc0 [ 1611.581836] ? up_write+0x17/0x60 [ 1611.585269] ? register_shrinker+0x15f/0x220 [ 1611.589652] ? sget_userns+0x768/0xc10 [ 1611.593518] ? get_anon_bdev+0x1c0/0x1c0 [ 1611.597555] ? sget+0xd9/0x110 [ 1611.600724] ? fuse_get_root_inode+0xc0/0xc0 [ 1611.605106] mount_nodev+0x4c/0xf0 [ 1611.608623] mount_fs+0x92/0x2a0 [ 1611.611967] vfs_kern_mount.part.0+0x5b/0x470 [ 1611.616438] do_mount+0xe65/0x2a30 [ 1611.619971] ? __do_page_fault+0x159/0xad0 [ 1611.624189] ? retint_kernel+0x2d/0x2d [ 1611.628054] ? copy_mount_string+0x40/0x40 [ 1611.632265] ? memset+0x20/0x40 [ 1611.635520] ? copy_mount_options+0x1fa/0x2f0 [ 1611.640001] ? copy_mnt_ns+0xa30/0xa30 [ 1611.643869] SyS_mount+0xa8/0x120 [ 1611.647296] ? copy_mnt_ns+0xa30/0xa30 [ 1611.651159] do_syscall_64+0x1d5/0x640 [ 1611.655024] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1611.660194] RIP: 0033:0x7f2196c8261a 08:33:21 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 45) 08:33:21 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:33:21 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}}) 08:33:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000340)=ANY=[@ANYRES64=r2], 0x2a) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r4 = getegid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x28fa}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@default_permissions}], [{@obj_user={'obj_user', 0x3d, '-/:\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@dont_appraise}]}}) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000340)=ANY=[@ANYRES64=r2], 0x2a) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) getegid() (async) mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x28fa}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@default_permissions}], [{@obj_user={'obj_user', 0x3d, '-/:\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@dont_appraise}]}}) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) 08:33:21 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) keyctl$search(0xa, 0x0, &(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, r0) (async) [ 1611.663886] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1611.671569] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1611.678814] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1611.686060] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1611.693303] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1611.700553] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:21 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) 08:33:21 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0xfffffffd}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffff9, r0, 0x1) [ 1611.773510] FAULT_INJECTION: forcing a failure. [ 1611.773510] name failslab, interval 1, probability 0, space 0, times 0 [ 1611.809400] CPU: 0 PID: 11462 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 08:33:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000340)=ANY=[@ANYRES64=r2], 0x2a) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) r4 = getegid() mount$fuseblk(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x28fa}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@default_permissions}], [{@obj_user={'obj_user', 0x3d, '-/:\''}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@subj_type}, {@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@dont_appraise}]}}) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:21 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0xfffffffd}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffff9, r0, 0x1) 08:33:21 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) [ 1611.817308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1611.826653] Call Trace: [ 1611.829239] dump_stack+0x1b2/0x281 [ 1611.832865] should_fail.cold+0x10a/0x149 [ 1611.837014] should_failslab+0xd6/0x130 [ 1611.840990] kmem_cache_alloc+0x28e/0x3c0 [ 1611.845137] __kernfs_new_node+0x6f/0x470 [ 1611.849292] kernfs_new_node+0x7b/0xe0 [ 1611.853183] __kernfs_create_file+0x3d/0x320 [ 1611.857588] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1611.862256] sysfs_merge_group+0xdc/0x200 [ 1611.866398] dpm_sysfs_add+0x122/0x1c0 [ 1611.870282] device_add+0x977/0x15c0 [ 1611.873995] ? device_is_dependent+0x2a0/0x2a0 [ 1611.878573] ? kfree+0x1f0/0x250 [ 1611.881941] device_create_groups_vargs+0x1dc/0x250 [ 1611.886953] device_create_vargs+0x3a/0x50 [ 1611.891187] bdi_register_va.part.0+0x35/0x650 [ 1611.895770] bdi_register_va+0x63/0x80 [ 1611.899652] super_setup_bdi_name+0x123/0x220 [ 1611.904145] ? kill_block_super+0xe0/0xe0 [ 1611.908278] ? do_raw_spin_unlock+0x164/0x220 [ 1611.912852] fuse_fill_super+0x937/0x15c0 [ 1611.916998] ? fuse_get_root_inode+0xc0/0xc0 [ 1611.921398] ? up_write+0x17/0x60 [ 1611.924836] ? register_shrinker+0x15f/0x220 [ 1611.929220] ? sget_userns+0x768/0xc10 [ 1611.933097] ? get_anon_bdev+0x1c0/0x1c0 [ 1611.937141] ? sget+0xd9/0x110 [ 1611.940318] ? fuse_get_root_inode+0xc0/0xc0 [ 1611.944722] mount_nodev+0x4c/0xf0 [ 1611.948247] mount_fs+0x92/0x2a0 [ 1611.951601] vfs_kern_mount.part.0+0x5b/0x470 [ 1611.956086] do_mount+0xe65/0x2a30 [ 1611.959604] ? __do_page_fault+0x159/0xad0 [ 1611.963814] ? retint_kernel+0x2d/0x2d [ 1611.967677] ? copy_mount_string+0x40/0x40 [ 1611.971897] ? memset+0x20/0x40 [ 1611.975165] ? copy_mount_options+0x1fa/0x2f0 [ 1611.979635] ? copy_mnt_ns+0xa30/0xa30 [ 1611.983508] SyS_mount+0xa8/0x120 [ 1611.986946] ? copy_mnt_ns+0xa30/0xa30 [ 1611.990815] do_syscall_64+0x1d5/0x640 [ 1611.994691] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1611.999855] RIP: 0033:0x7f2196c8261a [ 1612.003541] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1612.011230] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1612.018483] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1612.025745] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1612.033001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1612.040256] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}], [{@fowner_lt={'fowner<', 0xee01}}, {@uid_lt={'uid<', 0xee00}}, {@fowner_eq={'fowner', 0x3d, r2}}]}}) 08:33:21 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0xfffffffd}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffff9, r0, 0x1) 08:33:21 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 08:33:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0x200, 0x1000, 0x200, 0x0, 0x7ff}}, 0x50) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:21 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = getegid() write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}}) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x600}}]}}) 08:33:21 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 46) 08:33:22 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, r0) 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 08:33:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0x200, 0x1000, 0x200, 0x0, 0x7ff}}, 0x50) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1612.360750] FAULT_INJECTION: forcing a failure. [ 1612.360750] name failslab, interval 1, probability 0, space 0, times 0 [ 1612.372950] CPU: 1 PID: 11512 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1612.380840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1612.390968] Call Trace: [ 1612.393556] dump_stack+0x1b2/0x281 [ 1612.397188] should_fail.cold+0x10a/0x149 [ 1612.401345] should_failslab+0xd6/0x130 [ 1612.405321] kmem_cache_alloc+0x28e/0x3c0 [ 1612.409473] __kernfs_new_node+0x6f/0x470 [ 1612.413621] kernfs_new_node+0x7b/0xe0 [ 1612.417506] __kernfs_create_file+0x3d/0x320 [ 1612.421911] sysfs_add_file_mode_ns+0x1e1/0x450 [ 1612.426575] sysfs_merge_group+0xdc/0x200 [ 1612.430719] dpm_sysfs_add+0x122/0x1c0 [ 1612.434602] device_add+0x977/0x15c0 [ 1612.438314] ? device_is_dependent+0x2a0/0x2a0 [ 1612.442892] ? kfree+0x1f0/0x250 [ 1612.446258] device_create_groups_vargs+0x1dc/0x250 [ 1612.451272] device_create_vargs+0x3a/0x50 [ 1612.455510] bdi_register_va.part.0+0x35/0x650 [ 1612.460095] bdi_register_va+0x63/0x80 [ 1612.463983] super_setup_bdi_name+0x123/0x220 [ 1612.468478] ? kill_block_super+0xe0/0xe0 [ 1612.472631] ? do_raw_spin_unlock+0x164/0x220 [ 1612.477129] fuse_fill_super+0x937/0x15c0 [ 1612.481276] ? fuse_get_root_inode+0xc0/0xc0 [ 1612.485678] ? up_write+0x17/0x60 [ 1612.489127] ? register_shrinker+0x15f/0x220 [ 1612.493533] ? sget_userns+0x768/0xc10 [ 1612.497423] ? get_anon_bdev+0x1c0/0x1c0 [ 1612.501479] ? sget+0xd9/0x110 [ 1612.504668] ? fuse_get_root_inode+0xc0/0xc0 08:33:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:22 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, r0) 08:33:22 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, r0) [ 1612.509074] mount_nodev+0x4c/0xf0 [ 1612.512620] mount_fs+0x92/0x2a0 [ 1612.515983] vfs_kern_mount.part.0+0x5b/0x470 [ 1612.520482] do_mount+0xe65/0x2a30 [ 1612.524027] ? __do_page_fault+0x159/0xad0 [ 1612.528257] ? retint_kernel+0x2d/0x2d [ 1612.532142] ? copy_mount_string+0x40/0x40 [ 1612.536381] ? memset+0x20/0x40 [ 1612.539658] ? copy_mount_options+0x1fa/0x2f0 [ 1612.544148] ? copy_mnt_ns+0xa30/0xa30 [ 1612.548032] SyS_mount+0xa8/0x120 [ 1612.551483] ? copy_mnt_ns+0xa30/0xa30 [ 1612.555377] do_syscall_64+0x1d5/0x640 08:33:22 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0x9a) [ 1612.559267] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1612.564453] RIP: 0033:0x7f2196c8261a [ 1612.568154] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1612.575858] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1612.583121] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1612.590387] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1612.597656] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 08:33:22 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0x200, 0x1000, 0x200, 0x0, 0x7ff}}, 0x50) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0x200, 0x1000, 0x200, 0x0, 0x7ff}}, 0x50) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x0, {0x7, 0x24, 0x200, 0x1000, 0x200, 0x0, 0x7ff}}, 0x50) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) 08:33:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) 08:33:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 47) [ 1612.604917] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0x0, r3, {0x99, 0xe42a, 0x0, {0x5, 0x6, 0x1, 0x101, 0x1e6, 0x3, 0x8001, 0x9, 0x5, 0xc000, 0x2, 0xee00, 0xffffffffffffffff, 0x948f, 0x1}}}, 0x78) 08:33:22 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0x9a) 08:33:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}}) 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0x0, r3, {0x99, 0xe42a, 0x0, {0x5, 0x6, 0x1, 0x101, 0x1e6, 0x3, 0x8001, 0x9, 0x5, 0xc000, 0x2, 0xee00, 0xffffffffffffffff, 0x948f, 0x1}}}, 0x78) 08:33:22 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, 0x0) (async) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0x9a) [ 1612.693909] FAULT_INJECTION: forcing a failure. [ 1612.693909] name failslab, interval 1, probability 0, space 0, times 0 08:33:22 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) [ 1612.768922] CPU: 1 PID: 11550 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1612.776828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1612.786178] Call Trace: [ 1612.788765] dump_stack+0x1b2/0x281 [ 1612.792410] should_fail.cold+0x10a/0x149 [ 1612.796568] should_failslab+0xd6/0x130 [ 1612.800543] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1612.805208] ? dev_uevent_filter+0xd0/0xd0 [ 1612.809440] kobject_uevent_env+0x20c/0xf30 [ 1612.813760] ? wait_for_completion_io+0x10/0x10 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) (async) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78, 0x0, r3, {0x99, 0xe42a, 0x0, {0x5, 0x6, 0x1, 0x101, 0x1e6, 0x3, 0x8001, 0x9, 0x5, 0xc000, 0x2, 0xee00, 0xffffffffffffffff, 0x948f, 0x1}}}, 0x78) [ 1612.818428] device_add+0xa47/0x15c0 [ 1612.822139] ? device_is_dependent+0x2a0/0x2a0 [ 1612.826716] ? kfree+0x1f0/0x250 [ 1612.830084] device_create_groups_vargs+0x1dc/0x250 [ 1612.835098] device_create_vargs+0x3a/0x50 [ 1612.839330] bdi_register_va.part.0+0x35/0x650 [ 1612.843913] bdi_register_va+0x63/0x80 [ 1612.847886] super_setup_bdi_name+0x123/0x220 [ 1612.852417] ? kill_block_super+0xe0/0xe0 [ 1612.856566] ? do_raw_spin_unlock+0x164/0x220 [ 1612.861063] fuse_fill_super+0x937/0x15c0 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000002240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x77}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x40800000000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1612.865219] ? fuse_get_root_inode+0xc0/0xc0 [ 1612.869629] ? up_write+0x17/0x60 [ 1612.873081] ? register_shrinker+0x15f/0x220 [ 1612.878093] ? sget_userns+0x768/0xc10 [ 1612.881984] ? get_anon_bdev+0x1c0/0x1c0 [ 1612.886042] ? sget+0xd9/0x110 [ 1612.889230] ? fuse_get_root_inode+0xc0/0xc0 [ 1612.893632] mount_nodev+0x4c/0xf0 [ 1612.897165] mount_fs+0x92/0x2a0 [ 1612.900529] vfs_kern_mount.part.0+0x5b/0x470 [ 1612.905021] do_mount+0xe65/0x2a30 [ 1612.908562] ? __do_page_fault+0x159/0xad0 [ 1612.912793] ? retint_kernel+0x2d/0x2d 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000002240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x77}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x40800000000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f0000002240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x77}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x40800000000}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1612.916680] ? copy_mount_string+0x40/0x40 [ 1612.920911] ? memset+0x20/0x40 [ 1612.924188] ? copy_mount_options+0x1fa/0x2f0 [ 1612.928681] ? copy_mnt_ns+0xa30/0xa30 [ 1612.932564] SyS_mount+0xa8/0x120 [ 1612.936013] ? copy_mnt_ns+0xa30/0xa30 [ 1612.939897] do_syscall_64+0x1d5/0x640 [ 1612.943782] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1612.948962] RIP: 0033:0x7f2196c8261a [ 1612.952662] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1612.960369] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1612.967632] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1612.974905] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1612.982171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1612.989431] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 48) 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) 08:33:22 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x63, 0x30, 0x30, 0x34, 0x30, 0x37, 0x63, 0x38, 0x36, 0x38, 0x37, 0x33, 0x64, 0x38, 0x61]}, &(0x7f0000000100)={0x0, "c5821c00912ca4333620d8aacabd8784edb01b3cc0c2978921085663f1b30584f6820cce3a5bf4e978b2a93c5b798d3dcc0fb500"}, 0x48, 0xfffffffffffffffc) 08:33:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}}) 08:33:22 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ieee802154, &(0x7f0000000040)=0x80) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='macvlan0\x00', 0x10) syz_mount_image$fuse(&(0x7f0000000340), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2cbfaf1540726f6f746d6f64653d303030153030303030303030303030303031725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b9582fa76a4741ed61c5c68fc3386058467c45f9764fad699db818c08f6bcc0625a6dd2605910d951e3c46d18fdcec9ac379b650e4a9d620b2aa771bbbf0ad023f1d479a83edec80c375c5daf774929413e743af044e552eb5573f9cffffbf7c4c0c7659c882b1275aa771f314621947e656f70800418f7d4919a29e3f"]) r3 = accept$alg(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={r3}) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000300)=0x28) socket$nl_generic(0x10, 0x3, 0x10) r4 = getegid() setfsgid(r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r6) accept(r6, &(0x7f00000001c0)=@un=@abs, &(0x7f0000000240)=0x80) 08:33:22 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}}) (async) 08:33:22 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x63, 0x30, 0x30, 0x34, 0x30, 0x37, 0x63, 0x38, 0x36, 0x38, 0x37, 0x33, 0x64, 0x38, 0x61]}, &(0x7f0000000100)={0x0, "c5821c00912ca4333620d8aacabd8784edb01b3cc0c2978921085663f1b30584f6820cce3a5bf4e978b2a93c5b798d3dcc0fb500"}, 0x48, 0xfffffffffffffffc) 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) (async) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) 08:33:22 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ieee802154, &(0x7f0000000040)=0x80) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) (async, rerun: 64) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='macvlan0\x00', 0x10) (async) syz_mount_image$fuse(&(0x7f0000000340), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2cbfaf1540726f6f746d6f64653d303030153030303030303030303030303031725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b9582fa76a4741ed61c5c68fc3386058467c45f9764fad699db818c08f6bcc0625a6dd2605910d951e3c46d18fdcec9ac379b650e4a9d620b2aa771bbbf0ad023f1d479a83edec80c375c5daf774929413e743af044e552eb5573f9cffffbf7c4c0c7659c882b1275aa771f314621947e656f70800418f7d4919a29e3f"]) (async) r3 = accept$alg(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={r3}) (async) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000300)=0x28) socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = getegid() setfsgid(r4) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r6) (async) accept(r6, &(0x7f00000001c0)=@un=@abs, &(0x7f0000000240)=0x80) 08:33:22 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1613.098772] FAULT_INJECTION: forcing a failure. [ 1613.098772] name failslab, interval 1, probability 0, space 0, times 0 [ 1613.150888] CPU: 1 PID: 11632 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1613.158794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.168145] Call Trace: [ 1613.170736] dump_stack+0x1b2/0x281 [ 1613.174370] should_fail.cold+0x10a/0x149 [ 1613.178518] should_failslab+0xd6/0x130 [ 1613.182493] __kmalloc+0x2c1/0x400 [ 1613.186037] ? kobject_get_path+0xb5/0x230 [ 1613.190269] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 1613.195721] kobject_get_path+0xb5/0x230 08:33:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) (async, rerun: 32) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) (rerun: 32) [ 1613.199781] kobject_uevent_env+0x230/0xf30 [ 1613.204108] ? wait_for_completion_io+0x10/0x10 [ 1613.208780] device_add+0xa47/0x15c0 [ 1613.212503] ? device_is_dependent+0x2a0/0x2a0 [ 1613.217089] ? kfree+0x1f0/0x250 [ 1613.220464] device_create_groups_vargs+0x1dc/0x250 [ 1613.225479] device_create_vargs+0x3a/0x50 [ 1613.229712] bdi_register_va.part.0+0x35/0x650 [ 1613.234293] bdi_register_va+0x63/0x80 [ 1613.238286] super_setup_bdi_name+0x123/0x220 [ 1613.242779] ? kill_block_super+0xe0/0xe0 [ 1613.246930] ? do_raw_spin_unlock+0x164/0x220 [ 1613.251429] fuse_fill_super+0x937/0x15c0 [ 1613.255582] ? fuse_get_root_inode+0xc0/0xc0 [ 1613.259985] ? up_write+0x17/0x60 [ 1613.263431] ? register_shrinker+0x15f/0x220 [ 1613.267838] ? sget_userns+0x768/0xc10 [ 1613.271729] ? get_anon_bdev+0x1c0/0x1c0 [ 1613.275785] ? sget+0xd9/0x110 [ 1613.278975] ? fuse_get_root_inode+0xc0/0xc0 [ 1613.283460] mount_nodev+0x4c/0xf0 [ 1613.286989] mount_fs+0x92/0x2a0 [ 1613.290354] vfs_kern_mount.part.0+0x5b/0x470 [ 1613.294839] do_mount+0xe65/0x2a30 [ 1613.298359] ? __do_page_fault+0x159/0xad0 [ 1613.302577] ? retint_kernel+0x2d/0x2d [ 1613.306443] ? copy_mount_string+0x40/0x40 [ 1613.310667] ? memset+0x20/0x40 [ 1613.313932] ? copy_mount_options+0x1fa/0x2f0 [ 1613.318409] ? copy_mnt_ns+0xa30/0xa30 [ 1613.322281] SyS_mount+0xa8/0x120 [ 1613.325712] ? copy_mnt_ns+0xa30/0xa30 [ 1613.329579] do_syscall_64+0x1d5/0x640 [ 1613.333458] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1613.338632] RIP: 0033:0x7f2196c8261a [ 1613.342320] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:23 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 49) 08:33:23 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ieee802154, &(0x7f0000000040)=0x80) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r2) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='macvlan0\x00', 0x10) syz_mount_image$fuse(&(0x7f0000000340), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2cbfaf1540726f6f746d6f64653d303030153030303030303030303030303031725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b9582fa76a4741ed61c5c68fc3386058467c45f9764fad699db818c08f6bcc0625a6dd2605910d951e3c46d18fdcec9ac379b650e4a9d620b2aa771bbbf0ad023f1d479a83edec80c375c5daf774929413e743af044e552eb5573f9cffffbf7c4c0c7659c882b1275aa771f314621947e656f70800418f7d4919a29e3f"]) r3 = accept$alg(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={r3}) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000300)=0x28) socket$nl_generic(0x10, 0x3, 0x10) r4 = getegid() setfsgid(r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r6) accept(r6, &(0x7f00000001c0)=@un=@abs, &(0x7f0000000240)=0x80) accept(0xffffffffffffffff, &(0x7f00000000c0)=@ieee802154, &(0x7f0000000040)=0x80) (async) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r2) (async) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='macvlan0\x00', 0x10) (async) syz_mount_image$fuse(&(0x7f0000000340), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2cbfaf1540726f6f746d6f64653d303030153030303030303030303030303031725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b9582fa76a4741ed61c5c68fc3386058467c45f9764fad699db818c08f6bcc0625a6dd2605910d951e3c46d18fdcec9ac379b650e4a9d620b2aa771bbbf0ad023f1d479a83edec80c375c5daf774929413e743af044e552eb5573f9cffffbf7c4c0c7659c882b1275aa771f314621947e656f70800418f7d4919a29e3f"]) (async) accept$alg(r0, 0x0, 0x0) (async) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={r3}) (async) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f00000002c0)={0x6, 0x7, 'syz1\x00'}, &(0x7f0000000300)=0x28) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) getegid() (async) setfsgid(r4) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r5) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r6) (async) accept(r6, &(0x7f00000001c0)=@un=@abs, &(0x7f0000000240)=0x80) (async) 08:33:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, r3, {{0x781, 0x100000000, 0x4, 0x3, 0x5, 0x8, 0x1ac, 0x7fff}}}, 0x60) 08:33:23 executing program 0: write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x8}}, 0x18) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:23 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x63, 0x30, 0x30, 0x34, 0x30, 0x37, 0x63, 0x38, 0x36, 0x38, 0x37, 0x33, 0x64, 0x38, 0x61]}, &(0x7f0000000100)={0x0, "c5821c00912ca4333620d8aacabd8784edb01b3cc0c2978921085663f1b30584f6820cce3a5bf4e978b2a93c5b798d3dcc0fb500"}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x34, 0x63, 0x30, 0x30, 0x34, 0x30, 0x37, 0x63, 0x38, 0x36, 0x38, 0x37, 0x33, 0x64, 0x38, 0x61]}, &(0x7f0000000100)={0x0, "c5821c00912ca4333620d8aacabd8784edb01b3cc0c2978921085663f1b30584f6820cce3a5bf4e978b2a93c5b798d3dcc0fb500"}, 0x48, 0xfffffffffffffffc) (async) 08:33:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1613.350012] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1613.357279] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1613.364529] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1613.371780] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1613.379036] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:23 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffc) 08:33:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, r3, {{0x781, 0x100000000, 0x4, 0x3, 0x5, 0x8, 0x1ac, 0x7fff}}}, 0x60) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) (async) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, r3, {{0x781, 0x100000000, 0x4, 0x3, 0x5, 0x8, 0x1ac, 0x7fff}}}, 0x60) (async) 08:33:23 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}]}}) 08:33:23 executing program 0: write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x8}}, 0x18) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:23 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) keyctl$link(0x8, r0, 0xfffffffffffffffc) (async) [ 1613.511239] FAULT_INJECTION: forcing a failure. [ 1613.511239] name failslab, interval 1, probability 0, space 0, times 0 08:33:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, r3, {{0x781, 0x100000000, 0x4, 0x3, 0x5, 0x8, 0x1ac, 0x7fff}}}, 0x60) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) pipe2$watch_queue(&(0x7f0000000040), 0x80) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) (async) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, r3, {{0x781, 0x100000000, 0x4, 0x3, 0x5, 0x8, 0x1ac, 0x7fff}}}, 0x60) (async) [ 1613.556114] CPU: 1 PID: 11685 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1613.564015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.573367] Call Trace: [ 1613.575957] dump_stack+0x1b2/0x281 [ 1613.579592] should_fail.cold+0x10a/0x149 [ 1613.583744] should_failslab+0xd6/0x130 [ 1613.587719] kmem_cache_alloc_node+0x263/0x410 [ 1613.592298] __alloc_skb+0x5c/0x510 [ 1613.595922] kobject_uevent_env+0x882/0xf30 [ 1613.600238] device_add+0xa47/0x15c0 [ 1613.603937] ? device_is_dependent+0x2a0/0x2a0 [ 1613.608500] ? kfree+0x1f0/0x250 [ 1613.611845] device_create_groups_vargs+0x1dc/0x250 [ 1613.616839] device_create_vargs+0x3a/0x50 [ 1613.621056] bdi_register_va.part.0+0x35/0x650 [ 1613.625716] bdi_register_va+0x63/0x80 [ 1613.629582] super_setup_bdi_name+0x123/0x220 [ 1613.634062] ? kill_block_super+0xe0/0xe0 [ 1613.638198] ? do_raw_spin_unlock+0x164/0x220 [ 1613.642677] fuse_fill_super+0x937/0x15c0 [ 1613.646804] ? fuse_get_root_inode+0xc0/0xc0 [ 1613.651191] ? up_write+0x17/0x60 [ 1613.654620] ? register_shrinker+0x15f/0x220 [ 1613.659004] ? sget_userns+0x768/0xc10 [ 1613.662873] ? get_anon_bdev+0x1c0/0x1c0 [ 1613.666909] ? sget+0xd9/0x110 [ 1613.670082] ? fuse_get_root_inode+0xc0/0xc0 [ 1613.674467] mount_nodev+0x4c/0xf0 [ 1613.677988] mount_fs+0x92/0x2a0 [ 1613.681333] vfs_kern_mount.part.0+0x5b/0x470 [ 1613.685808] do_mount+0xe65/0x2a30 [ 1613.689325] ? __do_page_fault+0x159/0xad0 [ 1613.693540] ? retint_kernel+0x2d/0x2d [ 1613.697414] ? copy_mount_string+0x40/0x40 [ 1613.701626] ? memset+0x20/0x40 [ 1613.704882] ? copy_mount_options+0x1fa/0x2f0 [ 1613.709356] ? copy_mnt_ns+0xa30/0xa30 [ 1613.713221] SyS_mount+0xa8/0x120 [ 1613.716658] ? copy_mnt_ns+0xa30/0xa30 [ 1613.720529] do_syscall_64+0x1d5/0x640 [ 1613.724505] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1613.729671] RIP: 0033:0x7f2196c8261a [ 1613.733357] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1613.741041] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1613.748287] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1613.755537] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1613.762785] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1613.770033] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:23 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 50) 08:33:23 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}]}}) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}]}}) (async) 08:33:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0x6}}, 0x18) 08:33:23 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffc) 08:33:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:23 executing program 0: write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x0, {0x8}}, 0x18) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0x6}}, 0x18) 08:33:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:23 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@allow_other}]}}) 08:33:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108804, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '^[$^-]&\')]:&:\\-\'-'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@smackfsdef}, {@hash}, {@audit}, {@obj_user={'obj_user', 0x3d, '\xb2'}}, {@dont_appraise}]}}) 08:33:23 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfce78d86817976b364504a60eb80ff241816f7837a31c7a82de9800bb34af4fb4247d9372229dfc6de1823062912971ad9a6a8d6355400", 0x19}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfc098d8681795eb364504a60eb80c2242216f7837a31c7a82509004f3fca21c512971a1f46d7b26f4b831b03a6a8d628540000000000e8ff00"}, 0x48, r2) r4 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000200), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) r7 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r3, &(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, r7) r8 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) r9 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) keyctl$reject(0x13, r8, 0x1c5, 0x0, r9) keyctl$get_persistent(0x16, 0xffffffffffffffff, r4) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "a03665c6576e4989858682a2b2c0e1645f8b79b515ef1107e2ad186a85391096257b80eee0e6b92fdf2566cee12e5090b5f7d88608f750d82eb21cbcfb5185ab", 0x3f}, 0x48, r0) [ 1613.907600] FAULT_INJECTION: forcing a failure. [ 1613.907600] name failslab, interval 1, probability 0, space 0, times 0 [ 1613.946909] CPU: 0 PID: 11751 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 08:33:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async, rerun: 64) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108804, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '^[$^-]&\')]:&:\\-\'-'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@smackfsdef}, {@hash}, {@audit}, {@obj_user={'obj_user', 0x3d, '\xb2'}}, {@dont_appraise}]}}) [ 1613.954822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1613.964179] Call Trace: [ 1613.966775] dump_stack+0x1b2/0x281 [ 1613.970408] should_fail.cold+0x10a/0x149 [ 1613.974555] should_failslab+0xd6/0x130 [ 1613.982611] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1613.987721] __kmalloc_node_track_caller+0x38/0x70 [ 1613.992652] __alloc_skb+0x96/0x510 [ 1613.996281] kobject_uevent_env+0x882/0xf30 [ 1614.000609] device_add+0xa47/0x15c0 [ 1614.004325] ? device_is_dependent+0x2a0/0x2a0 [ 1614.008899] ? kfree+0x1f0/0x250 [ 1614.012247] device_create_groups_vargs+0x1dc/0x250 [ 1614.017241] device_create_vargs+0x3a/0x50 [ 1614.021456] bdi_register_va.part.0+0x35/0x650 [ 1614.026018] bdi_register_va+0x63/0x80 [ 1614.029891] super_setup_bdi_name+0x123/0x220 [ 1614.034383] ? kill_block_super+0xe0/0xe0 [ 1614.038511] ? do_raw_spin_unlock+0x164/0x220 [ 1614.042988] fuse_fill_super+0x937/0x15c0 [ 1614.047118] ? fuse_get_root_inode+0xc0/0xc0 [ 1614.051514] ? up_write+0x17/0x60 [ 1614.054947] ? register_shrinker+0x15f/0x220 [ 1614.059332] ? sget_userns+0x768/0xc10 [ 1614.063200] ? get_anon_bdev+0x1c0/0x1c0 [ 1614.067236] ? sget+0xd9/0x110 [ 1614.070409] ? fuse_get_root_inode+0xc0/0xc0 [ 1614.074793] mount_nodev+0x4c/0xf0 [ 1614.078490] mount_fs+0x92/0x2a0 [ 1614.081865] vfs_kern_mount.part.0+0x5b/0x470 [ 1614.086348] do_mount+0xe65/0x2a30 [ 1614.089869] ? __do_page_fault+0x159/0xad0 [ 1614.094086] ? retint_kernel+0x2d/0x2d [ 1614.097952] ? copy_mount_string+0x40/0x40 [ 1614.102164] ? memset+0x20/0x40 [ 1614.105421] ? copy_mount_options+0x1fa/0x2f0 [ 1614.109893] ? copy_mnt_ns+0xa30/0xa30 [ 1614.113770] SyS_mount+0xa8/0x120 [ 1614.117209] ? copy_mnt_ns+0xa30/0xa30 [ 1614.121077] do_syscall_64+0x1d5/0x640 [ 1614.124950] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1614.130119] RIP: 0033:0x7f2196c8261a [ 1614.133806] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1614.141498] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1614.148743] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 08:33:23 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 51) 08:33:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x108804, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '^[$^-]&\')]:&:\\-\'-'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@smackfsdef}, {@hash}, {@audit}, {@obj_user={'obj_user', 0x3d, '\xb2'}}, {@dont_appraise}]}}) 08:33:23 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfce78d86817976b364504a60eb80ff241816f7837a31c7a82de9800bb34af4fb4247d9372229dfc6de1823062912971ad9a6a8d6355400", 0x19}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfc098d8681795eb364504a60eb80c2242216f7837a31c7a82509004f3fca21c512971a1f46d7b26f4b831b03a6a8d628540000000000e8ff00"}, 0x48, r2) r4 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r6) add_key$keyring(&(0x7f0000000200), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) r7 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r3, &(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, r7) r8 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) r9 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) keyctl$reject(0x13, r8, 0x1c5, 0x0, r9) keyctl$get_persistent(0x16, 0xffffffffffffffff, r4) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "a03665c6576e4989858682a2b2c0e1645f8b79b515ef1107e2ad186a85391096257b80eee0e6b92fdf2566cee12e5090b5f7d88608f750d82eb21cbcfb5185ab", 0x3f}, 0x48, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfce78d86817976b364504a60eb80ff241816f7837a31c7a82de9800bb34af4fb4247d9372229dfc6de1823062912971ad9a6a8d6355400", 0x19}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfc098d8681795eb364504a60eb80c2242216f7837a31c7a82509004f3fca21c512971a1f46d7b26f4b831b03a6a8d628540000000000e8ff00"}, 0x48, r2) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r6) (async) add_key$keyring(&(0x7f0000000200), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000240), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, r1) (async) keyctl$search(0xa, r3, &(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, r7) (async) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) (async) keyctl$reject(0x13, r8, 0x1c5, 0x0, r9) (async) keyctl$get_persistent(0x16, 0xffffffffffffffff, r4) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "a03665c6576e4989858682a2b2c0e1645f8b79b515ef1107e2ad186a85391096257b80eee0e6b92fdf2566cee12e5090b5f7d88608f750d82eb21cbcfb5185ab", 0x3f}, 0x48, r0) (async) 08:33:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0x6}}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r2, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) (async) write$FUSE_LSEEK(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0x6}}, 0x18) (async) 08:33:23 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757374b6c3f3a707", @ANYRESDEC=0x0, @ANYBLOB="1967726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000002140)={0x30, 0x4, 0x0, {0x1, 0x400, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0x0, r3, {0x7, 0x24, 0x9b, 0x811248, 0xfffc, 0x3, 0x9, 0x1}}, 0x50) 08:33:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1614.155992] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1614.163341] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1614.170590] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x7, 0x80000000}}, 0x28) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x7, 0x80000000}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x7, 0x80000000}}, 0x28) (async) [ 1614.285293] FAULT_INJECTION: forcing a failure. [ 1614.285293] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.298777] CPU: 0 PID: 11799 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1614.306667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1614.316017] Call Trace: [ 1614.318606] dump_stack+0x1b2/0x281 [ 1614.322238] should_fail.cold+0x10a/0x149 [ 1614.326524] should_failslab+0xd6/0x130 [ 1614.330505] kmem_cache_alloc_node_trace+0x25a/0x400 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x7, 0x80000000}}, 0x28) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x7, 0x80000000}}, 0x28) (async) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) [ 1614.335613] __kmalloc_node_track_caller+0x38/0x70 [ 1614.340543] __alloc_skb+0x96/0x510 [ 1614.344173] kobject_uevent_env+0x882/0xf30 [ 1614.348496] device_add+0xa47/0x15c0 [ 1614.352205] ? device_is_dependent+0x2a0/0x2a0 [ 1614.356781] ? kfree+0x1f0/0x250 [ 1614.360149] device_create_groups_vargs+0x1dc/0x250 [ 1614.365167] device_create_vargs+0x3a/0x50 [ 1614.369407] bdi_register_va.part.0+0x35/0x650 [ 1614.373991] bdi_register_va+0x63/0x80 [ 1614.377876] super_setup_bdi_name+0x123/0x220 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) (async) [ 1614.382369] ? kill_block_super+0xe0/0xe0 [ 1614.386512] ? do_raw_spin_unlock+0x164/0x220 [ 1614.391011] fuse_fill_super+0x937/0x15c0 [ 1614.395161] ? fuse_get_root_inode+0xc0/0xc0 [ 1614.399570] ? up_write+0x17/0x60 [ 1614.403018] ? register_shrinker+0x15f/0x220 [ 1614.407432] ? sget_userns+0x768/0xc10 [ 1614.411324] ? get_anon_bdev+0x1c0/0x1c0 [ 1614.415377] ? sget+0xd9/0x110 [ 1614.418548] ? fuse_get_root_inode+0xc0/0xc0 [ 1614.422937] mount_nodev+0x4c/0xf0 [ 1614.426455] mount_fs+0x92/0x2a0 [ 1614.429808] vfs_kern_mount.part.0+0x5b/0x470 [ 1614.434289] do_mount+0xe65/0x2a30 [ 1614.437813] ? __do_page_fault+0x159/0xad0 [ 1614.442026] ? retint_kernel+0x2d/0x2d [ 1614.445907] ? copy_mount_string+0x40/0x40 [ 1614.450130] ? memset+0x20/0x40 [ 1614.453386] ? copy_mount_options+0x1fa/0x2f0 [ 1614.457857] ? copy_mnt_ns+0xa30/0xa30 [ 1614.461721] SyS_mount+0xa8/0x120 [ 1614.465154] ? copy_mnt_ns+0xa30/0xa30 [ 1614.469026] do_syscall_64+0x1d5/0x640 [ 1614.473000] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1614.478165] RIP: 0033:0x7f2196c8261a [ 1614.481852] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1614.489537] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1614.496783] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1614.504031] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1614.511277] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1614.518525] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:24 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 52) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10}, 0x10) 08:33:24 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfce78d86817976b364504a60eb80ff241816f7837a31c7a82de9800bb34af4fb4247d9372229dfc6de1823062912971ad9a6a8d6355400", 0x19}, 0x48, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "d8fbfc098d8681795eb364504a60eb80c2242216f7837a31c7a82509004f3fca21c512971a1f46d7b26f4b831b03a6a8d628540000000000e8ff00"}, 0x48, r2) r4 = add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) (async) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r5) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r6) (async) add_key$keyring(&(0x7f0000000200), &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0, r0) (async) r7 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$search(0xa, r3, &(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, r7) (async) r8 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r0) r9 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) (async) keyctl$reject(0x13, r8, 0x1c5, 0x0, r9) (async) keyctl$get_persistent(0x16, 0xffffffffffffffff, r4) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "a03665c6576e4989858682a2b2c0e1645f8b79b515ef1107e2ad186a85391096257b80eee0e6b92fdf2566cee12e5090b5f7d88608f750d82eb21cbcfb5185ab", 0x3f}, 0x48, r0) 08:33:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757374b6c3f3a707", @ANYRESDEC=0x0, @ANYBLOB="1967726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000002140)={0x30, 0x4, 0x0, {0x1, 0x400, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) (async, rerun: 64) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 64) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0x0, r3, {0x7, 0x24, 0x9b, 0x811248, 0xfffc, 0x3, 0x9, 0x1}}, 0x50) 08:33:24 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:24 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x38, 0x0, 0x0, {0x0, 0x1}}, 0xffffffffffffff3f) 08:33:24 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x38, 0x0, 0x0, {0x0, 0x1}}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x38, 0x0, 0x0, {0x0, 0x1}}, 0xffffffffffffff3f) (async) [ 1614.633323] FAULT_INJECTION: forcing a failure. [ 1614.633323] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.657198] CPU: 0 PID: 11854 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1614.665101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1614.674461] Call Trace: [ 1614.677052] dump_stack+0x1b2/0x281 08:33:24 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) (async) 08:33:24 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) keyctl$get_persistent(0x16, 0xffffffffffffffff, r0) (async) [ 1614.680690] should_fail.cold+0x10a/0x149 [ 1614.684846] should_failslab+0xd6/0x130 [ 1614.688832] kmem_cache_alloc_node+0x263/0x410 [ 1614.693416] __alloc_skb+0x5c/0x510 [ 1614.697042] kobject_uevent_env+0x882/0xf30 [ 1614.701370] device_add+0xa47/0x15c0 [ 1614.705082] ? device_is_dependent+0x2a0/0x2a0 [ 1614.709661] ? kfree+0x1f0/0x250 [ 1614.713028] device_create_groups_vargs+0x1dc/0x250 [ 1614.718042] device_create_vargs+0x3a/0x50 [ 1614.722277] bdi_register_va.part.0+0x35/0x650 [ 1614.726865] bdi_register_va+0x63/0x80 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x38, 0x0, 0x0, {0x0, 0x1}}, 0xffffffffffffff3f) [ 1614.730763] super_setup_bdi_name+0x123/0x220 [ 1614.735259] ? kill_block_super+0xe0/0xe0 [ 1614.739406] ? do_raw_spin_unlock+0x164/0x220 [ 1614.743906] fuse_fill_super+0x937/0x15c0 [ 1614.748057] ? fuse_get_root_inode+0xc0/0xc0 [ 1614.752460] ? up_write+0x17/0x60 [ 1614.755910] ? register_shrinker+0x15f/0x220 [ 1614.760318] ? sget_userns+0x768/0xc10 [ 1614.764213] ? get_anon_bdev+0x1c0/0x1c0 [ 1614.768268] ? sget+0xd9/0x110 [ 1614.771464] ? fuse_get_root_inode+0xc0/0xc0 [ 1614.775854] mount_nodev+0x4c/0xf0 [ 1614.779375] mount_fs+0x92/0x2a0 [ 1614.782724] vfs_kern_mount.part.0+0x5b/0x470 [ 1614.787201] do_mount+0xe65/0x2a30 [ 1614.790721] ? __do_page_fault+0x159/0xad0 [ 1614.794935] ? retint_kernel+0x2d/0x2d [ 1614.798802] ? copy_mount_string+0x40/0x40 [ 1614.803024] ? memset+0x20/0x40 [ 1614.806294] ? copy_mount_options+0x1fa/0x2f0 [ 1614.810779] ? copy_mnt_ns+0xa30/0xa30 [ 1614.814650] SyS_mount+0xa8/0x120 [ 1614.818090] ? copy_mnt_ns+0xa30/0xa30 [ 1614.821955] do_syscall_64+0x1d5/0x640 [ 1614.825822] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1614.830989] RIP: 0033:0x7f2196c8261a [ 1614.834678] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1614.842364] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1614.849618] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1614.856876] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1614.864212] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1614.871469] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:24 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 53) 08:33:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000006a00110627bd7000fbdb0000000000000000080005000000", @ANYRES32=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) 08:33:24 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000000)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x19}, 0x48, 0xfffffffffffffffc) [ 1614.962904] FAULT_INJECTION: forcing a failure. [ 1614.962904] name failslab, interval 1, probability 0, space 0, times 0 [ 1614.974496] CPU: 1 PID: 11897 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1614.982376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1614.991719] Call Trace: [ 1614.994294] dump_stack+0x1b2/0x281 [ 1614.997914] should_fail.cold+0x10a/0x149 [ 1615.002059] should_failslab+0xd6/0x130 [ 1615.006022] kmem_cache_alloc_node+0x263/0x410 [ 1615.010586] __alloc_skb+0x5c/0x510 [ 1615.014191] kobject_uevent_env+0x882/0xf30 [ 1615.018496] device_add+0xa47/0x15c0 [ 1615.022200] ? device_is_dependent+0x2a0/0x2a0 [ 1615.026767] ? kfree+0x1f0/0x250 [ 1615.030123] device_create_groups_vargs+0x1dc/0x250 [ 1615.035122] device_create_vargs+0x3a/0x50 [ 1615.039337] bdi_register_va.part.0+0x35/0x650 [ 1615.043902] bdi_register_va+0x63/0x80 [ 1615.047773] super_setup_bdi_name+0x123/0x220 [ 1615.052253] ? kill_block_super+0xe0/0xe0 [ 1615.056382] ? do_raw_spin_unlock+0x164/0x220 [ 1615.060869] fuse_fill_super+0x937/0x15c0 [ 1615.065006] ? fuse_get_root_inode+0xc0/0xc0 [ 1615.069438] ? up_write+0x17/0x60 [ 1615.072878] ? register_shrinker+0x15f/0x220 [ 1615.077270] ? sget_userns+0x768/0xc10 [ 1615.081158] ? get_anon_bdev+0x1c0/0x1c0 [ 1615.085211] ? sget+0xd9/0x110 [ 1615.088384] ? fuse_get_root_inode+0xc0/0xc0 [ 1615.092771] mount_nodev+0x4c/0xf0 [ 1615.096290] mount_fs+0x92/0x2a0 [ 1615.099635] vfs_kern_mount.part.0+0x5b/0x470 [ 1615.104110] do_mount+0xe65/0x2a30 [ 1615.107631] ? __do_page_fault+0x159/0xad0 [ 1615.111850] ? retint_kernel+0x2d/0x2d [ 1615.115715] ? copy_mount_string+0x40/0x40 [ 1615.119938] ? memset+0x20/0x40 [ 1615.123214] ? copy_mount_options+0x1fa/0x2f0 [ 1615.127702] ? copy_mnt_ns+0xa30/0xa30 [ 1615.131567] SyS_mount+0xa8/0x120 [ 1615.135004] ? copy_mnt_ns+0xa30/0xa30 [ 1615.138878] do_syscall_64+0x1d5/0x640 [ 1615.142774] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1615.147948] RIP: 0033:0x7f2196c8261a [ 1615.151643] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1615.159336] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1615.166588] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1615.173843] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1615.181097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1615.188353] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757374b6c3f3a707", @ANYRESDEC=0x0, @ANYBLOB="1967726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000002140)={0x30, 0x4, 0x0, {0x1, 0x400, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0x0, r3, {0x7, 0x24, 0x9b, 0x811248, 0xfffc, 0x3, 0x9, 0x1}}, 0x50) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303132303030302c757374b6c3f3a707", @ANYRESDEC=0x0, @ANYBLOB="1967726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) (async) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000002140)={0x30, 0x4, 0x0, {0x1, 0x400, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3}, 0x60) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0x0, r3, {0x7, 0x24, 0x9b, 0x811248, 0xfffc, 0x3, 0x9, 0x1}}, 0x50) (async) 08:33:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 32) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (rerun: 32) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:25 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000000)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x19}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000000)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x19}, 0x48, 0xfffffffffffffffc) (async) 08:33:25 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000006a00110627bd7000fbdb0000000000000000080005000000", @ANYRES32=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) 08:33:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 54) 08:33:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) 08:33:25 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000000)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x19}, 0x48, 0xfffffffffffffffc) 08:33:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/card0/oss_mixer\x00', 0x600000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1615.511683] FAULT_INJECTION: forcing a failure. [ 1615.511683] name failslab, interval 1, probability 0, space 0, times 0 08:33:25 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000006a00110627bd7000fbdb0000000000000000080005000000", @ANYRES32=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20000004) 08:33:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) (async) 08:33:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0xfffffffffffffff5, r3, {0x7, 0x24, 0x9, 0x88000, 0x1, 0x1, 0x7fffffff}}, 0x50) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3, {{0x0, 0x0, 0xfffffffffffffffe, 0x10000000000}}}, 0x60) accept4$phonet_pipe(r2, &(0x7f0000002280), &(0x7f00000022c0)=0x10, 0x804de3f894aee445) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, r3, {0x0, 0x10}}, 0x20) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_STATFS(r5, &(0x7f0000002380)={0x60, 0x0, r3, {{0x5b, 0x7, 0x1000, 0x7, 0x1, 0x7fffffff, 0x40, 0x3}}}, 0x60) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000002580)={0x31, 0x4, 0x0, {0x0, 0x7, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbd8215509900a1aefb38a4ed92a6d9bff086463b468e78dc398d69e312839bc351ad9df7199d418ba4accb7e9e"]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000000040)=r6) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = getegid() write$FUSE_OPEN(r8, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) mount$fuseblk(&(0x7f0000002400), &(0x7f0000002440)='./file0\x00', &(0x7f0000002140), 0x2010840, &(0x7f0000002680)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2400}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1c00}}], [{@measure}, {@fowner_lt={'fowner<', r4}}]}}) [ 1615.564761] CPU: 0 PID: 11913 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1615.572660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1615.582094] Call Trace: [ 1615.584683] dump_stack+0x1b2/0x281 [ 1615.588316] should_fail.cold+0x10a/0x149 [ 1615.592478] should_failslab+0xd6/0x130 [ 1615.596457] kmem_cache_alloc_node+0x263/0x410 [ 1615.601045] __alloc_skb+0x5c/0x510 [ 1615.604675] kobject_uevent_env+0x882/0xf30 [ 1615.609005] device_add+0xa47/0x15c0 08:33:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) [ 1615.612719] ? device_is_dependent+0x2a0/0x2a0 [ 1615.617297] ? kfree+0x1f0/0x250 [ 1615.620665] device_create_groups_vargs+0x1dc/0x250 [ 1615.625683] device_create_vargs+0x3a/0x50 [ 1615.629917] bdi_register_va.part.0+0x35/0x650 [ 1615.634502] bdi_register_va+0x63/0x80 [ 1615.638390] super_setup_bdi_name+0x123/0x220 [ 1615.642889] ? kill_block_super+0xe0/0xe0 [ 1615.647037] ? do_raw_spin_unlock+0x164/0x220 [ 1615.651623] fuse_fill_super+0x937/0x15c0 [ 1615.655775] ? fuse_get_root_inode+0xc0/0xc0 [ 1615.660184] ? up_write+0x17/0x60 08:33:25 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x180000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x1, 0x354d}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38060, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYRES16=r0]) 08:33:25 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r2, {{0xff, 0x643, 0x9025, 0x8000000000000000, 0x9e58, 0x2abd, 0x9, 0x6}}}, 0x60) [ 1615.663631] ? register_shrinker+0x15f/0x220 [ 1615.668036] ? sget_userns+0x768/0xc10 [ 1615.671933] ? get_anon_bdev+0x1c0/0x1c0 [ 1615.675990] ? sget+0xd9/0x110 [ 1615.679187] ? fuse_get_root_inode+0xc0/0xc0 [ 1615.683595] mount_nodev+0x4c/0xf0 [ 1615.687131] mount_fs+0x92/0x2a0 [ 1615.690503] vfs_kern_mount.part.0+0x5b/0x470 [ 1615.695001] do_mount+0xe65/0x2a30 [ 1615.698546] ? __do_page_fault+0x159/0xad0 [ 1615.702778] ? retint_kernel+0x2d/0x2d [ 1615.706661] ? copy_mount_string+0x40/0x40 [ 1615.710892] ? memset+0x20/0x40 08:33:25 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x180000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x1, 0x354d}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38060, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYRES16=r0]) accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x180000) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x1, 0x354d}}, 0x28) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38060, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYRES16=r0]) (async) 08:33:25 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r2, {{0xff, 0x643, 0x9025, 0x8000000000000000, 0x9e58, 0x2abd, 0x9, 0x6}}}, 0x60) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r2, {{0xff, 0x643, 0x9025, 0x8000000000000000, 0x9e58, 0x2abd, 0x9, 0x6}}}, 0x60) (async) [ 1615.714171] ? copy_mount_options+0x1fa/0x2f0 [ 1615.718659] ? copy_mnt_ns+0xa30/0xa30 [ 1615.722543] SyS_mount+0xa8/0x120 [ 1615.725991] ? copy_mnt_ns+0xa30/0xa30 [ 1615.729876] do_syscall_64+0x1d5/0x640 [ 1615.733762] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1615.738944] RIP: 0033:0x7f2196c8261a [ 1615.742645] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1615.750867] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1615.758132] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1615.765403] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1615.772666] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1615.779930] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 55) 08:33:25 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r2, {{0xff, 0x643, 0x9025, 0x8000000000000000, 0x9e58, 0x2abd, 0x9, 0x6}}}, 0x60) 08:33:25 executing program 0: accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x180000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x1, 0x354d}}, 0x28) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38060, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYRES16=r0]) accept4$phonet_pipe(0xffffffffffffffff, 0x0, 0x0, 0x180000) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x28, 0x4, 0x0, {0x1, 0x354d}}, 0x28) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38060, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYRES16=r0]) (async) 08:33:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000200)=""/155, &(0x7f00000002c0)=0x9b) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x40}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x95) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0xfffffffffffffff5, r3, {0x7, 0x24, 0x9, 0x88000, 0x1, 0x1, 0x7fffffff}}, 0x50) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3, {{0x0, 0x0, 0xfffffffffffffffe, 0x10000000000}}}, 0x60) (async) accept4$phonet_pipe(r2, &(0x7f0000002280), &(0x7f00000022c0)=0x10, 0x804de3f894aee445) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, r3, {0x0, 0x10}}, 0x20) (async) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_STATFS(r5, &(0x7f0000002380)={0x60, 0x0, r3, {{0x5b, 0x7, 0x1000, 0x7, 0x1, 0x7fffffff, 0x40, 0x3}}}, 0x60) (async, rerun: 64) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000002580)={0x31, 0x4, 0x0, {0x0, 0x7, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbd8215509900a1aefb38a4ed92a6d9bff086463b468e78dc398d69e312839bc351ad9df7199d418ba4accb7e9e"]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000000040)=r6) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = getegid() (async) write$FUSE_OPEN(r8, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) (async) mount$fuseblk(&(0x7f0000002400), &(0x7f0000002440)='./file0\x00', &(0x7f0000002140), 0x2010840, &(0x7f0000002680)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2400}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1c00}}], [{@measure}, {@fowner_lt={'fowner<', r4}}]}}) 08:33:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000200)=""/155, &(0x7f00000002c0)=0x9b) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x40}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x95) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000200)=""/155, &(0x7f00000002c0)=0x9b) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x40}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x95) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) 08:33:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept(r0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@nfc, &(0x7f0000000180)=0x80) getsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x8, 0x9a, 0x7, 0x21, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x0, 0x8, 0x5, 0xe8}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1615.906015] FAULT_INJECTION: forcing a failure. [ 1615.906015] name failslab, interval 1, probability 0, space 0, times 0 [ 1615.942832] CPU: 1 PID: 11992 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1615.950740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1615.960086] Call Trace: [ 1615.962669] dump_stack+0x1b2/0x281 [ 1615.966302] should_fail.cold+0x10a/0x149 [ 1615.970453] should_failslab+0xd6/0x130 [ 1615.974428] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1615.979537] __kmalloc_node_track_caller+0x38/0x70 [ 1615.984464] __alloc_skb+0x96/0x510 [ 1615.988090] kobject_uevent_env+0x882/0xf30 [ 1615.992415] device_add+0xa47/0x15c0 [ 1615.996129] ? device_is_dependent+0x2a0/0x2a0 [ 1616.000708] ? kfree+0x1f0/0x250 08:33:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async, rerun: 64) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000200)=""/155, &(0x7f00000002c0)=0x9b) (async, rerun: 64) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x4}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x40}]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x95) (async, rerun: 32) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (rerun: 32) 08:33:25 executing program 3: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x440, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f703045912ca433362098aaf1b3058df6820cce3a58f4e978b2a93c5b798d0fb50000000000000000000000fffffffffffffffb00"}, 0x48, 0xfffffffffffffffb) 08:33:25 executing program 3: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x440, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f703045912ca433362098aaf1b3058df6820cce3a58f4e978b2a93c5b798d0fb50000000000000000000000fffffffffffffffb00"}, 0x48, 0xfffffffffffffffb) [ 1616.004073] device_create_groups_vargs+0x1dc/0x250 [ 1616.009086] device_create_vargs+0x3a/0x50 [ 1616.013323] bdi_register_va.part.0+0x35/0x650 [ 1616.017906] bdi_register_va+0x63/0x80 [ 1616.021794] super_setup_bdi_name+0x123/0x220 [ 1616.026292] ? kill_block_super+0xe0/0xe0 [ 1616.030447] ? do_raw_spin_unlock+0x164/0x220 [ 1616.034946] fuse_fill_super+0x937/0x15c0 [ 1616.039085] ? fuse_get_root_inode+0xc0/0xc0 [ 1616.043483] ? up_write+0x17/0x60 [ 1616.046931] ? register_shrinker+0x15f/0x220 [ 1616.051339] ? sget_userns+0x768/0xc10 08:33:25 executing program 3: openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card3/oss_mixer\x00', 0x440, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f703045912ca433362098aaf1b3058df6820cce3a58f4e978b2a93c5b798d0fb50000000000000000000000fffffffffffffffb00"}, 0x48, 0xfffffffffffffffb) [ 1616.055242] ? get_anon_bdev+0x1c0/0x1c0 [ 1616.059293] ? sget+0xd9/0x110 [ 1616.062485] ? fuse_get_root_inode+0xc0/0xc0 [ 1616.066890] mount_nodev+0x4c/0xf0 [ 1616.070424] mount_fs+0x92/0x2a0 [ 1616.073789] vfs_kern_mount.part.0+0x5b/0x470 [ 1616.078282] do_mount+0xe65/0x2a30 [ 1616.081818] ? __do_page_fault+0x159/0xad0 [ 1616.086054] ? retint_kernel+0x2d/0x2d [ 1616.089946] ? copy_mount_string+0x40/0x40 [ 1616.094180] ? memset+0x20/0x40 [ 1616.097454] ? copy_mount_options+0x1fa/0x2f0 [ 1616.101938] ? copy_mnt_ns+0xa30/0xa30 [ 1616.105822] SyS_mount+0xa8/0x120 [ 1616.109255] ? copy_mnt_ns+0xa30/0xa30 [ 1616.113124] do_syscall_64+0x1d5/0x640 [ 1616.117001] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1616.122178] RIP: 0033:0x7f2196c8261a [ 1616.125869] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1616.133554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1616.140811] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1616.148066] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1616.155316] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1616.162565] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 56) 08:33:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket(0x10, 0x800, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='virt_wifi0\x00', 0x10) 08:33:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x0, {0x7, 0x24, 0x3, 0x102088, 0xffe1, 0x0, 0xffffffff, 0x100}}, 0x50) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_DIRENT(r3, &(0x7f00000000c0)={0x30, 0x0, 0x0, [{0x4, 0x94, 0x8, 0x6, 'rootmode'}]}, 0x30) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:25 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept(r0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@nfc, &(0x7f0000000180)=0x80) getsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x8, 0x9a, 0x7, 0x21, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x0, 0x8, 0x5, 0xe8}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:25 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0xfffffffffffffff5, r3, {0x7, 0x24, 0x9, 0x88000, 0x1, 0x1, 0x7fffffff}}, 0x50) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3, {{0x0, 0x0, 0xfffffffffffffffe, 0x10000000000}}}, 0x60) accept4$phonet_pipe(r2, &(0x7f0000002280), &(0x7f00000022c0)=0x10, 0x804de3f894aee445) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, r3, {0x0, 0x10}}, 0x20) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) write$FUSE_STATFS(r5, &(0x7f0000002380)={0x60, 0x0, r3, {{0x5b, 0x7, 0x1000, 0x7, 0x1, 0x7fffffff, 0x40, 0x3}}}, 0x60) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000002580)={0x31, 0x4, 0x0, {0x0, 0x7, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbd8215509900a1aefb38a4ed92a6d9bff086463b468e78dc398d69e312839bc351ad9df7199d418ba4accb7e9e"]) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000000040)=r6) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r9 = getegid() write$FUSE_OPEN(r8, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) mount$fuseblk(&(0x7f0000002400), &(0x7f0000002440)='./file0\x00', &(0x7f0000002140), 0x2010840, &(0x7f0000002680)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2400}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1c00}}], [{@measure}, {@fowner_lt={'fowner<', r4}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000002180), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$phonet_pipe(0x23, 0x5, 0x2) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_INIT(r1, &(0x7f0000002300)={0x50, 0xfffffffffffffff5, r3, {0x7, 0x24, 0x9, 0x88000, 0x1, 0x1, 0x7fffffff}}, 0x50) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r3, {{0x0, 0x0, 0xfffffffffffffffe, 0x10000000000}}}, 0x60) (async) accept4$phonet_pipe(r2, &(0x7f0000002280), &(0x7f00000022c0)=0x10, 0x804de3f894aee445) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, r3, {0x0, 0x10}}, 0x20) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) (async) write$FUSE_STATFS(r5, &(0x7f0000002380)={0x60, 0x0, r3, {{0x5b, 0x7, 0x1000, 0x7, 0x1, 0x7fffffff, 0x40, 0x3}}}, 0x60) (async) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000002580)={0x31, 0x4, 0x0, {0x0, 0x7, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cbd8215509900a1aefb38a4ed92a6d9bff086463b468e78dc398d69e312839bc351ad9df7199d418ba4accb7e9e"]) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r7, 0x8004e500, &(0x7f0000000040)=r6) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r8, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) (async) mount$fuseblk(&(0x7f0000002400), &(0x7f0000002440)='./file0\x00', &(0x7f0000002140), 0x2010840, &(0x7f0000002680)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2400}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@blksize={'blksize', 0x3d, 0x1c00}}], [{@measure}, {@fowner_lt={'fowner<', r4}}]}}) (async) 08:33:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = socket(0x10, 0x800, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='virt_wifi0\x00', 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) socket$kcm(0x29, 0x5, 0x0) (async) socket(0x10, 0x800, 0x9) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x1) (async) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='virt_wifi0\x00', 0x10) (async) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x1, 0x1, 0x0, '@'}}, 0x22) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1616.291234] FAULT_INJECTION: forcing a failure. [ 1616.291234] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.321029] CPU: 1 PID: 12043 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1616.328938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.338298] Call Trace: 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1616.340891] dump_stack+0x1b2/0x281 [ 1616.344526] should_fail.cold+0x10a/0x149 [ 1616.348676] should_failslab+0xd6/0x130 [ 1616.352651] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1616.357768] __kmalloc_node_track_caller+0x38/0x70 [ 1616.362724] __alloc_skb+0x96/0x510 [ 1616.366356] kobject_uevent_env+0x882/0xf30 [ 1616.370683] device_add+0xa47/0x15c0 [ 1616.374398] ? device_is_dependent+0x2a0/0x2a0 [ 1616.378977] ? kfree+0x1f0/0x250 [ 1616.382342] device_create_groups_vargs+0x1dc/0x250 [ 1616.387355] device_create_vargs+0x3a/0x50 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept(r0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@nfc, &(0x7f0000000180)=0x80) getsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x8, 0x9a, 0x7, 0x21, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x0, 0x8, 0x5, 0xe8}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) socket$inet6_udp(0xa, 0x2, 0x0) (async) accept(r0, 0x0, 0x0) (async) accept(0xffffffffffffffff, &(0x7f0000000100)=@nfc, &(0x7f0000000180)=0x80) (async) getsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x2f, 0x8, 0x9a, 0x7, 0x21, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x0, 0x8, 0x5, 0xe8}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) [ 1616.391593] bdi_register_va.part.0+0x35/0x650 [ 1616.396182] bdi_register_va+0x63/0x80 [ 1616.400070] super_setup_bdi_name+0x123/0x220 [ 1616.404559] ? kill_block_super+0xe0/0xe0 [ 1616.408708] ? do_raw_spin_unlock+0x164/0x220 [ 1616.413205] fuse_fill_super+0x937/0x15c0 [ 1616.417351] ? fuse_get_root_inode+0xc0/0xc0 [ 1616.421757] ? up_write+0x17/0x60 [ 1616.425206] ? register_shrinker+0x15f/0x220 [ 1616.429617] ? sget_userns+0x768/0xc10 [ 1616.433506] ? get_anon_bdev+0x1c0/0x1c0 [ 1616.437559] ? sget+0xd9/0x110 [ 1616.440748] ? fuse_get_root_inode+0xc0/0xc0 [ 1616.445152] mount_nodev+0x4c/0xf0 [ 1616.448686] mount_fs+0x92/0x2a0 [ 1616.452051] vfs_kern_mount.part.0+0x5b/0x470 [ 1616.456543] do_mount+0xe65/0x2a30 [ 1616.460082] ? __do_page_fault+0x159/0xad0 [ 1616.464314] ? retint_kernel+0x2d/0x2d [ 1616.468197] ? copy_mount_string+0x40/0x40 [ 1616.472430] ? memset+0x20/0x40 [ 1616.475705] ? copy_mount_options+0x1fa/0x2f0 [ 1616.480198] ? copy_mnt_ns+0xa30/0xa30 [ 1616.484084] SyS_mount+0xa8/0x120 [ 1616.487531] ? copy_mnt_ns+0xa30/0xa30 [ 1616.491415] do_syscall_64+0x1d5/0x640 [ 1616.495308] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1616.500490] RIP: 0033:0x7f2196c8261a [ 1616.504194] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1616.511897] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1616.519161] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1616.526426] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1616.533686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 08:33:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 57) 08:33:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000002240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffff}}, {@max_read={'max_read', 0x3d, 0x66d0}}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@max_read={'max_read', 0x3d, 0x1f}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '+@{&.\xe1/3-\x13^\'^.'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user}]}}) 08:33:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x0, {0x7, 0x24, 0x3, 0x102088, 0xffe1, 0x0, 0xffffffff, 0x100}}, 0x50) (async, rerun: 64) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (rerun: 64) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_DIRENT(r3, &(0x7f00000000c0)={0x30, 0x0, 0x0, [{0x4, 0x94, 0x8, 0x6, 'rootmode'}]}, 0x30) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 64) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async, rerun: 32) r1 = socket$kcm(0x29, 0x5, 0x0) (async, rerun: 32) r2 = socket(0x10, 0x800, 0x9) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)) (async) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) (async) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r4, 0x5760, 0x1) (async) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='virt_wifi0\x00', 0x10) 08:33:26 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000040)=0x80) [ 1616.540939] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000002240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffff}}, {@max_read={'max_read', 0x3d, 0x66d0}}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@max_read={'max_read', 0x3d, 0x1f}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '+@{&.\xe1/3-\x13^\'^.'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user}]}}) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000040)=0x80) 08:33:26 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async, rerun: 32) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000002240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffff}}, {@max_read={'max_read', 0x3d, 0x66d0}}, {@blksize}, {@blksize={'blksize', 0x3d, 0x1e00}}, {@max_read={'max_read', 0x3d, 0x1f}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '+@{&.\xe1/3-\x13^\'^.'}}, {@euid_eq={'euid', 0x3d, r2}}, {@subj_user}]}}) 08:33:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x0, {0x7, 0x24, 0x3, 0x102088, 0xffe1, 0x0, 0xffffffff, 0x100}}, 0x50) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_DIRENT(r3, &(0x7f00000000c0)={0x30, 0x0, 0x0, [{0x4, 0x94, 0x8, 0x6, 'rootmode'}]}, 0x30) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x0, {0x7, 0x24, 0x3, 0x102088, 0xffe1, 0x0, 0xffffffff, 0x100}}, 0x50) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) pipe2$watch_queue(&(0x7f0000000240), 0x80) (async) write$FUSE_DIRENT(r3, &(0x7f00000000c0)={0x30, 0x0, 0x0, [{0x4, 0x94, 0x8, 0x6, 'rootmode'}]}, 0x30) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) [ 1616.703894] FAULT_INJECTION: forcing a failure. [ 1616.703894] name failslab, interval 1, probability 0, space 0, times 0 [ 1616.756551] CPU: 0 PID: 12127 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1616.764465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1616.773809] Call Trace: [ 1616.776377] dump_stack+0x1b2/0x281 [ 1616.779998] should_fail.cold+0x10a/0x149 [ 1616.784137] should_failslab+0xd6/0x130 [ 1616.788097] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1616.793179] __kmalloc_node_track_caller+0x38/0x70 [ 1616.798089] __alloc_skb+0x96/0x510 [ 1616.801706] kobject_uevent_env+0x882/0xf30 [ 1616.806008] device_add+0xa47/0x15c0 [ 1616.809706] ? device_is_dependent+0x2a0/0x2a0 [ 1616.814272] ? kfree+0x1f0/0x250 [ 1616.817633] device_create_groups_vargs+0x1dc/0x250 [ 1616.822632] device_create_vargs+0x3a/0x50 [ 1616.826853] bdi_register_va.part.0+0x35/0x650 [ 1616.831422] bdi_register_va+0x63/0x80 [ 1616.835287] super_setup_bdi_name+0x123/0x220 [ 1616.839762] ? kill_block_super+0xe0/0xe0 [ 1616.843894] ? do_raw_spin_unlock+0x164/0x220 [ 1616.848372] fuse_fill_super+0x937/0x15c0 [ 1616.852502] ? fuse_get_root_inode+0xc0/0xc0 [ 1616.856887] ? up_write+0x17/0x60 [ 1616.860317] ? register_shrinker+0x15f/0x220 [ 1616.864700] ? sget_userns+0x768/0xc10 [ 1616.868570] ? get_anon_bdev+0x1c0/0x1c0 [ 1616.872610] ? sget+0xd9/0x110 [ 1616.875779] ? fuse_get_root_inode+0xc0/0xc0 [ 1616.880163] mount_nodev+0x4c/0xf0 [ 1616.883684] mount_fs+0x92/0x2a0 [ 1616.887030] vfs_kern_mount.part.0+0x5b/0x470 [ 1616.891505] do_mount+0xe65/0x2a30 [ 1616.895027] ? __do_page_fault+0x159/0xad0 [ 1616.899239] ? retint_kernel+0x2d/0x2d [ 1616.903104] ? copy_mount_string+0x40/0x40 [ 1616.907323] ? memset+0x20/0x40 [ 1616.910582] ? copy_mount_options+0x1fa/0x2f0 [ 1616.915053] ? copy_mnt_ns+0xa30/0xa30 [ 1616.918920] SyS_mount+0xa8/0x120 [ 1616.922352] ? copy_mnt_ns+0xa30/0xa30 [ 1616.926225] do_syscall_64+0x1d5/0x640 [ 1616.930098] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1616.935285] RIP: 0033:0x7f2196c8261a [ 1616.938971] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1616.946654] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1616.953901] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1616.961151] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1616.968399] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1616.975649] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 58) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002500), 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/module/yenta_socket', 0x4d00, 0x8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_OPEN(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=ANY=[@ANYRESHEX, @ANYBLOB="96db3dbf3207b6f5b0464ae0f2801ef85b3ff3641a1dc0f171935c35dcc17e35cc3bcbecfa8178fff634718a2b76f87df220b2db1e1eec249cb75abc49cb8a0a51ac3f400fabff61d6775ece3bda8844283106998ee1e9b56c71dbc263e79dac95c118a39c51a93762a4162554856f85aa132bb465381c893e77da2e3a4f3310e7521326565881ea8a7aa544c4ac0fa1fb1b688b7490b4b634cdcb71e7879d371e5e7b4d19c70c4682075447b26834dca6180ce4abd2a813f0fe6e521f58a8fb3fdd06b40955f35d78002791434ae952daccce254714409f6d759ff2", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c67726f75705f69643d54a0fb7eb059c87e183ff3d3490108c5cb63901422", @ANYRES64=r2, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) getresuid(&(0x7f0000000180), &(0x7f00000022c0)=0x0, &(0x7f0000002300)) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2369ae6586049c86, &(0x7f0000002340)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0xd59}}, {}, {@blksize}, {@default_permissions}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@allow_other}], [{@fsmagic}, {@smackfshat={'smackfshat', 0x3d, '/dev/fuse\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}%\''}}, {@pcr={'pcr', 0x3d, 0x2b}}]}}) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, r6, {0x2}}, 0x18) 08:33:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2b, 0x4, 0x0, {0x4, 0x100000001, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:26 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:26 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000040)=0x80) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) accept(0xffffffffffffffff, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000040)=0x80) (async) [ 1617.093455] FAULT_INJECTION: forcing a failure. [ 1617.093455] name failslab, interval 1, probability 0, space 0, times 0 [ 1617.130199] CPU: 0 PID: 12168 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1617.138103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1617.147451] Call Trace: [ 1617.150045] dump_stack+0x1b2/0x281 [ 1617.153680] should_fail.cold+0x10a/0x149 [ 1617.157829] should_failslab+0xd6/0x130 [ 1617.161806] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1617.166913] __kmalloc_node_track_caller+0x38/0x70 [ 1617.171842] __alloc_skb+0x96/0x510 [ 1617.175472] kobject_uevent_env+0x882/0xf30 [ 1617.179799] device_add+0xa47/0x15c0 [ 1617.183514] ? device_is_dependent+0x2a0/0x2a0 [ 1617.188092] ? kfree+0x1f0/0x250 [ 1617.191548] device_create_groups_vargs+0x1dc/0x250 [ 1617.196650] device_create_vargs+0x3a/0x50 [ 1617.200893] bdi_register_va.part.0+0x35/0x650 [ 1617.205477] bdi_register_va+0x63/0x80 [ 1617.209362] super_setup_bdi_name+0x123/0x220 [ 1617.213858] ? kill_block_super+0xe0/0xe0 [ 1617.218009] ? do_raw_spin_unlock+0x164/0x220 [ 1617.222507] fuse_fill_super+0x937/0x15c0 [ 1617.226658] ? fuse_get_root_inode+0xc0/0xc0 [ 1617.231069] ? up_write+0x17/0x60 [ 1617.234518] ? register_shrinker+0x15f/0x220 [ 1617.238921] ? sget_userns+0x768/0xc10 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:26 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) socket$inet_udplite(0x2, 0x2, 0x88) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) (async) keyctl$unlink(0x9, r0, r0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:33:26 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, r0) 08:33:26 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:33:26 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$search(0xa, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, r0) [ 1617.242814] ? get_anon_bdev+0x1c0/0x1c0 [ 1617.246869] ? sget+0xd9/0x110 [ 1617.250062] ? fuse_get_root_inode+0xc0/0xc0 [ 1617.254468] mount_nodev+0x4c/0xf0 [ 1617.258007] mount_fs+0x92/0x2a0 [ 1617.261373] vfs_kern_mount.part.0+0x5b/0x470 [ 1617.265864] do_mount+0xe65/0x2a30 [ 1617.269404] ? __do_page_fault+0x159/0xad0 [ 1617.273633] ? retint_kernel+0x2d/0x2d [ 1617.277521] ? copy_mount_string+0x40/0x40 [ 1617.281756] ? memset+0x20/0x40 [ 1617.285030] ? copy_mount_options+0x1fa/0x2f0 [ 1617.289521] ? copy_mnt_ns+0xa30/0xa30 [ 1617.293406] SyS_mount+0xa8/0x120 [ 1617.296846] ? copy_mnt_ns+0xa30/0xa30 [ 1617.300712] do_syscall_64+0x1d5/0x640 [ 1617.304589] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1617.309770] RIP: 0033:0x7f2196c8261a [ 1617.313457] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1617.321143] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1617.328391] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1617.335641] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 59) 08:33:27 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:33:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002500), 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/module/yenta_socket', 0x4d00, 0x8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_OPEN(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=ANY=[@ANYRESHEX, @ANYBLOB="96db3dbf3207b6f5b0464ae0f2801ef85b3ff3641a1dc0f171935c35dcc17e35cc3bcbecfa8178fff634718a2b76f87df220b2db1e1eec249cb75abc49cb8a0a51ac3f400fabff61d6775ece3bda8844283106998ee1e9b56c71dbc263e79dac95c118a39c51a93762a4162554856f85aa132bb465381c893e77da2e3a4f3310e7521326565881ea8a7aa544c4ac0fa1fb1b688b7490b4b634cdcb71e7879d371e5e7b4d19c70c4682075447b26834dca6180ce4abd2a813f0fe6e521f58a8fb3fdd06b40955f35d78002791434ae952daccce254714409f6d759ff2", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c67726f75705f69643d54a0fb7eb059c87e183ff3d3490108c5cb63901422", @ANYRES64=r2, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) getresuid(&(0x7f0000000180), &(0x7f00000022c0)=0x0, &(0x7f0000002300)) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2369ae6586049c86, &(0x7f0000002340)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0xd59}}, {}, {@blksize}, {@default_permissions}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@allow_other}], [{@fsmagic}, {@smackfshat={'smackfshat', 0x3d, '/dev/fuse\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}%\''}}, {@pcr={'pcr', 0x3d, 0x2b}}]}}) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, r6, {0x2}}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002500), 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/module/yenta_socket', 0x4d00, 0x8) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) (async) write$FUSE_OPEN(r3, 0x0, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=ANY=[@ANYRESHEX, @ANYBLOB="96db3dbf3207b6f5b0464ae0f2801ef85b3ff3641a1dc0f171935c35dcc17e35cc3bcbecfa8178fff634718a2b76f87df220b2db1e1eec249cb75abc49cb8a0a51ac3f400fabff61d6775ece3bda8844283106998ee1e9b56c71dbc263e79dac95c118a39c51a93762a4162554856f85aa132bb465381c893e77da2e3a4f3310e7521326565881ea8a7aa544c4ac0fa1fb1b688b7490b4b634cdcb71e7879d371e5e7b4d19c70c4682075447b26834dca6180ce4abd2a813f0fe6e521f58a8fb3fdd06b40955f35d78002791434ae952daccce254714409f6d759ff2", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c67726f75705f69643d54a0fb7eb059c87e183ff3d3490108c5cb63901422", @ANYRES64=r2, @ANYBLOB=',\x00']) (async) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) (async) getresuid(&(0x7f0000000180), &(0x7f00000022c0), &(0x7f0000002300)) (async) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2369ae6586049c86, &(0x7f0000002340)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0xd59}}, {}, {@blksize}, {@default_permissions}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@allow_other}], [{@fsmagic}, {@smackfshat={'smackfshat', 0x3d, '/dev/fuse\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}%\''}}, {@pcr={'pcr', 0x3d, 0x2b}}]}}) (async) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, r6, {0x2}}, 0x18) (async) 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) keyctl$unlink(0x9, r0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$search(0xa, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)={'syz', 0x1}, r0) (async) 08:33:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2b, 0x4, 0x0, {0x4, 0x100000001, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) (async, rerun: 32) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1617.342891] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1617.350138] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:27 executing program 2: write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 08:33:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) (async) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2b, 0x4, 0x0, {0x4, 0x100000001, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1617.450461] FAULT_INJECTION: forcing a failure. [ 1617.450461] name failslab, interval 1, probability 0, space 0, times 0 [ 1617.486361] CPU: 0 PID: 12215 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) keyctl$link(0x8, r2, r3) 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) (async) keyctl$link(0x8, r2, r3) [ 1617.494264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1617.503792] Call Trace: [ 1617.506381] dump_stack+0x1b2/0x281 [ 1617.510014] should_fail.cold+0x10a/0x149 [ 1617.514166] should_failslab+0xd6/0x130 [ 1617.518141] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1617.523250] __kmalloc_node_track_caller+0x38/0x70 [ 1617.528175] __alloc_skb+0x96/0x510 [ 1617.531812] kobject_uevent_env+0x882/0xf30 [ 1617.536139] device_add+0xa47/0x15c0 [ 1617.539945] ? device_is_dependent+0x2a0/0x2a0 [ 1617.544525] ? kfree+0x1f0/0x250 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$clear(0x7, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r2) (async) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r3) keyctl$link(0x8, r2, r3) 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) select(0x40, &(0x7f0000000140)={0xfc1d, 0x59, 0x0, 0xffffffffffffffff, 0x2, 0x606a, 0xfffffffffffffff8, 0x6}, &(0x7f0000000180)={0x4, 0x5bdd8f6b, 0x401, 0x0, 0x4, 0x7, 0x1, 0x100000000}, &(0x7f00000001c0)={0x9, 0x1, 0x3e67f5e9, 0x1, 0x30000000, 0x118, 0x9, 0x20}, &(0x7f0000000200)={0x77359400}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/configfs', 0x143080, 0x160) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x9) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100)=0xffffffffffffffff, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) [ 1617.547891] device_create_groups_vargs+0x1dc/0x250 [ 1617.552909] device_create_vargs+0x3a/0x50 [ 1617.557159] bdi_register_va.part.0+0x35/0x650 [ 1617.561744] bdi_register_va+0x63/0x80 [ 1617.565632] super_setup_bdi_name+0x123/0x220 [ 1617.570127] ? kill_block_super+0xe0/0xe0 [ 1617.574271] ? do_raw_spin_unlock+0x164/0x220 [ 1617.578772] fuse_fill_super+0x937/0x15c0 [ 1617.582919] ? fuse_get_root_inode+0xc0/0xc0 [ 1617.587328] ? up_write+0x17/0x60 [ 1617.590776] ? register_shrinker+0x15f/0x220 [ 1617.595201] ? sget_userns+0x768/0xc10 [ 1617.599091] ? get_anon_bdev+0x1c0/0x1c0 [ 1617.603150] ? sget+0xd9/0x110 [ 1617.606340] ? fuse_get_root_inode+0xc0/0xc0 [ 1617.610737] mount_nodev+0x4c/0xf0 [ 1617.614256] mount_fs+0x92/0x2a0 [ 1617.617602] vfs_kern_mount.part.0+0x5b/0x470 [ 1617.622075] do_mount+0xe65/0x2a30 [ 1617.625603] ? __do_page_fault+0x159/0xad0 [ 1617.629822] ? retint_kernel+0x2d/0x2d [ 1617.633687] ? copy_mount_string+0x40/0x40 [ 1617.637900] ? memset+0x20/0x40 [ 1617.641155] ? copy_mount_options+0x1fa/0x2f0 [ 1617.645626] ? copy_mnt_ns+0xa30/0xa30 [ 1617.649488] SyS_mount+0xa8/0x120 [ 1617.652918] ? copy_mnt_ns+0xa30/0xa30 [ 1617.656782] do_syscall_64+0x1d5/0x640 [ 1617.660651] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1617.665815] RIP: 0033:0x7f2196c8261a [ 1617.669503] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1617.677189] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1617.684434] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1617.691793] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 60) 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) select(0x40, &(0x7f0000000140)={0xfc1d, 0x59, 0x0, 0xffffffffffffffff, 0x2, 0x606a, 0xfffffffffffffff8, 0x6}, &(0x7f0000000180)={0x4, 0x5bdd8f6b, 0x401, 0x0, 0x4, 0x7, 0x1, 0x100000000}, &(0x7f00000001c0)={0x9, 0x1, 0x3e67f5e9, 0x1, 0x30000000, 0x118, 0x9, 0x20}, &(0x7f0000000200)={0x77359400}) (async, rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/configfs', 0x143080, 0x160) (rerun: 64) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x9) (async, rerun: 32) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100)=0xffffffffffffffff, 0x4) (rerun: 32) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002500), 0x2, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000002540)='/sys/module/yenta_socket', 0x4d00, 0x8) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) (async) write$FUSE_OPEN(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=ANY=[@ANYRESHEX, @ANYBLOB="96db3dbf3207b6f5b0464ae0f2801ef85b3ff3641a1dc0f171935c35dcc17e35cc3bcbecfa8178fff634718a2b76f87df220b2db1e1eec249cb75abc49cb8a0a51ac3f400fabff61d6775ece3bda8844283106998ee1e9b56c71dbc263e79dac95c118a39c51a93762a4162554856f85aa132bb465381c893e77da2e3a4f3310e7521326565881ea8a7aa544c4ac0fa1fb1b688b7490b4b634cdcb71e7879d371e5e7b4d19c70c4682075447b26834dca6180ce4abd2a813f0fe6e521f58a8fb3fdd06b40955f35d78002791434ae952daccce254714409f6d759ff2", @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r5, @ANYBLOB="2c67726f75705f69643d54a0fb7eb059c87e183ff3d3490108c5cb63901422", @ANYRES64=r2, @ANYBLOB=',\x00']) (async) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r8, 0x8004e500, &(0x7f0000000040)=r7) (async) getresuid(&(0x7f0000000180), &(0x7f00000022c0)=0x0, &(0x7f0000002300)) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x2369ae6586049c86, &(0x7f0000002340)={{'fd', 0x3d, r8}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r9}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0xd59}}, {}, {@blksize}, {@default_permissions}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1c00}}, {@allow_other}], [{@fsmagic}, {@smackfshat={'smackfshat', 0x3d, '/dev/fuse\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/}%\''}}, {@pcr={'pcr', 0x3d, 0x2b}}]}}) (async) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, r6, {0x2}}, 0x18) 08:33:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1617.699043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1617.706294] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:27 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async, rerun: 64) select(0x40, &(0x7f0000000140)={0xfc1d, 0x59, 0x0, 0xffffffffffffffff, 0x2, 0x606a, 0xfffffffffffffff8, 0x6}, &(0x7f0000000180)={0x4, 0x5bdd8f6b, 0x401, 0x0, 0x4, 0x7, 0x1, 0x100000000}, &(0x7f00000001c0)={0x9, 0x1, 0x3e67f5e9, 0x1, 0x30000000, 0x118, 0x9, 0x20}, &(0x7f0000000200)={0x77359400}) (rerun: 64) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/configfs', 0x143080, 0x160) keyctl$KEYCTL_WATCH_KEY(0x20, r0, r1, 0x9) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100)=0xffffffffffffffff, 0x4) (async) socket$inet6_udp(0xa, 0x2, 0x0) 08:33:27 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r4, 0x1, 0x0, 0x0, {}, [@GTPA_TID={0xc}]}, 0x20}}, 0x0) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000280)={0x2b, 0x3, 0x0, {0x2, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200088e5}, 0x8000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 08:33:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040800) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='.roup_id=\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:27 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) socket$inet_udplite(0x2, 0x2, 0x88) [ 1617.846763] FAULT_INJECTION: forcing a failure. [ 1617.846763] name failslab, interval 1, probability 0, space 0, times 0 08:33:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = socket$pppl2tp(0x18, 0x1, 0x1) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r4, 0x1, 0x0, 0x0, {}, [@GTPA_TID={0xc}]}, 0x20}}, 0x0) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000280)={0x2b, 0x3, 0x0, {0x2, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) (async) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200088e5}, 0x8000) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 08:33:27 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="110227bd7000fedbdf2502000000080011000000000014002000ff0100000084d376b9f1fdd2d62d1b2b94db00000000010000000000010600020001000000080009000300000006000e00393d000006001d00cb0b0000050014000400000008000c00030000000c5982cd2b0000000000000006001a004e200000"], 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x10) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) [ 1617.919164] CPU: 1 PID: 12278 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1617.927063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1617.936412] Call Trace: [ 1617.938998] dump_stack+0x1b2/0x281 [ 1617.942630] should_fail.cold+0x10a/0x149 [ 1617.946783] should_failslab+0xd6/0x130 [ 1617.950761] kmem_cache_alloc_node+0x263/0x410 [ 1617.955344] __alloc_skb+0x5c/0x510 [ 1617.958970] kobject_uevent_env+0x882/0xf30 [ 1617.963296] device_add+0xa47/0x15c0 [ 1617.967008] ? device_is_dependent+0x2a0/0x2a0 [ 1617.971586] ? kfree+0x1f0/0x250 [ 1617.974951] device_create_groups_vargs+0x1dc/0x250 [ 1617.979963] device_create_vargs+0x3a/0x50 [ 1617.984195] bdi_register_va.part.0+0x35/0x650 [ 1617.988757] bdi_register_va+0x63/0x80 [ 1617.992623] super_setup_bdi_name+0x123/0x220 [ 1617.997103] ? kill_block_super+0xe0/0xe0 [ 1618.001297] ? do_raw_spin_unlock+0x164/0x220 [ 1618.005776] fuse_fill_super+0x937/0x15c0 [ 1618.009901] ? fuse_get_root_inode+0xc0/0xc0 [ 1618.014287] ? up_write+0x17/0x60 [ 1618.017716] ? register_shrinker+0x15f/0x220 [ 1618.022102] ? sget_userns+0x768/0xc10 [ 1618.026143] ? get_anon_bdev+0x1c0/0x1c0 [ 1618.030186] ? sget+0xd9/0x110 [ 1618.033368] ? fuse_get_root_inode+0xc0/0xc0 [ 1618.037755] mount_nodev+0x4c/0xf0 [ 1618.041274] mount_fs+0x92/0x2a0 [ 1618.044623] vfs_kern_mount.part.0+0x5b/0x470 [ 1618.049096] do_mount+0xe65/0x2a30 [ 1618.052616] ? __do_page_fault+0x159/0xad0 [ 1618.056829] ? retint_kernel+0x2d/0x2d [ 1618.060697] ? copy_mount_string+0x40/0x40 [ 1618.064909] ? memset+0x20/0x40 [ 1618.068168] ? copy_mount_options+0x1fa/0x2f0 [ 1618.072640] ? copy_mnt_ns+0xa30/0xa30 [ 1618.076507] SyS_mount+0xa8/0x120 [ 1618.079937] ? copy_mnt_ns+0xa30/0xa30 [ 1618.083808] do_syscall_64+0x1d5/0x640 [ 1618.087690] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1618.092861] RIP: 0033:0x7f2196c8261a [ 1618.096552] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1618.104251] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1618.111510] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 08:33:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 61) 08:33:27 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="110227bd7000fedbdf2502000000080011000000000014002000ff0100000084d376b9f1fdd2d62d1b2b94db00000000010000000000010600020001000000080009000300000006000e00393d000006001d00cb0b0000050014000400000008000c00030000000c5982cd2b0000000000000006001a004e200000"], 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x10) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x8000, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="110227bd7000fedbdf2502000000080011000000000014002000ff0100000084d376b9f1fdd2d62d1b2b94db00000000010000000000010600020001000000080009000300000006000e00393d000006001d00cb0b0000050014000400000008000c00030000000c5982cd2b0000000000000006001a004e200000"], 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) (async) 08:33:27 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040800) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='.roup_id=\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (rerun: 64) 08:33:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r1 = socket$pppl2tp(0x18, 0x1, 0x1) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r4, 0x1, 0x0, 0x0, {}, [@GTPA_TID={0xc}]}, 0x20}}, 0x0) (async) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_NOTIFY_INVAL_ENTRY(r5, &(0x7f0000000280)={0x2b, 0x3, 0x0, {0x2, 0xa, 0x0, '/dev/fuse\x00'}}, 0x2b) (async) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200088e5}, 0x8000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 08:33:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1, 0x9, &(0x7f0000000640)=[{&(0x7f0000000100)="756c68c3b97d697946fd9a21cb8321c1f2", 0x11, 0xff80}, {&(0x7f00000001c0)="d2363c0088556d750e4a5b4e54972f626090", 0x12, 0x3b}, {&(0x7f0000000200)="02e74182e03328be6327db7b15742b6a7cd67584999a201491156f67e7cd9303a2ded65fa7f717a459566fda05973f20e9c116671524cb479f95dc895b267c891890d1ecba8bf5120a3dbec82579d8", 0x4f, 0x80000001}, {&(0x7f0000000280)="c642403f55e9994482df9d98c69f99dbb10a60a6cf11225e1f7a71e4a4a22fd88cff92cc38f5d471fa6d7571f086a6cd1fbd252bc99e2f8c1fe76d3dc0a2444c530e7fd10728b0d5bc243da614a83af51bd7", 0x52, 0xfffffffffffffff9}, {&(0x7f0000000300)="f3280be4d5bacb10679fe0a9028c156166769ec115c78e9408d039222789918dbe439714f3b4e9721593df5eb739b44d447849ab9d3d974341ca5ef6c33fd175e7ee1967a1fee5d3eca4b62c63c35343c66a970c4da31c3efe7f1ffcfaf11cb41315086a1d66b59ae855d0eac6eef5bc54bc8060cf522bd19b34a84f9366b38f706db6c367e6b26b9637f35a80625c22d82582a3b567dc47629c5e894df7711abc191a3ed8d8b04ab980294a204041b89814c2ac1a64e42f18769a270f1df668613199ed1604e0bffaecaf8b51554fccce279536cd70024d6b721b0654eb139e958b209bf8cab3def9029fa6ad4a69e0fb", 0xf1, 0xb3}, {&(0x7f0000000400)="12942d0f73c0396b97f22c8c945ff366f0", 0x11, 0x14e2}, {&(0x7f0000000440)="87eab74d803ef0f927d4b1a0dd7f7c2756d834496c066fffd8976290d3b446cdc306ff", 0x23, 0x8}, {&(0x7f0000000480)="a3a84f2730507a0eb81b0e09f53203545f9c1ae23bba43c7abc73e4ab7cd35f148b1ccbdf514880eab02915eff310488f43a38522fdb2102ac0f4e543f34f257758703819045dfae5a008642952484888340ec00676f07d90c463eb6cfb6f3513a85132233bb70cee5d47cd850deb29d9c4d43fc3bff8cc5cff555b49d17b63c32afe3c0ac7a5396ff442e2bb1fbcdc80929b0916f5a509a0084eeac3b176533e34c617d6c05ded7c798988f6d7be58a501615ae020871a61e7c779a305e", 0xbe, 0x100}, {&(0x7f0000000540)="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", 0xfb}], 0x200880, &(0x7f0000000740)={[{}], [{@fsname={'fsname', 0x3d, '\x7f'}}, {@audit}]}) [ 1618.118756] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1618.126003] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1618.133250] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:27 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, r0) 08:33:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1618.234871] FAULT_INJECTION: forcing a failure. [ 1618.234871] name failslab, interval 1, probability 0, space 0, times 0 [ 1618.267877] CPU: 0 PID: 12322 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1618.275774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) [ 1618.285121] Call Trace: [ 1618.287704] dump_stack+0x1b2/0x281 [ 1618.291333] should_fail.cold+0x10a/0x149 [ 1618.295539] should_failslab+0xd6/0x130 [ 1618.299521] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1618.304621] __kmalloc_node_track_caller+0x38/0x70 [ 1618.309548] __alloc_skb+0x96/0x510 [ 1618.313177] kobject_uevent_env+0x882/0xf30 [ 1618.317501] device_add+0xa47/0x15c0 [ 1618.321218] ? device_is_dependent+0x2a0/0x2a0 [ 1618.325802] ? kfree+0x1f0/0x250 [ 1618.329171] device_create_groups_vargs+0x1dc/0x250 08:33:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r3, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20040800) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='.roup_id=\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x4, 0x2fb0, 0x1, 0x6cf, 0x2, 0x2, 0x8, 0x48}}}, 0x60) [ 1618.334193] device_create_vargs+0x3a/0x50 [ 1618.338433] bdi_register_va.part.0+0x35/0x650 [ 1618.343024] bdi_register_va+0x63/0x80 [ 1618.346915] super_setup_bdi_name+0x123/0x220 [ 1618.351411] ? kill_block_super+0xe0/0xe0 [ 1618.355557] ? do_raw_spin_unlock+0x164/0x220 [ 1618.360059] fuse_fill_super+0x937/0x15c0 [ 1618.364210] ? fuse_get_root_inode+0xc0/0xc0 [ 1618.368622] ? up_write+0x17/0x60 [ 1618.372072] ? register_shrinker+0x15f/0x220 [ 1618.376478] ? sget_userns+0x768/0xc10 [ 1618.380376] ? get_anon_bdev+0x1c0/0x1c0 [ 1618.384434] ? sget+0xd9/0x110 [ 1618.387625] ? fuse_get_root_inode+0xc0/0xc0 [ 1618.392029] mount_nodev+0x4c/0xf0 [ 1618.395563] mount_fs+0x92/0x2a0 [ 1618.398928] vfs_kern_mount.part.0+0x5b/0x470 [ 1618.403423] do_mount+0xe65/0x2a30 [ 1618.406949] ? __do_page_fault+0x159/0xad0 [ 1618.411161] ? retint_kernel+0x2d/0x2d [ 1618.415133] ? copy_mount_string+0x40/0x40 [ 1618.419352] ? memset+0x20/0x40 [ 1618.422613] ? copy_mount_options+0x1fa/0x2f0 [ 1618.427083] ? copy_mnt_ns+0xa30/0xa30 [ 1618.430955] SyS_mount+0xa8/0x120 [ 1618.434388] ? copy_mnt_ns+0xa30/0xa30 [ 1618.438274] do_syscall_64+0x1d5/0x640 [ 1618.442149] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1618.447318] RIP: 0033:0x7f2196c8261a [ 1618.451007] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1618.458690] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1618.466036] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1618.473299] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 62) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x4, 0x2fb0, 0x1, 0x6cf, 0x2, 0x2, 0x8, 0x48}}}, 0x60) 08:33:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) clock_getres(0x4, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:28 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r1) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="110227bd7000fedbdf2502000000080011000000000014002000ff0100000084d376b9f1fdd2d62d1b2b94db00000000010000000000010600020001000000080009000300000006000e00393d000006001d00cb0b0000050014000400000008000c00030000000c5982cd2b0000000000000006001a004e200000"], 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) 08:33:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1618.480548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1618.487792] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1, 0x9, &(0x7f0000000640)=[{&(0x7f0000000100)="756c68c3b97d697946fd9a21cb8321c1f2", 0x11, 0xff80}, {&(0x7f00000001c0)="d2363c0088556d750e4a5b4e54972f626090", 0x12, 0x3b}, {&(0x7f0000000200)="02e74182e03328be6327db7b15742b6a7cd67584999a201491156f67e7cd9303a2ded65fa7f717a459566fda05973f20e9c116671524cb479f95dc895b267c891890d1ecba8bf5120a3dbec82579d8", 0x4f, 0x80000001}, {&(0x7f0000000280)="c642403f55e9994482df9d98c69f99dbb10a60a6cf11225e1f7a71e4a4a22fd88cff92cc38f5d471fa6d7571f086a6cd1fbd252bc99e2f8c1fe76d3dc0a2444c530e7fd10728b0d5bc243da614a83af51bd7", 0x52, 0xfffffffffffffff9}, {&(0x7f0000000300)="f3280be4d5bacb10679fe0a9028c156166769ec115c78e9408d039222789918dbe439714f3b4e9721593df5eb739b44d447849ab9d3d974341ca5ef6c33fd175e7ee1967a1fee5d3eca4b62c63c35343c66a970c4da31c3efe7f1ffcfaf11cb41315086a1d66b59ae855d0eac6eef5bc54bc8060cf522bd19b34a84f9366b38f706db6c367e6b26b9637f35a80625c22d82582a3b567dc47629c5e894df7711abc191a3ed8d8b04ab980294a204041b89814c2ac1a64e42f18769a270f1df668613199ed1604e0bffaecaf8b51554fccce279536cd70024d6b721b0654eb139e958b209bf8cab3def9029fa6ad4a69e0fb", 0xf1, 0xb3}, {&(0x7f0000000400)="12942d0f73c0396b97f22c8c945ff366f0", 0x11, 0x14e2}, {&(0x7f0000000440)="87eab74d803ef0f927d4b1a0dd7f7c2756d834496c066fffd8976290d3b446cdc306ff", 0x23, 0x8}, {&(0x7f0000000480)="a3a84f2730507a0eb81b0e09f53203545f9c1ae23bba43c7abc73e4ab7cd35f148b1ccbdf514880eab02915eff310488f43a38522fdb2102ac0f4e543f34f257758703819045dfae5a008642952484888340ec00676f07d90c463eb6cfb6f3513a85132233bb70cee5d47cd850deb29d9c4d43fc3bff8cc5cff555b49d17b63c32afe3c0ac7a5396ff442e2bb1fbcdc80929b0916f5a509a0084eeac3b176533e34c617d6c05ded7c798988f6d7be58a501615ae020871a61e7c779a305e", 0xbe, 0x100}, {&(0x7f0000000540)="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", 0xfb}], 0x200880, &(0x7f0000000740)={[{}], [{@fsname={'fsname', 0x3d, '\x7f'}}, {@audit}]}) 08:33:28 executing program 2: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x4, 0x2fb0, 0x1, 0x6cf, 0x2, 0x2, 0x8, 0x48}}}, 0x60) 08:33:28 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x2b, 0x800, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) r4 = accept(r2, &(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000003c0)=0x80) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000500), r4) sendmsg$GTP_CMD_GETPDP(r5, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r6, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x1c}}, 0x8000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000400)={'wg2\x00'}) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2001005f", @ANYRES16=r3, @ANYBLOB="11080000000000000000010000000900010073797a3200000000"], 0x20}}, 0x0) r7 = accept$alg(r4, 0x0, 0x0) getsockname(r7, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x80) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRESDEC=r4, @ANYRES16=r0], 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x800) r8 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) keyctl$unlink(0x9, r9, r8) [ 1618.613583] FAULT_INJECTION: forcing a failure. [ 1618.613583] name failslab, interval 1, probability 0, space 0, times 0 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) openat$fuse(0xffffffffffffff9c, &(0x7f0000006380), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r1, &(0x7f00000042c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000006300)={0x50, 0xfffffffffffffff5, r6, {0x7, 0x24, 0x81, 0x40080, 0x7f4, 0x8, 0x2, 0x8}}, 0x50) write$FUSE_DIRENT(r3, &(0x7f0000004180)={0x110, 0x0, r5, [{0x2, 0x0, 0xa, 0x7b1, '/dev/fuse\x00'}, {0x0, 0xee7, 0x4, 0x0, ':*:\\'}, {0x0, 0x200, 0xa, 0x29c, '/dev/fuse\x00'}, {0x2, 0x0, 0xa, 0x5, '/dev/fuse\x00'}, {0x5, 0xfff, 0x2, 0xcb5cbdac, '!!'}, {0x5, 0x1, 0xa, 0x4, '/dev/fuse\x00'}, {0x5, 0x10000, 0x4, 0xff, '$%[]'}]}, 0x110) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f00000000c0)={0x20, 0xfffffffffffffffe, r7, {0x0, 0xe}}, 0xfffffffffffffdd1) [ 1618.655503] CPU: 1 PID: 12381 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1618.663402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1618.672755] Call Trace: [ 1618.675347] dump_stack+0x1b2/0x281 [ 1618.678981] should_fail.cold+0x10a/0x149 [ 1618.683130] should_failslab+0xd6/0x130 [ 1618.687107] kmem_cache_alloc_node+0x263/0x410 [ 1618.691691] __alloc_skb+0x5c/0x510 [ 1618.695318] kobject_uevent_env+0x882/0xf30 [ 1618.699655] device_add+0xa47/0x15c0 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) openat$fuse(0xffffffffffffff9c, &(0x7f0000006380), 0x2, 0x0) (async, rerun: 32) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 32) read$FUSE(r1, &(0x7f00000042c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000006300)={0x50, 0xfffffffffffffff5, r6, {0x7, 0x24, 0x81, 0x40080, 0x7f4, 0x8, 0x2, 0x8}}, 0x50) (async) write$FUSE_DIRENT(r3, &(0x7f0000004180)={0x110, 0x0, r5, [{0x2, 0x0, 0xa, 0x7b1, '/dev/fuse\x00'}, {0x0, 0xee7, 0x4, 0x0, ':*:\\'}, {0x0, 0x200, 0xa, 0x29c, '/dev/fuse\x00'}, {0x2, 0x0, 0xa, 0x5, '/dev/fuse\x00'}, {0x5, 0xfff, 0x2, 0xcb5cbdac, '!!'}, {0x5, 0x1, 0xa, 0x4, '/dev/fuse\x00'}, {0x5, 0x10000, 0x4, 0xff, '$%[]'}]}, 0x110) (async) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f00000000c0)={0x20, 0xfffffffffffffffe, r7, {0x0, 0xe}}, 0xfffffffffffffdd1) 08:33:28 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) (async) r1 = socket(0x2b, 0x800, 0x7) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) (async) r4 = accept(r2, &(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000003c0)=0x80) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) (async) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000500), r4) sendmsg$GTP_CMD_GETPDP(r5, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r6, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x1c}}, 0x8000) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000400)={'wg2\x00'}) (async) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2001005f", @ANYRES16=r3, @ANYBLOB="11080000000000000000010000000900010073797a3200000000"], 0x20}}, 0x0) (async) r7 = accept$alg(r4, 0x0, 0x0) getsockname(r7, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x80) (async) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRESDEC=r4, @ANYRES16=r0], 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x800) r8 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r8) r9 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) (async) keyctl$unlink(0x9, r9, r8) [ 1618.703369] ? device_is_dependent+0x2a0/0x2a0 [ 1618.707954] ? kfree+0x1f0/0x250 [ 1618.711325] device_create_groups_vargs+0x1dc/0x250 [ 1618.716343] device_create_vargs+0x3a/0x50 [ 1618.720583] bdi_register_va.part.0+0x35/0x650 [ 1618.725165] bdi_register_va+0x63/0x80 [ 1618.729049] super_setup_bdi_name+0x123/0x220 [ 1618.733541] ? kill_block_super+0xe0/0xe0 [ 1618.737688] ? do_raw_spin_unlock+0x164/0x220 [ 1618.742187] fuse_fill_super+0x937/0x15c0 [ 1618.746337] ? fuse_get_root_inode+0xc0/0xc0 [ 1618.750744] ? up_write+0x17/0x60 [ 1618.754191] ? register_shrinker+0x15f/0x220 [ 1618.758598] ? sget_userns+0x768/0xc10 [ 1618.762492] ? get_anon_bdev+0x1c0/0x1c0 [ 1618.766550] ? sget+0xd9/0x110 [ 1618.769740] ? fuse_get_root_inode+0xc0/0xc0 [ 1618.774134] mount_nodev+0x4c/0xf0 [ 1618.777653] mount_fs+0x92/0x2a0 [ 1618.780998] vfs_kern_mount.part.0+0x5b/0x470 [ 1618.785472] do_mount+0xe65/0x2a30 [ 1618.788992] ? __do_page_fault+0x159/0xad0 [ 1618.793205] ? retint_kernel+0x2d/0x2d [ 1618.797069] ? copy_mount_string+0x40/0x40 [ 1618.801289] ? memset+0x20/0x40 [ 1618.804553] ? copy_mount_options+0x1fa/0x2f0 [ 1618.809032] ? copy_mnt_ns+0xa30/0xa30 [ 1618.812900] SyS_mount+0xa8/0x120 [ 1618.816332] ? copy_mnt_ns+0xa30/0xa30 [ 1618.820218] do_syscall_64+0x1d5/0x640 [ 1618.824085] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1618.829252] RIP: 0033:0x7f2196c8261a [ 1618.832940] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1618.840625] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1618.847871] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1618.855125] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1618.862378] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1618.869628] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 63) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) openat$fuse(0xffffffffffffff9c, &(0x7f0000006380), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(r1, &(0x7f00000042c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r4, &(0x7f0000006300)={0x50, 0xfffffffffffffff5, r6, {0x7, 0x24, 0x81, 0x40080, 0x7f4, 0x8, 0x2, 0x8}}, 0x50) write$FUSE_DIRENT(r3, &(0x7f0000004180)={0x110, 0x0, r5, [{0x2, 0x0, 0xa, 0x7b1, '/dev/fuse\x00'}, {0x0, 0xee7, 0x4, 0x0, ':*:\\'}, {0x0, 0x200, 0xa, 0x29c, '/dev/fuse\x00'}, {0x2, 0x0, 0xa, 0x5, '/dev/fuse\x00'}, {0x5, 0xfff, 0x2, 0xcb5cbdac, '!!'}, {0x5, 0x1, 0xa, 0x4, '/dev/fuse\x00'}, {0x5, 0x10000, 0x4, 0xff, '$%[]'}]}, 0x110) (async) read$FUSE(r0, &(0x7f0000000100)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f00000000c0)={0x20, 0xfffffffffffffffe, r7, {0x0, 0xe}}, 0xfffffffffffffdd1) 08:33:28 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket(0x2b, 0x800, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000240), 0xffffffffffffffff) (async) r4 = accept(r2, &(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000003c0)=0x80) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r5) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000500), r4) sendmsg$GTP_CMD_GETPDP(r5, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r6, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x1c}}, 0x8000) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000400)={'wg2\x00'}) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="2001005f", @ANYRES16=r3, @ANYBLOB="11080000000000000000010000000900010073797a3200000000"], 0x20}}, 0x0) r7 = accept$alg(r4, 0x0, 0x0) getsockname(r7, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000001c0)=0x80) (async) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRESDEC=r4, @ANYRES16=r0], 0x5c}, 0x1, 0x0, 0x0, 0x4004000}, 0x800) (async) r8 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r8) (async) r9 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r9) keyctl$unlink(0x9, r9, r8) 08:33:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) clock_getres(0x4, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:28 executing program 2: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1, 0x9, &(0x7f0000000640)=[{&(0x7f0000000100)="756c68c3b97d697946fd9a21cb8321c1f2", 0x11, 0xff80}, {&(0x7f00000001c0)="d2363c0088556d750e4a5b4e54972f626090", 0x12, 0x3b}, {&(0x7f0000000200)="02e74182e03328be6327db7b15742b6a7cd67584999a201491156f67e7cd9303a2ded65fa7f717a459566fda05973f20e9c116671524cb479f95dc895b267c891890d1ecba8bf5120a3dbec82579d8", 0x4f, 0x80000001}, {&(0x7f0000000280)="c642403f55e9994482df9d98c69f99dbb10a60a6cf11225e1f7a71e4a4a22fd88cff92cc38f5d471fa6d7571f086a6cd1fbd252bc99e2f8c1fe76d3dc0a2444c530e7fd10728b0d5bc243da614a83af51bd7", 0x52, 0xfffffffffffffff9}, {&(0x7f0000000300)="f3280be4d5bacb10679fe0a9028c156166769ec115c78e9408d039222789918dbe439714f3b4e9721593df5eb739b44d447849ab9d3d974341ca5ef6c33fd175e7ee1967a1fee5d3eca4b62c63c35343c66a970c4da31c3efe7f1ffcfaf11cb41315086a1d66b59ae855d0eac6eef5bc54bc8060cf522bd19b34a84f9366b38f706db6c367e6b26b9637f35a80625c22d82582a3b567dc47629c5e894df7711abc191a3ed8d8b04ab980294a204041b89814c2ac1a64e42f18769a270f1df668613199ed1604e0bffaecaf8b51554fccce279536cd70024d6b721b0654eb139e958b209bf8cab3def9029fa6ad4a69e0fb", 0xf1, 0xb3}, {&(0x7f0000000400)="12942d0f73c0396b97f22c8c945ff366f0", 0x11, 0x14e2}, {&(0x7f0000000440)="87eab74d803ef0f927d4b1a0dd7f7c2756d834496c066fffd8976290d3b446cdc306ff", 0x23, 0x8}, {&(0x7f0000000480)="a3a84f2730507a0eb81b0e09f53203545f9c1ae23bba43c7abc73e4ab7cd35f148b1ccbdf514880eab02915eff310488f43a38522fdb2102ac0f4e543f34f257758703819045dfae5a008642952484888340ec00676f07d90c463eb6cfb6f3513a85132233bb70cee5d47cd850deb29d9c4d43fc3bff8cc5cff555b49d17b63c32afe3c0ac7a5396ff442e2bb1fbcdc80929b0916f5a509a0084eeac3b176533e34c617d6c05ded7c798988f6d7be58a501615ae020871a61e7c779a305e", 0xbe, 0x100}, {&(0x7f0000000540)="787056ab57160dad0c87d80472a437ed3a2f04884e5c40d4955effee355a69b65323ad21f2395e6f99c53747ab9e3a4c81a2d279f825566d165704d51f08554d950e283c853d004444d34ce3454207a3207b0390239be7252b5f4471d4ad4c21e3a755c9cb601934ac8f0ac7944c891d5848ce2a1bef8cf0481f092eed3ba2f1b4e10bc687088d796ba021254119d487a90d50c3c6140b0b73a1eae1eae63b5bab9038a9010a137d5de946d3b63e71b9efede1cf6ef505f1c7a5066aaab2d5e8e196b9bb44aa596b72bc927f36eb7d16883e4fd894de416c3a7ecd909743dbf1878e5b0551085def8bb68701c959b4687a3650e68f008838ffa58e", 0xfb}], 0x200880, &(0x7f0000000740)={[{}], [{@fsname={'fsname', 0x3d, '\x7f'}}, {@audit}]}) 08:33:28 executing program 2: add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1618.985898] FAULT_INJECTION: forcing a failure. [ 1618.985898] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.005927] CPU: 0 PID: 12427 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1619.013814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.023156] Call Trace: [ 1619.025743] dump_stack+0x1b2/0x281 [ 1619.029372] should_fail.cold+0x10a/0x149 [ 1619.033525] should_failslab+0xd6/0x130 [ 1619.037500] kmem_cache_alloc_node_trace+0x25a/0x400 [ 1619.042603] __kmalloc_node_track_caller+0x38/0x70 [ 1619.047532] __alloc_skb+0x96/0x510 [ 1619.051175] kobject_uevent_env+0x882/0xf30 [ 1619.055505] device_add+0xa47/0x15c0 [ 1619.059217] ? device_is_dependent+0x2a0/0x2a0 [ 1619.063794] ? kfree+0x1f0/0x250 [ 1619.067161] device_create_groups_vargs+0x1dc/0x250 [ 1619.072180] device_create_vargs+0x3a/0x50 [ 1619.076419] bdi_register_va.part.0+0x35/0x650 [ 1619.081000] bdi_register_va+0x63/0x80 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000002240)={0x28, 0x2, 0x0, {0x2, 0xd357, 0xffffffffffffffff}}, 0x28) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0, 0x0, r2, {{0x4, 0x0, 0x8001, 0x400, 0x0, 0x8000, {0x4, 0x8001, 0x9, 0x40, 0x9, 0x6a132321, 0x40, 0xfffffffd, 0x7fff, 0x6000, 0x6, r3, 0xee01, 0x7fff, 0x6}}, {0x0, 0x6}}}, 0xa0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000002240)={0x28, 0x2, 0x0, {0x2, 0xd357, 0xffffffffffffffff}}, 0x28) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0, 0x0, r2, {{0x4, 0x0, 0x8001, 0x400, 0x0, 0x8000, {0x4, 0x8001, 0x9, 0x40, 0x9, 0x6a132321, 0x40, 0xfffffffd, 0x7fff, 0x6000, 0x6, r3, 0xee01, 0x7fff, 0x6}}, {0x0, 0x6}}}, 0xa0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000002240)={0x28, 0x2, 0x0, {0x2, 0xd357, 0xffffffffffffffff}}, 0x28) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0, 0x0, r2, {{0x4, 0x0, 0x8001, 0x400, 0x0, 0x8000, {0x4, 0x8001, 0x9, 0x40, 0x9, 0x6a132321, 0x40, 0xfffffffd, 0x7fff, 0x6000, 0x6, r3, 0xee01, 0x7fff, 0x6}}, {0x0, 0x6}}}, 0xa0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) 08:33:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1619.084889] super_setup_bdi_name+0x123/0x220 [ 1619.089385] ? kill_block_super+0xe0/0xe0 [ 1619.093536] ? do_raw_spin_unlock+0x164/0x220 [ 1619.098031] fuse_fill_super+0x937/0x15c0 [ 1619.102181] ? fuse_get_root_inode+0xc0/0xc0 [ 1619.106588] ? up_write+0x17/0x60 [ 1619.110035] ? register_shrinker+0x15f/0x220 [ 1619.114438] ? sget_userns+0x768/0xc10 [ 1619.118329] ? get_anon_bdev+0x1c0/0x1c0 [ 1619.122387] ? sget+0xd9/0x110 [ 1619.125585] ? fuse_get_root_inode+0xc0/0xc0 [ 1619.129995] mount_nodev+0x4c/0xf0 [ 1619.133535] mount_fs+0x92/0x2a0 [ 1619.136899] vfs_kern_mount.part.0+0x5b/0x470 [ 1619.141397] do_mount+0xe65/0x2a30 [ 1619.144938] ? __do_page_fault+0x159/0xad0 [ 1619.149165] ? retint_kernel+0x2d/0x2d [ 1619.153034] ? copy_mount_string+0x40/0x40 [ 1619.157251] ? memset+0x20/0x40 [ 1619.160509] ? copy_mount_options+0x1fa/0x2f0 [ 1619.164980] ? copy_mnt_ns+0xa30/0xa30 [ 1619.168844] SyS_mount+0xa8/0x120 [ 1619.172274] ? copy_mnt_ns+0xa30/0xa30 [ 1619.176148] do_syscall_64+0x1d5/0x640 [ 1619.180018] entry_SYSCALL_64_after_hwframe+0x46/0xbb 08:33:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 64) 08:33:28 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31, 0x35]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000002240)={0x28, 0x2, 0x0, {0x2, 0xd357, 0xffffffffffffffff}}, 0x28) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0, 0x0, r2, {{0x4, 0x0, 0x8001, 0x400, 0x0, 0x8000, {0x4, 0x8001, 0x9, 0x40, 0x9, 0x6a132321, 0x40, 0xfffffffd, 0x7fff, 0x6000, 0x6, r3, 0xee01, 0x7fff, 0x6}}, {0x0, 0x6}}}, 0xa0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000002240)={0x28, 0x2, 0x0, {0x2, 0xd357, 0xffffffffffffffff}}, 0x28) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000040)={0xa0, 0x0, r2, {{0x4, 0x0, 0x8001, 0x400, 0x0, 0x8000, {0x4, 0x8001, 0x9, 0x40, 0x9, 0x6a132321, 0x40, 0xfffffffd, 0x7fff, 0x6000, 0x6, r3, 0xee01, 0x7fff, 0x6}}, {0x0, 0x6}}}, 0xa0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) 08:33:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) clock_getres(0x4, &(0x7f0000000040)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, r0) 08:33:28 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x50481, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}}) [ 1619.185272] RIP: 0033:0x7f2196c8261a [ 1619.188964] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1619.196649] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1619.203909] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1619.211164] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1619.218413] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1619.225660] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:29 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38, 0x31]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, r0) 08:33:29 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, r1}, 0x20) [ 1619.335302] FAULT_INJECTION: forcing a failure. [ 1619.335302] name failslab, interval 1, probability 0, space 0, times 0 [ 1619.347543] CPU: 0 PID: 12482 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1619.355436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.364786] Call Trace: [ 1619.367373] dump_stack+0x1b2/0x281 [ 1619.371008] should_fail.cold+0x10a/0x149 [ 1619.375160] should_failslab+0xd6/0x130 [ 1619.379135] kmem_cache_alloc+0x28e/0x3c0 08:33:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, r0) [ 1619.383288] __d_alloc+0x2a/0xa20 [ 1619.386740] ? d_lookup+0x172/0x220 [ 1619.390370] d_alloc+0x46/0x240 [ 1619.393651] __lookup_hash+0x101/0x270 [ 1619.397540] ? __inode_permission+0xcd/0x2f0 [ 1619.401945] lookup_one_len+0x279/0x3a0 [ 1619.405920] ? lookup_one_len_unlocked+0x410/0x410 [ 1619.410852] start_creating+0xb0/0x200 [ 1619.414740] debugfs_create_dir+0x1f/0x420 [ 1619.418977] bdi_register_va.part.0+0x1ad/0x650 [ 1619.423649] bdi_register_va+0x63/0x80 [ 1619.427536] super_setup_bdi_name+0x123/0x220 08:33:29 executing program 3: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "c5821c4d4b7f0d123cc0c2978921085663deb30584f63cc0038d3dcc0eb5ffffffff0000000100", 0x20000000}, 0x90, 0xfffffffffffffffc) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0x80fb, 0x2}) [ 1619.432029] ? kill_block_super+0xe0/0xe0 [ 1619.436174] ? do_raw_spin_unlock+0x164/0x220 [ 1619.440672] fuse_fill_super+0x937/0x15c0 [ 1619.444821] ? fuse_get_root_inode+0xc0/0xc0 [ 1619.449228] ? up_write+0x17/0x60 [ 1619.452675] ? register_shrinker+0x15f/0x220 [ 1619.457083] ? sget_userns+0x768/0xc10 [ 1619.460977] ? get_anon_bdev+0x1c0/0x1c0 [ 1619.465036] ? sget+0xd9/0x110 [ 1619.468224] ? fuse_get_root_inode+0xc0/0xc0 [ 1619.472628] mount_nodev+0x4c/0xf0 [ 1619.476167] mount_fs+0x92/0x2a0 [ 1619.479536] vfs_kern_mount.part.0+0x5b/0x470 08:33:29 executing program 3: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "c5821c4d4b7f0d123cc0c2978921085663deb30584f63cc0038d3dcc0eb5ffffffff0000000100", 0x20000000}, 0x90, 0xfffffffffffffffc) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) (async) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0x80fb, 0x2}) [ 1619.484029] do_mount+0xe65/0x2a30 [ 1619.487569] ? __do_page_fault+0x159/0xad0 [ 1619.491798] ? retint_kernel+0x2d/0x2d [ 1619.495681] ? copy_mount_string+0x40/0x40 [ 1619.499913] ? memset+0x20/0x40 [ 1619.503187] ? copy_mount_options+0x1fa/0x2f0 [ 1619.508206] ? copy_mnt_ns+0xa30/0xa30 [ 1619.512091] SyS_mount+0xa8/0x120 [ 1619.515537] ? copy_mnt_ns+0xa30/0xa30 [ 1619.519420] do_syscall_64+0x1d5/0x640 [ 1619.523308] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1619.528493] RIP: 0033:0x7f2196c8261a [ 1619.532195] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1619.539899] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1619.547158] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1619.554418] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1619.561682] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1619.568942] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:29 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 65) 08:33:29 executing program 3: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000140)={0x0, "c5821c4d4b7f0d123cc0c2978921085663deb30584f63cc0038d3dcc0eb5ffffffff0000000100", 0x20000000}, 0x90, 0xfffffffffffffffc) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/fb', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) (async) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000000)={0x80fb, 0x2}) 08:33:29 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, r1}, 0x20) 08:33:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000023c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000002400)=r1) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) getresuid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000002200)={0xa0, 0x0, r2, {{0x3, 0x3, 0x5, 0x80000000, 0x1ff, 0x9, {0x1, 0x7, 0x1ff, 0x200, 0x1000, 0x8eef, 0x8, 0x4, 0x8, 0xc000, 0x2, r4, r5, 0x4, 0x8}}, {0x0, 0x10}}}, 0xa0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69601a58cb4c4a208e643d230d49b047cda28842262f01040000000003e0bfab67ef3f8ced23e97d02eba02792f93319e018310035f0f54dbac167a27a7d64ae6b142416c54e448c60f98a5f0acd24b95776d4b4a20e8ad7c9540062c4bc97677689f1002e64c9a8a2d3665a79ea48c000971cab1dbaf780555457", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:29 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f, 0x38]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:29 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x50481, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 08:33:29 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62, 0x7f]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000023c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000002400)=r1) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) getresuid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) (async) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000002200)={0xa0, 0x0, r2, {{0x3, 0x3, 0x5, 0x80000000, 0x1ff, 0x9, {0x1, 0x7, 0x1ff, 0x200, 0x1000, 0x8eef, 0x8, 0x4, 0x8, 0xc000, 0x2, r4, r5, 0x4, 0x8}}, {0x0, 0x10}}}, 0xa0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69601a58cb4c4a208e643d230d49b047cda28842262f01040000000003e0bfab67ef3f8ced23e97d02eba02792f93319e018310035f0f54dbac167a27a7d64ae6b142416c54e448c60f98a5f0acd24b95776d4b4a20e8ad7c9540062c4bc97677689f1002e64c9a8a2d3665a79ea48c000971cab1dbaf780555457", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:29 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x50481, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 08:33:29 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@get={0xe0, 0x13, 0x60a, 0x70bd29, 0x25dfdbfd, {{'morus640-sse2\x00'}, '\x00', '\x00', 0x2400, 0x2000}}, 0xe0}, 0x1, 0x0, 0x0, 0x40890}, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098000200000000ee7eb81ec2f4e978b2000000008d3dcc0fb500", 0x1e}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0x0, r0) 08:33:29 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, r1}, 0x20) [ 1619.710839] FAULT_INJECTION: forcing a failure. [ 1619.710839] name failslab, interval 1, probability 0, space 0, times 0 08:33:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x2, 0x8, 0x0, 'rootmode'}}, 0x29) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1619.757056] CPU: 0 PID: 12535 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1619.764961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1619.774311] Call Trace: [ 1619.776988] dump_stack+0x1b2/0x281 [ 1619.780627] should_fail.cold+0x10a/0x149 [ 1619.784779] should_failslab+0xd6/0x130 [ 1619.788756] kmem_cache_alloc+0x28e/0x3c0 [ 1619.792907] __d_alloc+0x2a/0xa20 [ 1619.796356] ? d_lookup+0x172/0x220 [ 1619.799986] d_alloc+0x46/0x240 [ 1619.803268] __lookup_hash+0x101/0x270 [ 1619.807150] ? __inode_permission+0xcd/0x2f0 [ 1619.811554] lookup_one_len+0x279/0x3a0 [ 1619.815526] ? lookup_one_len_unlocked+0x410/0x410 [ 1619.820459] start_creating+0xb0/0x200 [ 1619.824346] __debugfs_create_file+0x4f/0x440 [ 1619.828838] ? debugfs_create_file+0x37/0x60 [ 1619.833249] bdi_register_va.part.0+0x1f4/0x650 [ 1619.837921] bdi_register_va+0x63/0x80 [ 1619.841805] super_setup_bdi_name+0x123/0x220 [ 1619.846299] ? kill_block_super+0xe0/0xe0 [ 1619.850453] ? do_raw_spin_unlock+0x164/0x220 [ 1619.854959] fuse_fill_super+0x937/0x15c0 [ 1619.859107] ? fuse_get_root_inode+0xc0/0xc0 [ 1619.863513] ? up_write+0x17/0x60 [ 1619.866961] ? register_shrinker+0x15f/0x220 [ 1619.871365] ? sget_userns+0x768/0xc10 [ 1619.875254] ? get_anon_bdev+0x1c0/0x1c0 [ 1619.879308] ? sget+0xd9/0x110 [ 1619.882502] ? fuse_get_root_inode+0xc0/0xc0 [ 1619.886907] mount_nodev+0x4c/0xf0 [ 1619.890452] mount_fs+0x92/0x2a0 [ 1619.893819] vfs_kern_mount.part.0+0x5b/0x470 [ 1619.898313] do_mount+0xe65/0x2a30 [ 1619.901844] ? __do_page_fault+0x159/0xad0 [ 1619.906059] ? retint_kernel+0x2d/0x2d [ 1619.909924] ? copy_mount_string+0x40/0x40 [ 1619.914137] ? memset+0x20/0x40 [ 1619.917395] ? copy_mount_options+0x1fa/0x2f0 [ 1619.921869] ? copy_mnt_ns+0xa30/0xa30 [ 1619.925733] SyS_mount+0xa8/0x120 [ 1619.929163] ? copy_mnt_ns+0xa30/0xa30 [ 1619.933030] do_syscall_64+0x1d5/0x640 [ 1619.936898] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1619.942066] RIP: 0033:0x7f2196c8261a [ 1619.945756] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:29 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 66) 08:33:29 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@get={0xe0, 0x13, 0x60a, 0x70bd29, 0x25dfdbfd, {{'morus640-sse2\x00'}, '\x00', '\x00', 0x2400, 0x2000}}, 0xe0}, 0x1, 0x0, 0x0, 0x40890}, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098000200000000ee7eb81ec2f4e978b2000000008d3dcc0fb500", 0x1e}, 0x48, 0xfffffffffffffffc) (async) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0x0, r0) 08:33:29 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64, 0x62]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000023c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000002400)=r1) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) getresuid(&(0x7f0000000040)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000002200)={0xa0, 0x0, r2, {{0x3, 0x3, 0x5, 0x80000000, 0x1ff, 0x9, {0x1, 0x7, 0x1ff, 0x200, 0x1000, 0x8eef, 0x8, 0x4, 0x8, 0xc000, 0x2, r4, r5, 0x4, 0x8}}, {0x0, 0x10}}}, 0xa0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69601a58cb4c4a208e643d230d49b047cda28842262f01040000000003e0bfab67ef3f8ced23e97d02eba02792f93319e018310035f0f54dbac167a27a7d64ae6b142416c54e448c60f98a5f0acd24b95776d4b4a20e8ad7c9540062c4bc97677689f1002e64c9a8a2d3665a79ea48c000971cab1dbaf780555457", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f00000023c0), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000002400)=r1) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) (async) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r0, &(0x7f0000002200)={0xa0, 0x0, r2, {{0x3, 0x3, 0x5, 0x80000000, 0x1ff, 0x9, {0x1, 0x7, 0x1ff, 0x200, 0x1000, 0x8eef, 0x8, 0x4, 0x8, 0xc000, 0x2, r4, r5, 0x4, 0x8}}, {0x0, 0x10}}}, 0xa0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69601a58cb4c4a208e643d230d49b047cda28842262f01040000000003e0bfab67ef3f8ced23e97d02eba02792f93319e018310035f0f54dbac167a27a7d64ae6b142416c54e448c60f98a5f0acd24b95776d4b4a20e8ad7c9540062c4bc97677689f1002e64c9a8a2d3665a79ea48c000971cab1dbaf780555457", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 08:33:29 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@audit}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) 08:33:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x2, 0x8, 0x0, 'rootmode'}}, 0x29) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1619.953444] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1619.960689] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1619.967935] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1619.975182] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1619.982435] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:29 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33, 0x64]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:29 executing program 3: sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=@get={0xe0, 0x13, 0x60a, 0x70bd29, 0x25dfdbfd, {{'morus640-sse2\x00'}, '\x00', '\x00', 0x2400, 0x2000}}, 0xe0}, 0x1, 0x0, 0x0, 0x40890}, 0x0) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000100)={'fscrypt:', @desc1}, &(0x7f0000000140)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098000200000000ee7eb81ec2f4e978b2000000008d3dcc0fb500", 0x1e}, 0x48, 0xfffffffffffffffc) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r0) keyctl$get_persistent(0x16, 0x0, r0) 08:33:29 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@audit}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@audit}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) (async) 08:33:29 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@audit}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}}) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0x20) 08:33:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:29 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) select(0x40, &(0x7f0000000100)={0xfffffffffffffffc, 0x1, 0x1, 0x8, 0x8001, 0x9, 0x5, 0x8}, &(0x7f0000000140)={0x9, 0x2, 0x6, 0x1, 0xd51, 0x8000, 0x8, 0x1}, &(0x7f0000000180)={0x2, 0x40, 0x8, 0x100000001, 0x5, 0x4, 0xff, 0x7ff}, &(0x7f00000001c0)={0x77359400}) [ 1620.110853] FAULT_INJECTION: forcing a failure. [ 1620.110853] name failslab, interval 1, probability 0, space 0, times 0 [ 1620.179464] CPU: 0 PID: 12581 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1620.187373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1620.196727] Call Trace: [ 1620.199312] dump_stack+0x1b2/0x281 [ 1620.202941] should_fail.cold+0x10a/0x149 [ 1620.207092] should_failslab+0xd6/0x130 [ 1620.211154] kmem_cache_alloc+0x28e/0x3c0 [ 1620.215305] alloc_inode+0xa0/0x170 [ 1620.218929] new_inode+0x1d/0xf0 [ 1620.222293] debugfs_get_inode+0x1a/0x130 [ 1620.226442] __debugfs_create_file+0x93/0x440 [ 1620.230931] ? debugfs_create_file+0x37/0x60 [ 1620.235340] bdi_register_va.part.0+0x1f4/0x650 [ 1620.240018] bdi_register_va+0x63/0x80 [ 1620.243905] super_setup_bdi_name+0x123/0x220 [ 1620.248390] ? kill_block_super+0xe0/0xe0 [ 1620.252517] ? do_raw_spin_unlock+0x164/0x220 [ 1620.256994] fuse_fill_super+0x937/0x15c0 [ 1620.261120] ? fuse_get_root_inode+0xc0/0xc0 [ 1620.265506] ? up_write+0x17/0x60 [ 1620.268935] ? register_shrinker+0x15f/0x220 [ 1620.273320] ? sget_userns+0x768/0xc10 [ 1620.277188] ? get_anon_bdev+0x1c0/0x1c0 [ 1620.281225] ? sget+0xd9/0x110 [ 1620.284394] ? fuse_get_root_inode+0xc0/0xc0 [ 1620.288781] mount_nodev+0x4c/0xf0 [ 1620.292299] mount_fs+0x92/0x2a0 [ 1620.295645] vfs_kern_mount.part.0+0x5b/0x470 [ 1620.300118] do_mount+0xe65/0x2a30 [ 1620.303643] ? __do_page_fault+0x159/0xad0 [ 1620.307857] ? retint_kernel+0x2d/0x2d [ 1620.311721] ? copy_mount_string+0x40/0x40 [ 1620.315932] ? memset+0x20/0x40 [ 1620.319189] ? copy_mount_options+0x1fa/0x2f0 [ 1620.323661] ? copy_mnt_ns+0xa30/0xa30 [ 1620.327526] SyS_mount+0xa8/0x120 [ 1620.330956] ? copy_mnt_ns+0xa30/0xa30 [ 1620.334828] do_syscall_64+0x1d5/0x640 [ 1620.338694] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1620.343967] RIP: 0033:0x7f2196c8261a [ 1620.347657] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1620.355347] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1620.362596] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1620.369847] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:30 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 67) 08:33:30 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x29, 0x3, 0x0, {0x2, 0x8, 0x0, 'rootmode'}}, 0x29) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (rerun: 64) 08:33:30 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35, 0x33]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:30 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) select(0x40, &(0x7f0000000100)={0xfffffffffffffffc, 0x1, 0x1, 0x8, 0x8001, 0x9, 0x5, 0x8}, &(0x7f0000000140)={0x9, 0x2, 0x6, 0x1, 0xd51, 0x8000, 0x8, 0x1}, &(0x7f0000000180)={0x2, 0x40, 0x8, 0x100000001, 0x5, 0x4, 0xff, 0x7ff}, &(0x7f00000001c0)={0x77359400}) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) select(0x40, &(0x7f0000000100)={0xfffffffffffffffc, 0x1, 0x1, 0x8, 0x8001, 0x9, 0x5, 0x8}, &(0x7f0000000140)={0x9, 0x2, 0x6, 0x1, 0xd51, 0x8000, 0x8, 0x1}, &(0x7f0000000180)={0x2, 0x40, 0x8, 0x100000001, 0x5, 0x4, 0xff, 0x7ff}, &(0x7f00000001c0)={0x77359400}) (async) 08:33:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) [ 1620.377099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1620.384344] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:30 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34, 0x0, 0x35]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:30 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:33:30 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) select(0x40, &(0x7f0000000100)={0xfffffffffffffffc, 0x1, 0x1, 0x8, 0x8001, 0x9, 0x5, 0x8}, &(0x7f0000000140)={0x9, 0x2, 0x6, 0x1, 0xd51, 0x8000, 0x8, 0x1}, &(0x7f0000000180)={0x2, 0x40, 0x8, 0x100000001, 0x5, 0x4, 0xff, 0x7ff}, &(0x7f00000001c0)={0x77359400}) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) select(0x40, &(0x7f0000000100)={0xfffffffffffffffc, 0x1, 0x1, 0x8, 0x8001, 0x9, 0x5, 0x8}, &(0x7f0000000140)={0x9, 0x2, 0x6, 0x1, 0xd51, 0x8000, 0x8, 0x1}, &(0x7f0000000180)={0x2, 0x40, 0x8, 0x100000001, 0x5, 0x4, 0xff, 0x7ff}, &(0x7f00000001c0)={0x77359400}) (async) 08:33:30 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1620.502706] FAULT_INJECTION: forcing a failure. [ 1620.502706] name failslab, interval 1, probability 0, space 0, times 0 08:33:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) 08:33:30 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "c5821c4d4b7f2412433f706e3e57cd30451200a433362088aacabd8784edb0d63c68c2978939085663f1b30584f68200ce3a58f4e978b2a93c5b798d3dcc0fb5", 0x400001}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x65, 0x31, 0x38, 0x30, 0x63, 0x4, 0x38, 0x31, 0x65, 0x34, 0x30, 0x39, 0x63, 0x66, 0x34, 0x33]}, &(0x7f0000000180)={0x0, "552b4352e61e86a298c4d9fa81a4682c8a4f3df4b19acb7e273a5f126b9f43c1817cf73614bf6c21b52fab076294d2f379de729b55450dfa2b604062c02c957a", 0x30}, 0x48, r1) [ 1620.585278] CPU: 0 PID: 12640 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1620.593185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1620.602532] Call Trace: [ 1620.605128] dump_stack+0x1b2/0x281 [ 1620.608756] should_fail.cold+0x10a/0x149 [ 1620.612908] should_failslab+0xd6/0x130 [ 1620.616889] kmem_cache_alloc+0x28e/0x3c0 [ 1620.621037] __d_alloc+0x2a/0xa20 [ 1620.624488] ? d_lookup+0x172/0x220 [ 1620.628114] d_alloc+0x46/0x240 [ 1620.631390] __lookup_hash+0x101/0x270 [ 1620.635271] ? __inode_permission+0xcd/0x2f0 [ 1620.639678] lookup_one_len+0x279/0x3a0 [ 1620.643652] ? lookup_one_len_unlocked+0x410/0x410 [ 1620.648585] start_creating+0xb0/0x200 [ 1620.652470] __debugfs_create_file+0x4f/0x440 [ 1620.656963] ? debugfs_create_file+0x37/0x60 [ 1620.661373] bdi_register_va.part.0+0x1f4/0x650 [ 1620.666045] bdi_register_va+0x63/0x80 [ 1620.669932] super_setup_bdi_name+0x123/0x220 [ 1620.674428] ? kill_block_super+0xe0/0xe0 [ 1620.678575] ? do_raw_spin_unlock+0x164/0x220 [ 1620.683076] fuse_fill_super+0x937/0x15c0 [ 1620.687223] ? fuse_get_root_inode+0xc0/0xc0 [ 1620.691628] ? up_write+0x17/0x60 [ 1620.695068] ? register_shrinker+0x15f/0x220 [ 1620.699455] ? sget_userns+0x768/0xc10 [ 1620.703327] ? get_anon_bdev+0x1c0/0x1c0 [ 1620.707365] ? sget+0xd9/0x110 [ 1620.710535] ? fuse_get_root_inode+0xc0/0xc0 [ 1620.714921] mount_nodev+0x4c/0xf0 [ 1620.718438] mount_fs+0x92/0x2a0 [ 1620.721783] vfs_kern_mount.part.0+0x5b/0x470 [ 1620.726257] do_mount+0xe65/0x2a30 [ 1620.729775] ? __do_page_fault+0x159/0xad0 [ 1620.733990] ? retint_kernel+0x2d/0x2d [ 1620.737863] ? copy_mount_string+0x40/0x40 [ 1620.742078] ? memset+0x20/0x40 [ 1620.745333] ? copy_mount_options+0x1fa/0x2f0 [ 1620.749803] ? copy_mnt_ns+0xa30/0xa30 [ 1620.753667] SyS_mount+0xa8/0x120 [ 1620.757096] ? copy_mnt_ns+0xa30/0xa30 [ 1620.760971] do_syscall_64+0x1d5/0x640 [ 1620.764848] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1620.770013] RIP: 0033:0x7f2196c8261a [ 1620.773700] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:30 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 68) [ 1620.781385] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1620.788632] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1620.795877] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1620.803121] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1620.810364] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 [ 1620.908002] FAULT_INJECTION: forcing a failure. [ 1620.908002] name failslab, interval 1, probability 0, space 0, times 0 [ 1620.927692] CPU: 1 PID: 12714 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1620.935583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1620.944929] Call Trace: [ 1620.947515] dump_stack+0x1b2/0x281 [ 1620.951143] should_fail.cold+0x10a/0x149 [ 1620.955291] should_failslab+0xd6/0x130 [ 1620.959261] kmem_cache_alloc+0x28e/0x3c0 [ 1620.963403] ? fuse_kill_sb_anon+0x50/0x50 [ 1620.967634] ? fuse_init_file_inode+0x70/0x70 [ 1620.972123] fuse_alloc_inode+0x1d/0x3f0 [ 1620.976172] ? do_raw_spin_unlock+0x164/0x220 [ 1620.980650] ? fuse_kill_sb_anon+0x50/0x50 [ 1620.984869] alloc_inode+0x5d/0x170 [ 1620.988482] iget5_locked+0x169/0x450 [ 1620.992267] ? trace_hardirqs_on+0x10/0x10 [ 1620.996493] ? fuse_inode_eq+0x70/0x70 [ 1621.000371] fuse_iget+0x1b5/0x790 [ 1621.003898] ? fuse_change_attributes+0x4d0/0x4d0 [ 1621.008719] fuse_get_root_inode+0x99/0xc0 [ 1621.012938] ? fuse_iget+0x790/0x790 [ 1621.016635] ? __local_bh_enable_ip+0xc1/0x170 [ 1621.021208] ? bdi_set_max_ratio+0xe5/0x120 [ 1621.025515] fuse_fill_super+0xc18/0x15c0 [ 1621.029647] ? fuse_get_root_inode+0xc0/0xc0 [ 1621.034036] ? up_write+0x17/0x60 [ 1621.037471] ? register_shrinker+0x15f/0x220 [ 1621.041867] ? sget_userns+0x768/0xc10 [ 1621.045745] ? get_anon_bdev+0x1c0/0x1c0 [ 1621.049786] ? sget+0xd9/0x110 [ 1621.052955] ? fuse_get_root_inode+0xc0/0xc0 [ 1621.057343] mount_nodev+0x4c/0xf0 [ 1621.060872] mount_fs+0x92/0x2a0 [ 1621.064226] vfs_kern_mount.part.0+0x5b/0x470 [ 1621.068701] do_mount+0xe65/0x2a30 [ 1621.072232] ? __do_page_fault+0x159/0xad0 [ 1621.076447] ? retint_kernel+0x2d/0x2d [ 1621.080324] ? copy_mount_string+0x40/0x40 [ 1621.084549] ? memset+0x20/0x40 [ 1621.087806] ? copy_mount_options+0x1fa/0x2f0 [ 1621.092280] ? copy_mnt_ns+0xa30/0xa30 [ 1621.096147] SyS_mount+0xa8/0x120 [ 1621.099587] ? copy_mnt_ns+0xa30/0xa30 [ 1621.103461] do_syscall_64+0x1d5/0x640 [ 1621.107331] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1621.112498] RIP: 0033:0x7f2196c8261a [ 1621.116191] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1621.123901] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1621.131157] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1621.138405] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1621.145654] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1621.152903] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004540)=ANY=[@ANYBLOB="25f9a5b61eaa39c06ce7786c04e31c4ca9c444fbd7aedbec2499aec0400c1e284a43d7913cef82ca8ed458166235045f5c44d3603ab1a23bf800d4cb12e13bd3681cbb01a58800483e876dc86a2e921a3bba12905d4a2c2d78fd5242797e6ae120c5bb72683a90e2a183947e273b3bb9c88d29be2f510034bf705a7d634e3fc8ab444509859b50ca3b5b019d621498c341ec974830a36c6ad09b898a7ad3ec4654106d0a7a52fa636d744234f8e7d30113734abde8489d0c386d3adb927fd9c6d430582f299956f46594f65806290065699d1d85d622bfe0de16c77b100f3128c3acc2692939f77d036f7adcefb1186b1746", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686172682c657569643d0d0638d70364f346b1b6710e1a99f611313dc20bd87d516b26af952ff0dac27bcf3c1d30d6b5196bb7aba65e5a9c0219c2b2a6c9a93aa6bd72b7596ef2c3bfd1b92d2cc9f264edbd644dd6d42d2243b28b01f4c34ce82f97e4c51a89ee3be1596d4c6857839c0dfd768a8dd952085cf7e4fb995d499a65c2352212f7756c090ae45ed1a34ea1b92b7660aad52557c7a516cb517ce6380b4aa6e472d4a4224226cf653ab1e0c4f5d7ed426c6ea8", @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) getresuid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) read$FUSE(r0, &(0x7f00000022c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pipe2$watch_queue(&(0x7f0000004300), 0x80) write$FUSE_ATTR(r3, &(0x7f0000000200)={0x78, 0x0, r5, {0x1, 0xfffffffa, 0x0, {0x4, 0x200, 0xc0c, 0x1, 0x6, 0x3, 0xb3, 0x9, 0x40, 0x1000, 0x3, r6, r7, 0xcd, 0xfff}}}, 0x78) 08:33:31 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "c5821c4d4b7f2412433f706e3e57cd30451200a433362088aacabd8784edb0d63c68c2978939085663f1b30584f68200ce3a58f4e978b2a93c5b798d3dcc0fb5", 0x400001}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x65, 0x31, 0x38, 0x30, 0x63, 0x4, 0x38, 0x31, 0x65, 0x34, 0x30, 0x39, 0x63, 0x66, 0x34, 0x33]}, &(0x7f0000000180)={0x0, "552b4352e61e86a298c4d9fa81a4682c8a4f3df4b19acb7e273a5f126b9f43c1817cf73614bf6c21b52fab076294d2f379de729b55450dfa2b604062c02c957a", 0x30}, 0x48, r1) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = getegid() write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000068c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB="cebe7a22c51b1ba4055bb504e6071b8340d9385876c6cc11a18d23166bc82e"]) read$FUSE(r0, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000006400)={0x3e0, 0x0, r2, [{{0x0, 0x1, 0x6, 0x5, 0xdf9b, 0x8, {0x0, 0x3f, 0x2, 0x8000, 0x2, 0x8000000000, 0x0, 0x1000, 0x1000, 0xa000, 0x8, 0xee00, r3, 0xcc, 0x101}}, {0x0, 0x9, 0xa, 0x8000, '/dev/fuse\x00'}}, {{0x5, 0x0, 0xfff, 0x80000000, 0x101, 0x7b680, {0x3, 0x88e, 0x1, 0x6, 0x3, 0x1, 0x7, 0x1, 0x7, 0xc000, 0x3, r5, r7, 0x7, 0x2}}, {0x4, 0x80, 0x1, 0x10, '$'}}, {{0x5, 0x2, 0x100000001, 0x9a, 0x4, 0x80000000, {0x3, 0x6e7c, 0x0, 0x1000, 0x97, 0x800, 0x7, 0xfffffc01, 0x3f, 0x8000, 0x3, r8, r10, 0x7, 0x4}}, {0x2, 0x9ae, 0xa, 0x8, '/dev/fuse\x00'}}, {{0x5, 0x2, 0x5, 0x1, 0xfff, 0xff, {0x3, 0x1, 0xce, 0x5, 0x3, 0x6, 0x9, 0x2, 0x80000000, 0x4000, 0xffff, 0xee00, 0xee00, 0x3, 0x2}}, {0x5, 0xffffffffffff0000, 0xa, 0x7, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x7, 0x9, 0x80, 0x7f, {0x1, 0x6, 0x800, 0xfffffffffffffffd, 0x4, 0x9, 0x8001, 0x400, 0x1, 0xc000, 0x43a, 0x0, 0x0, 0x8, 0x3}}, {0x1, 0x6, 0x0, 0x1f}}, {{0x1, 0x0, 0x9, 0x7, 0xc, 0x100, {0x3, 0x1, 0x3, 0x0, 0x4, 0x800, 0x8000, 0xffff, 0xffff9712, 0xc000, 0x3ff, 0x0, 0xffffffffffffffff, 0x6, 0x9}}, {0x0, 0x101, 0x3, 0x53, '!:\x00'}}]}, 0x3e0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000006800)={0xa0, 0x0, r4, {{0x4, 0x2, 0x2, 0x6, 0x3f, 0x1000, {0x4, 0xf7db, 0x3, 0x0, 0x9, 0x0, 0x80000000, 0x80, 0x3, 0xa000, 0xc6fc, 0xffffffffffffffff, 0x0, 0x66, 0x3}}, {0x0, 0x1c}}}, 0xa0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="070088b130db88b8c3edabfc02147a2631f709bf591a0c391f0012c51a94beae9d89f04fe310f73bfdaef8b682ded08fbf18ff389661556387b9656e67e66ac6d62706222fe54de94d1ab812b9019ffb42c5788dce334a69f8"]) 08:33:31 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 08:33:31 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 69) 08:33:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x15) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:31 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "c5821c4d4b7f2412433f706e3e57cd30451200a433362088aacabd8784edb0d63c68c2978939085663f1b30584f68200ce3a58f4e978b2a93c5b798d3dcc0fb5", 0x400001}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x65, 0x31, 0x38, 0x30, 0x63, 0x4, 0x38, 0x31, 0x65, 0x34, 0x30, 0x39, 0x63, 0x66, 0x34, 0x33]}, &(0x7f0000000180)={0x0, "552b4352e61e86a298c4d9fa81a4682c8a4f3df4b19acb7e273a5f126b9f43c1817cf73614bf6c21b52fab076294d2f379de729b55450dfa2b604062c02c957a", 0x30}, 0x48, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "c5821c4d4b7f2412433f706e3e57cd30451200a433362088aacabd8784edb0d63c68c2978939085663f1b30584f68200ce3a58f4e978b2a93c5b798d3dcc0fb5", 0x400001}, 0x48, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x65, 0x31, 0x38, 0x30, 0x63, 0x4, 0x38, 0x31, 0x65, 0x34, 0x30, 0x39, 0x63, 0x66, 0x34, 0x33]}, &(0x7f0000000180)={0x0, "552b4352e61e86a298c4d9fa81a4682c8a4f3df4b19acb7e273a5f126b9f43c1817cf73614bf6c21b52fab076294d2f379de729b55450dfa2b604062c02c957a", 0x30}, 0x48, r1) (async) 08:33:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004540)=ANY=[@ANYBLOB="25f9a5b61eaa39c06ce7786c04e31c4ca9c444fbd7aedbec2499aec0400c1e284a43d7913cef82ca8ed458166235045f5c44d3603ab1a23bf800d4cb12e13bd3681cbb01a58800483e876dc86a2e921a3bba12905d4a2c2d78fd5242797e6ae120c5bb72683a90e2a183947e273b3bb9c88d29be2f510034bf705a7d634e3fc8ab444509859b50ca3b5b019d621498c341ec974830a36c6ad09b898a7ad3ec4654106d0a7a52fa636d744234f8e7d30113734abde8489d0c386d3adb927fd9c6d430582f299956f46594f65806290065699d1d85d622bfe0de16c77b100f3128c3acc2692939f77d036f7adcefb1186b1746", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686172682c657569643d0d0638d70364f346b1b6710e1a99f611313dc20bd87d516b26af952ff0dac27bcf3c1d30d6b5196bb7aba65e5a9c0219c2b2a6c9a93aa6bd72b7596ef2c3bfd1b92d2cc9f264edbd644dd6d42d2243b28b01f4c34ce82f97e4c51a89ee3be1596d4c6857839c0dfd768a8dd952085cf7e4fb995d499a65c2352212f7756c090ae45ed1a34ea1b92b7660aad52557c7a516cb517ce6380b4aa6e472d4a4224226cf653ab1e0c4f5d7ed426c6ea8", @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) getresuid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) (async) read$FUSE(r0, &(0x7f00000022c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pipe2$watch_queue(&(0x7f0000004300), 0x80) (async) write$FUSE_ATTR(r3, &(0x7f0000000200)={0x78, 0x0, r5, {0x1, 0xfffffffa, 0x0, {0x4, 0x200, 0xc0c, 0x1, 0x6, 0x3, 0xb3, 0x9, 0x40, 0x1000, 0x3, r6, r7, 0xcd, 0xfff}}}, 0x78) 08:33:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = getegid() write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000068c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB="cebe7a22c51b1ba4055bb504e6071b8340d9385876c6cc11a18d23166bc82e"]) read$FUSE(r0, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000006400)={0x3e0, 0x0, r2, [{{0x0, 0x1, 0x6, 0x5, 0xdf9b, 0x8, {0x0, 0x3f, 0x2, 0x8000, 0x2, 0x8000000000, 0x0, 0x1000, 0x1000, 0xa000, 0x8, 0xee00, r3, 0xcc, 0x101}}, {0x0, 0x9, 0xa, 0x8000, '/dev/fuse\x00'}}, {{0x5, 0x0, 0xfff, 0x80000000, 0x101, 0x7b680, {0x3, 0x88e, 0x1, 0x6, 0x3, 0x1, 0x7, 0x1, 0x7, 0xc000, 0x3, r5, r7, 0x7, 0x2}}, {0x4, 0x80, 0x1, 0x10, '$'}}, {{0x5, 0x2, 0x100000001, 0x9a, 0x4, 0x80000000, {0x3, 0x6e7c, 0x0, 0x1000, 0x97, 0x800, 0x7, 0xfffffc01, 0x3f, 0x8000, 0x3, r8, r10, 0x7, 0x4}}, {0x2, 0x9ae, 0xa, 0x8, '/dev/fuse\x00'}}, {{0x5, 0x2, 0x5, 0x1, 0xfff, 0xff, {0x3, 0x1, 0xce, 0x5, 0x3, 0x6, 0x9, 0x2, 0x80000000, 0x4000, 0xffff, 0xee00, 0xee00, 0x3, 0x2}}, {0x5, 0xffffffffffff0000, 0xa, 0x7, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x7, 0x9, 0x80, 0x7f, {0x1, 0x6, 0x800, 0xfffffffffffffffd, 0x4, 0x9, 0x8001, 0x400, 0x1, 0xc000, 0x43a, 0x0, 0x0, 0x8, 0x3}}, {0x1, 0x6, 0x0, 0x1f}}, {{0x1, 0x0, 0x9, 0x7, 0xc, 0x100, {0x3, 0x1, 0x3, 0x0, 0x4, 0x800, 0x8000, 0xffff, 0xffff9712, 0xc000, 0x3ff, 0x0, 0xffffffffffffffff, 0x6, 0x9}}, {0x0, 0x101, 0x3, 0x53, '!:\x00'}}]}, 0x3e0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000006800)={0xa0, 0x0, r4, {{0x4, 0x2, 0x2, 0x6, 0x3f, 0x1000, {0x4, 0xf7db, 0x3, 0x0, 0x9, 0x0, 0x80000000, 0x80, 0x3, 0xa000, 0xc6fc, 0xffffffffffffffff, 0x0, 0x66, 0x3}}, {0x0, 0x1c}}}, 0xa0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="070088b130db88b8c3edabfc02147a2631f709bf591a0c391f0012c51a94beae9d89f04fe310f73bfdaef8b682ded08fbf18ff389661556387b9656e67e66ac6d62706222fe54de94d1ab812b9019ffb42c5788dce334a69f8"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002380)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000068c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB="cebe7a22c51b1ba4055bb504e6071b8340d9385876c6cc11a18d23166bc82e"]) (async) read$FUSE(r0, &(0x7f00000043c0)={0x2020}, 0x2020) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f0000006400)={0x3e0, 0x0, r2, [{{0x0, 0x1, 0x6, 0x5, 0xdf9b, 0x8, {0x0, 0x3f, 0x2, 0x8000, 0x2, 0x8000000000, 0x0, 0x1000, 0x1000, 0xa000, 0x8, 0xee00, r3, 0xcc, 0x101}}, {0x0, 0x9, 0xa, 0x8000, '/dev/fuse\x00'}}, {{0x5, 0x0, 0xfff, 0x80000000, 0x101, 0x7b680, {0x3, 0x88e, 0x1, 0x6, 0x3, 0x1, 0x7, 0x1, 0x7, 0xc000, 0x3, r5, r7, 0x7, 0x2}}, {0x4, 0x80, 0x1, 0x10, '$'}}, {{0x5, 0x2, 0x100000001, 0x9a, 0x4, 0x80000000, {0x3, 0x6e7c, 0x0, 0x1000, 0x97, 0x800, 0x7, 0xfffffc01, 0x3f, 0x8000, 0x3, r8, r10, 0x7, 0x4}}, {0x2, 0x9ae, 0xa, 0x8, '/dev/fuse\x00'}}, {{0x5, 0x2, 0x5, 0x1, 0xfff, 0xff, {0x3, 0x1, 0xce, 0x5, 0x3, 0x6, 0x9, 0x2, 0x80000000, 0x4000, 0xffff, 0xee00, 0xee00, 0x3, 0x2}}, {0x5, 0xffffffffffff0000, 0xa, 0x7, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x7, 0x9, 0x80, 0x7f, {0x1, 0x6, 0x800, 0xfffffffffffffffd, 0x4, 0x9, 0x8001, 0x400, 0x1, 0xc000, 0x43a, 0x0, 0x0, 0x8, 0x3}}, {0x1, 0x6, 0x0, 0x1f}}, {{0x1, 0x0, 0x9, 0x7, 0xc, 0x100, {0x3, 0x1, 0x3, 0x0, 0x4, 0x800, 0x8000, 0xffff, 0xffff9712, 0xc000, 0x3ff, 0x0, 0xffffffffffffffff, 0x6, 0x9}}, {0x0, 0x101, 0x3, 0x53, '!:\x00'}}]}, 0x3e0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_CREATE_OPEN(r0, &(0x7f0000006800)={0xa0, 0x0, r4, {{0x4, 0x2, 0x2, 0x6, 0x3f, 0x1000, {0x4, 0xf7db, 0x3, 0x0, 0x9, 0x0, 0x80000000, 0x80, 0x3, 0xa000, 0xc6fc, 0xffffffffffffffff, 0x0, 0x66, 0x3}}, {0x0, 0x1c}}}, 0xa0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="070088b130db88b8c3edabfc02147a2631f709bf591a0c391f0012c51a94beae9d89f04fe310f73bfdaef8b682ded08fbf18ff389661556387b9656e67e66ac6d62706222fe54de94d1ab812b9019ffb42c5788dce334a69f8"]) (async) [ 1621.392539] FAULT_INJECTION: forcing a failure. [ 1621.392539] name failslab, interval 1, probability 0, space 0, times 0 [ 1621.436519] CPU: 1 PID: 12801 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1621.444424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.453775] Call Trace: [ 1621.456366] dump_stack+0x1b2/0x281 [ 1621.460003] should_fail.cold+0x10a/0x149 [ 1621.464159] should_failslab+0xd6/0x130 [ 1621.468135] kmem_cache_alloc+0x28e/0x3c0 [ 1621.472284] ? fuse_kill_sb_anon+0x50/0x50 [ 1621.476519] ? fuse_init_file_inode+0x70/0x70 [ 1621.481016] fuse_alloc_inode+0x1d/0x3f0 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x35]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x0, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1621.485075] ? do_raw_spin_unlock+0x164/0x220 [ 1621.489572] ? fuse_kill_sb_anon+0x50/0x50 [ 1621.493807] alloc_inode+0x5d/0x170 [ 1621.497435] iget5_locked+0x169/0x450 [ 1621.501231] ? trace_hardirqs_on+0x10/0x10 [ 1621.505463] ? fuse_inode_eq+0x70/0x70 [ 1621.509346] fuse_iget+0x1b5/0x790 [ 1621.512885] ? fuse_change_attributes+0x4d0/0x4d0 [ 1621.517725] fuse_get_root_inode+0x99/0xc0 [ 1621.521961] ? fuse_iget+0x790/0x790 [ 1621.525677] ? __local_bh_enable_ip+0xc1/0x170 [ 1621.530258] ? bdi_set_max_ratio+0xe5/0x120 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x0, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1621.534580] fuse_fill_super+0xc18/0x15c0 [ 1621.538727] ? fuse_get_root_inode+0xc0/0xc0 [ 1621.543135] ? up_write+0x17/0x60 [ 1621.546585] ? register_shrinker+0x15f/0x220 [ 1621.550998] ? sget_userns+0x768/0xc10 [ 1621.554899] ? get_anon_bdev+0x1c0/0x1c0 [ 1621.558954] ? sget+0xd9/0x110 [ 1621.562144] ? fuse_get_root_inode+0xc0/0xc0 [ 1621.566553] mount_nodev+0x4c/0xf0 [ 1621.570091] mount_fs+0x92/0x2a0 [ 1621.573455] vfs_kern_mount.part.0+0x5b/0x470 [ 1621.577947] do_mount+0xe65/0x2a30 [ 1621.581486] ? __do_page_fault+0x159/0xad0 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x38, 0x0, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x0, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1621.585714] ? retint_kernel+0x2d/0x2d [ 1621.589599] ? copy_mount_string+0x40/0x40 [ 1621.593833] ? memset+0x20/0x40 [ 1621.597111] ? copy_mount_options+0x1fa/0x2f0 [ 1621.601601] ? copy_mnt_ns+0xa30/0xa30 [ 1621.605482] SyS_mount+0xa8/0x120 [ 1621.608926] ? copy_mnt_ns+0xa30/0xa30 [ 1621.612809] do_syscall_64+0x1d5/0x640 [ 1621.616699] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1621.621878] RIP: 0033:0x7f2196c8261a [ 1621.625580] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x0, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1621.633279] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1621.640544] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1621.647804] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1621.655065] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1621.662327] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:31 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 70) 08:33:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x15) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) 08:33:31 executing program 3: socket$alg(0x26, 0x5, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffb) 08:33:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002380)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r7 = getegid() write$FUSE_OPEN(r6, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000068c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB="cebe7a22c51b1ba4055bb504e6071b8340d9385876c6cc11a18d23166bc82e"]) read$FUSE(r0, &(0x7f00000043c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000006400)={0x3e0, 0x0, r2, [{{0x0, 0x1, 0x6, 0x5, 0xdf9b, 0x8, {0x0, 0x3f, 0x2, 0x8000, 0x2, 0x8000000000, 0x0, 0x1000, 0x1000, 0xa000, 0x8, 0xee00, r3, 0xcc, 0x101}}, {0x0, 0x9, 0xa, 0x8000, '/dev/fuse\x00'}}, {{0x5, 0x0, 0xfff, 0x80000000, 0x101, 0x7b680, {0x3, 0x88e, 0x1, 0x6, 0x3, 0x1, 0x7, 0x1, 0x7, 0xc000, 0x3, r5, r7, 0x7, 0x2}}, {0x4, 0x80, 0x1, 0x10, '$'}}, {{0x5, 0x2, 0x100000001, 0x9a, 0x4, 0x80000000, {0x3, 0x6e7c, 0x0, 0x1000, 0x97, 0x800, 0x7, 0xfffffc01, 0x3f, 0x8000, 0x3, r8, r10, 0x7, 0x4}}, {0x2, 0x9ae, 0xa, 0x8, '/dev/fuse\x00'}}, {{0x5, 0x2, 0x5, 0x1, 0xfff, 0xff, {0x3, 0x1, 0xce, 0x5, 0x3, 0x6, 0x9, 0x2, 0x80000000, 0x4000, 0xffff, 0xee00, 0xee00, 0x3, 0x2}}, {0x5, 0xffffffffffff0000, 0xa, 0x7, '/dev/fuse\x00'}}, {{0x4, 0x1, 0x7, 0x9, 0x80, 0x7f, {0x1, 0x6, 0x800, 0xfffffffffffffffd, 0x4, 0x9, 0x8001, 0x400, 0x1, 0xc000, 0x43a, 0x0, 0x0, 0x8, 0x3}}, {0x1, 0x6, 0x0, 0x1f}}, {{0x1, 0x0, 0x9, 0x7, 0xc, 0x100, {0x3, 0x1, 0x3, 0x0, 0x4, 0x800, 0x8000, 0xffff, 0xffff9712, 0xc000, 0x3ff, 0x0, 0xffffffffffffffff, 0x6, 0x9}}, {0x0, 0x101, 0x3, 0x53, '!:\x00'}}]}, 0x3e0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r11 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000006800)={0xa0, 0x0, r4, {{0x4, 0x2, 0x2, 0x6, 0x3f, 0x1000, {0x4, 0xf7db, 0x3, 0x0, 0x9, 0x0, 0x80000000, 0x80, 0x3, 0xa000, 0xc6fc, 0xffffffffffffffff, 0x0, 0x66, 0x3}}, {0x0, 0x1c}}}, 0xa0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r11, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="070088b130db88b8c3edabfc02147a2631f709bf591a0c391f0012c51a94beae9d89f04fe310f73bfdaef8b682ded08fbf18ff389661556387b9656e67e66ac6d62706222fe54de94d1ab812b9019ffb42c5788dce334a69f8"]) 08:33:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004540)=ANY=[@ANYBLOB="25f9a5b61eaa39c06ce7786c04e31c4ca9c444fbd7aedbec2499aec0400c1e284a43d7913cef82ca8ed458166235045f5c44d3603ab1a23bf800d4cb12e13bd3681cbb01a58800483e876dc86a2e921a3bba12905d4a2c2d78fd5242797e6ae120c5bb72683a90e2a183947e273b3bb9c88d29be2f510034bf705a7d634e3fc8ab444509859b50ca3b5b019d621498c341ec974830a36c6ad09b898a7ad3ec4654106d0a7a52fa636d744234f8e7d30113734abde8489d0c386d3adb927fd9c6d430582f299956f46594f65806290065699d1d85d622bfe0de16c77b100f3128c3acc2692939f77d036f7adcefb1186b1746", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686172682c657569643d0d0638d70364f346b1b6710e1a99f611313dc20bd87d516b26af952ff0dac27bcf3c1d30d6b5196bb7aba65e5a9c0219c2b2a6c9a93aa6bd72b7596ef2c3bfd1b92d2cc9f264edbd644dd6d42d2243b28b01f4c34ce82f97e4c51a89ee3be1596d4c6857839c0dfd768a8dd952085cf7e4fb995d499a65c2352212f7756c090ae45ed1a34ea1b92b7660aad52557c7a516cb517ce6380b4aa6e472d4a4224226cf653ab1e0c4f5d7ed426c6ea8", @ANYRESDEC=r1, @ANYBLOB=',\x00']) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) getresuid(&(0x7f0000000040), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) read$FUSE(r0, &(0x7f00000022c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pipe2$watch_queue(&(0x7f0000004300), 0x80) write$FUSE_ATTR(r3, &(0x7f0000000200)={0x78, 0x0, r5, {0x1, 0xfffffffa, 0x0, {0x4, 0x200, 0xc0c, 0x1, 0x6, 0x3, 0xb3, 0x9, 0x40, 0x1000, 0x3, r6, r7, 0xcd, 0xfff}}}, 0x78) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000280)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000004540)=ANY=[@ANYBLOB="25f9a5b61eaa39c06ce7786c04e31c4ca9c444fbd7aedbec2499aec0400c1e284a43d7913cef82ca8ed458166235045f5c44d3603ab1a23bf800d4cb12e13bd3681cbb01a58800483e876dc86a2e921a3bba12905d4a2c2d78fd5242797e6ae120c5bb72683a90e2a183947e273b3bb9c88d29be2f510034bf705a7d634e3fc8ab444509859b50ca3b5b019d621498c341ec974830a36c6ad09b898a7ad3ec4654106d0a7a52fa636d744234f8e7d30113734abde8489d0c386d3adb927fd9c6d430582f299956f46594f65806290065699d1d85d622bfe0de16c77b100f3128c3acc2692939f77d036f7adcefb1186b1746", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c646f6e745f686172682c657569643d0d0638d70364f346b1b6710e1a99f611313dc20bd87d516b26af952ff0dac27bcf3c1d30d6b5196bb7aba65e5a9c0219c2b2a6c9a93aa6bd72b7596ef2c3bfd1b92d2cc9f264edbd644dd6d42d2243b28b01f4c34ce82f97e4c51a89ee3be1596d4c6857839c0dfd768a8dd952085cf7e4fb995d499a65c2352212f7756c090ae45ed1a34ea1b92b7660aad52557c7a516cb517ce6380b4aa6e472d4a4224226cf653ab1e0c4f5d7ed426c6ea8", @ANYRESDEC=r1, @ANYBLOB=',\x00']) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000040)=r2) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_STATFS(r4, &(0x7f0000002080)={0x60, 0x0, r5}, 0x60) (async) getresuid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) (async) read$FUSE(r0, &(0x7f00000022c0)={0x2020}, 0x2020) (async) pipe2$watch_queue(&(0x7f0000004300), 0x80) (async) write$FUSE_ATTR(r3, &(0x7f0000000200)={0x78, 0x0, r5, {0x1, 0xfffffffa, 0x0, {0x4, 0x200, 0xc0c, 0x1, 0x6, 0x3, 0xb3, 0x9, 0x40, 0x1000, 0x3, r6, r7, 0xcd, 0xfff}}}, 0x78) (async) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x39, 0x0, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r1, 0x5760, 0x15) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) 08:33:31 executing program 3: socket$alg(0x26, 0x5, 0x0) (async) socket$nl_crypto(0x10, 0x3, 0x15) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffb) 08:33:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="66643d8cf0f83e31e7c5b988ea9efdfd49d03d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1621.812528] FAULT_INJECTION: forcing a failure. [ 1621.812528] name failslab, interval 1, probability 0, space 0, times 0 [ 1621.864326] CPU: 0 PID: 12869 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1621.872237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1621.881588] Call Trace: [ 1621.884173] dump_stack+0x1b2/0x281 [ 1621.887811] should_fail.cold+0x10a/0x149 [ 1621.891958] should_failslab+0xd6/0x130 [ 1621.895930] kmem_cache_alloc+0x28e/0x3c0 [ 1621.900076] __d_alloc+0x2a/0xa20 [ 1621.903569] d_make_root+0x3e/0xc0 [ 1621.907119] fuse_fill_super+0xc49/0x15c0 [ 1621.911271] ? fuse_get_root_inode+0xc0/0xc0 [ 1621.915676] ? up_write+0x17/0x60 [ 1621.919124] ? register_shrinker+0x15f/0x220 [ 1621.923533] ? sget_userns+0x768/0xc10 [ 1621.927425] ? get_anon_bdev+0x1c0/0x1c0 [ 1621.931484] ? sget+0xd9/0x110 [ 1621.934679] ? fuse_get_root_inode+0xc0/0xc0 [ 1621.939088] mount_nodev+0x4c/0xf0 [ 1621.942624] mount_fs+0x92/0x2a0 [ 1621.946029] vfs_kern_mount.part.0+0x5b/0x470 [ 1621.950526] do_mount+0xe65/0x2a30 [ 1621.954065] ? __do_page_fault+0x159/0xad0 [ 1621.958297] ? retint_kernel+0x2d/0x2d 08:33:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) getresuid(&(0x7f0000000100), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x201020, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00632662365673766345176,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_d=\x00', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,default_permissions,max_read=0x0000000000000003,max_read=0x0000000000000047,allow_other,max_read=0x000000003b21dd64,blksize=0x0000000000000000,default_permissions,allow_other,smackfsroot=user_id,\x00']) 08:33:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) getresuid(&(0x7f0000002180)=0x0, &(0x7f00000021c0), &(0x7f0000002200)) syz_mount_image$fuse(&(0x7f00000020c0), &(0x7f0000002100)='./file0\x00', 0x0, 0x0, 0x0, 0x2001040, &(0x7f0000002240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/fuse\x00'}}]}}) [ 1621.962185] ? copy_mount_string+0x40/0x40 [ 1621.966423] ? memset+0x20/0x40 [ 1621.969703] ? copy_mount_options+0x1fa/0x2f0 [ 1621.974194] ? copy_mnt_ns+0xa30/0xa30 [ 1621.978086] SyS_mount+0xa8/0x120 [ 1621.981534] ? copy_mnt_ns+0xa30/0xa30 [ 1621.985418] do_syscall_64+0x1d5/0x640 [ 1621.989306] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1621.994489] RIP: 0033:0x7f2196c8261a [ 1621.998183] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1622.005875] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a 08:33:31 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 71) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x0, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async, rerun: 32) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async, rerun: 32) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="66643d8cf0f83e31e7c5b988ea9efdfd49d03d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) (async) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) getresuid(&(0x7f0000002180)=0x0, &(0x7f00000021c0), &(0x7f0000002200)) syz_mount_image$fuse(&(0x7f00000020c0), &(0x7f0000002100)='./file0\x00', 0x0, 0x0, 0x0, 0x2001040, &(0x7f0000002240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/fuse\x00'}}]}}) 08:33:31 executing program 3: socket$alg(0x26, 0x5, 0x0) (async) socket$nl_crypto(0x10, 0x3, 0x15) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffb) 08:33:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) getresuid(&(0x7f0000000100), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x201020, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00632662365673766345176,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_d=\x00', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,default_permissions,max_read=0x0000000000000003,max_read=0x0000000000000047,allow_other,max_read=0x000000003b21dd64,blksize=0x0000000000000000,default_permissions,allow_other,smackfsroot=user_id,\x00']) [ 1622.013138] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1622.020400] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1622.027657] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1622.034905] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="66643d8cf0f83e31e7c5b988ea9efdfd49d03d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 08:33:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20}, 0x20) read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002140), 0x2, 0x0) (async) getresuid(&(0x7f0000002180)=0x0, &(0x7f00000021c0), &(0x7f0000002200)) syz_mount_image$fuse(&(0x7f00000020c0), &(0x7f0000002100)='./file0\x00', 0x0, 0x0, 0x0, 0x2001040, &(0x7f0000002240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000000000000000}}, {@default_permissions}, {@default_permissions}], [{@seclabel}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/fuse\x00'}}]}}) 08:33:31 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x1000, r0) 08:33:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) getresuid(&(0x7f0000000100), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x201020, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00632662365673766345176,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_d=\x00', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,default_permissions,max_read=0x0000000000000003,max_read=0x0000000000000047,allow_other,max_read=0x000000003b21dd64,blksize=0x0000000000000000,default_permissions,allow_other,smackfsroot=user_id,\x00']) 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x0, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1622.138528] FAULT_INJECTION: forcing a failure. [ 1622.138528] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.198926] CPU: 1 PID: 12925 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1622.206831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1622.216183] Call Trace: [ 1622.218776] dump_stack+0x1b2/0x281 [ 1622.222409] should_fail.cold+0x10a/0x149 [ 1622.226560] should_failslab+0xd6/0x130 [ 1622.230535] kmem_cache_alloc_trace+0x29a/0x3d0 [ 1622.235209] fuse_dentry_init+0x40/0xa0 [ 1622.239183] ? fuse_dentry_release+0x40/0x40 [ 1622.243587] __d_alloc+0x5cf/0xa20 [ 1622.247131] d_make_root+0x3e/0xc0 [ 1622.250670] fuse_fill_super+0xc49/0x15c0 [ 1622.254820] ? fuse_get_root_inode+0xc0/0xc0 [ 1622.259224] ? up_write+0x17/0x60 [ 1622.262674] ? register_shrinker+0x15f/0x220 [ 1622.267080] ? sget_userns+0x768/0xc10 [ 1622.270975] ? get_anon_bdev+0x1c0/0x1c0 [ 1622.275033] ? sget+0xd9/0x110 [ 1622.278229] ? fuse_get_root_inode+0xc0/0xc0 [ 1622.282636] mount_nodev+0x4c/0xf0 [ 1622.286173] mount_fs+0x92/0x2a0 [ 1622.289539] vfs_kern_mount.part.0+0x5b/0x470 [ 1622.294034] do_mount+0xe65/0x2a30 08:33:31 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x0, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) [ 1622.297574] ? __do_page_fault+0x159/0xad0 [ 1622.301805] ? retint_kernel+0x2d/0x2d [ 1622.305691] ? copy_mount_string+0x40/0x40 [ 1622.309923] ? memset+0x20/0x40 [ 1622.313202] ? copy_mount_options+0x1fa/0x2f0 [ 1622.317691] ? copy_mnt_ns+0xa30/0xa30 [ 1622.321565] SyS_mount+0xa8/0x120 [ 1622.325000] ? copy_mnt_ns+0xa30/0xa30 [ 1622.328867] do_syscall_64+0x1d5/0x640 [ 1622.332737] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1622.337904] RIP: 0033:0x7f2196c8261a [ 1622.341591] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 72) 08:33:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}], [{@audit}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@seclabel}]}}) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x2}}, 0x18) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) 08:33:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:32 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x1000, r0) 08:33:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2d, 0x4, 0x0, {0x1ab, 0x9, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x4, 0x400}}, 0x30) [ 1622.349275] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1622.356524] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1622.363772] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1622.371017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1622.378271] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:32 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$negate(0xd, r1, 0x1000, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r0) (async) keyctl$negate(0xd, r1, 0x1000, r0) (async) 08:33:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2d, 0x4, 0x0, {0x1ab, 0x9, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x4, 0x400}}, 0x30) 08:33:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}], [{@audit}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@seclabel}]}}) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x2}}, 0x18) (async, rerun: 64) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) (rerun: 64) 08:33:32 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "0edf0b72926a6f36f15d722a83f7a1d34d86e46bd86e5ad91ab2f4163ac57c5ed6eb93b2f2c7d56aeba1c641744680869e663cfdaf29f7b18b2c16837407a53a", 0x19}, 0x48, 0xfffffffffffffff9) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) [ 1622.532987] FAULT_INJECTION: forcing a failure. [ 1622.532987] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.598800] CPU: 1 PID: 12980 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1622.606713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1622.616062] Call Trace: [ 1622.618654] dump_stack+0x1b2/0x281 [ 1622.622291] should_fail.cold+0x10a/0x149 [ 1622.626441] should_failslab+0xd6/0x130 [ 1622.630408] kmem_cache_alloc+0x28e/0x3c0 [ 1622.634556] ? fuse_kill_sb_anon+0x50/0x50 [ 1622.638789] ? fuse_init_file_inode+0x70/0x70 [ 1622.643283] fuse_alloc_inode+0x1d/0x3f0 [ 1622.647342] ? do_raw_spin_unlock+0x164/0x220 [ 1622.651840] ? fuse_kill_sb_anon+0x50/0x50 [ 1622.656068] alloc_inode+0x5d/0x170 [ 1622.659696] iget5_locked+0x169/0x450 [ 1622.663491] ? trace_hardirqs_on+0x10/0x10 [ 1622.667714] ? fuse_inode_eq+0x70/0x70 [ 1622.671593] fuse_iget+0x1b5/0x790 [ 1622.675137] ? fuse_change_attributes+0x4d0/0x4d0 [ 1622.679982] fuse_get_root_inode+0x99/0xc0 [ 1622.684212] ? fuse_iget+0x790/0x790 [ 1622.687921] ? __local_bh_enable_ip+0xc1/0x170 [ 1622.692482] ? bdi_set_max_ratio+0xe5/0x120 [ 1622.696781] fuse_fill_super+0xc18/0x15c0 [ 1622.700911] ? fuse_get_root_inode+0xc0/0xc0 [ 1622.705296] ? up_write+0x17/0x60 [ 1622.708726] ? register_shrinker+0x15f/0x220 [ 1622.713113] ? sget_userns+0x768/0xc10 [ 1622.716981] ? get_anon_bdev+0x1c0/0x1c0 [ 1622.721018] ? sget+0xd9/0x110 [ 1622.724190] ? fuse_get_root_inode+0xc0/0xc0 [ 1622.728675] mount_nodev+0x4c/0xf0 [ 1622.732191] mount_fs+0x92/0x2a0 [ 1622.735539] vfs_kern_mount.part.0+0x5b/0x470 [ 1622.740014] do_mount+0xe65/0x2a30 [ 1622.743547] ? __do_page_fault+0x159/0xad0 [ 1622.747769] ? retint_kernel+0x2d/0x2d [ 1622.751646] ? copy_mount_string+0x40/0x40 [ 1622.755873] ? memset+0x20/0x40 [ 1622.759133] ? copy_mount_options+0x1fa/0x2f0 [ 1622.763607] ? copy_mnt_ns+0xa30/0xa30 [ 1622.767471] SyS_mount+0xa8/0x120 [ 1622.770918] ? copy_mnt_ns+0xa30/0xa30 [ 1622.774791] do_syscall_64+0x1d5/0x640 [ 1622.778661] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1622.783826] RIP: 0033:0x7f2196c8261a [ 1622.787512] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 73) 08:33:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x0, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x14}, 0x48, 0xfffffffffffffffc) 08:33:32 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "0edf0b72926a6f36f15d722a83f7a1d34d86e46bd86e5ad91ab2f4163ac57c5ed6eb93b2f2c7d56aeba1c641744680869e663cfdaf29f7b18b2c16837407a53a", 0x19}, 0x48, 0xfffffffffffffff9) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "0edf0b72926a6f36f15d722a83f7a1d34d86e46bd86e5ad91ab2f4163ac57c5ed6eb93b2f2c7d56aeba1c641744680869e663cfdaf29f7b18b2c16837407a53a", 0x19}, 0x48, 0xfffffffffffffff9) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) (async) 08:33:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2d, 0x4, 0x0, {0x1ab, 0x9, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async, rerun: 64) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x4, 0x400}}, 0x30) 08:33:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}], [{@audit}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@seclabel}]}}) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x2}}, 0x18) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x1}}], [{@audit}, {@fsname={'fsname', 0x3d, 'rootmode'}}, {@seclabel}]}}) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x2}}, 0x18) (async) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) (async) [ 1622.795194] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1622.802439] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1622.809684] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1622.816934] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1622.824184] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x24, 0x44ca, 0x1002202, 0x6, 0x0, 0x8000, 0xa2d}}, 0x50) 08:33:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, 0x0, 0x0, 0xfffffffffffffffc) 08:33:32 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "0edf0b72926a6f36f15d722a83f7a1d34d86e46bd86e5ad91ab2f4163ac57c5ed6eb93b2f2c7d56aeba1c641744680869e663cfdaf29f7b18b2c16837407a53a", 0x19}, 0x48, 0xfffffffffffffff9) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffe) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "0edf0b72926a6f36f15d722a83f7a1d34d86e46bd86e5ad91ab2f4163ac57c5ed6eb93b2f2c7d56aeba1c641744680869e663cfdaf29f7b18b2c16837407a53a", 0x19}, 0x48, 0xfffffffffffffff9) (async) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) (async) 08:33:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, 0x0, 0x0, 0xfffffffffffffffc) 08:33:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '\xaf#'}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@uid_gt={'uid>', r2}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@uid_gt={'uid>', r3}}]}}) 08:33:32 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$link(0x8, r1, r0) [ 1622.979897] FAULT_INJECTION: forcing a failure. [ 1622.979897] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.036981] CPU: 0 PID: 13032 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1623.044914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.054269] Call Trace: [ 1623.056864] dump_stack+0x1b2/0x281 [ 1623.060495] should_fail.cold+0x10a/0x149 [ 1623.064647] should_failslab+0xd6/0x130 [ 1623.068631] kmem_cache_alloc+0x28e/0x3c0 [ 1623.072785] __fuse_request_alloc+0x21/0xe0 [ 1623.077115] fuse_fill_super+0xc89/0x15c0 [ 1623.081281] ? fuse_get_root_inode+0xc0/0xc0 [ 1623.085690] ? up_write+0x17/0x60 [ 1623.089147] ? register_shrinker+0x15f/0x220 [ 1623.093721] ? sget_userns+0x768/0xc10 [ 1623.097612] ? get_anon_bdev+0x1c0/0x1c0 [ 1623.101765] ? sget+0xd9/0x110 [ 1623.104968] ? fuse_get_root_inode+0xc0/0xc0 [ 1623.109378] mount_nodev+0x4c/0xf0 [ 1623.112919] mount_fs+0x92/0x2a0 [ 1623.116282] vfs_kern_mount.part.0+0x5b/0x470 [ 1623.120782] do_mount+0xe65/0x2a30 [ 1623.124325] ? __do_page_fault+0x159/0xad0 [ 1623.128559] ? retint_kernel+0x2d/0x2d [ 1623.132448] ? copy_mount_string+0x40/0x40 [ 1623.136683] ? memset+0x20/0x40 [ 1623.139969] ? copy_mount_options+0x1fa/0x2f0 [ 1623.144463] ? copy_mnt_ns+0xa30/0xa30 [ 1623.148351] SyS_mount+0xa8/0x120 [ 1623.151804] ? copy_mnt_ns+0xa30/0xa30 [ 1623.155690] do_syscall_64+0x1d5/0x640 [ 1623.159676] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1623.164862] RIP: 0033:0x7f2196c8261a [ 1623.168565] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1623.176273] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1623.183541] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1623.190801] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1623.198066] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1623.205326] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 74) 08:33:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) getresuid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) (async) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '\xaf#'}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@uid_gt={'uid>', r2}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@uid_gt={'uid>', r3}}]}}) 08:33:32 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$link(0x8, r1, r0) 08:33:32 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, 0x0, 0x0, 0xfffffffffffffffc) [ 1623.316831] FAULT_INJECTION: forcing a failure. [ 1623.316831] name failslab, interval 1, probability 0, space 0, times 0 [ 1623.341049] CPU: 1 PID: 13111 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1623.348956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.358306] Call Trace: [ 1623.360894] dump_stack+0x1b2/0x281 [ 1623.364528] should_fail.cold+0x10a/0x149 [ 1623.368686] should_failslab+0xd6/0x130 [ 1623.372663] kmem_cache_alloc+0x28e/0x3c0 [ 1623.376815] __d_alloc+0x2a/0xa20 [ 1623.380274] d_alloc+0x46/0x240 [ 1623.383690] d_alloc_name+0x70/0x80 [ 1623.387320] ? d_alloc+0x240/0x240 [ 1623.390897] fuse_ctl_add_dentry+0x70/0x410 [ 1623.395220] ? __lockdep_init_map+0x100/0x560 [ 1623.399718] fuse_ctl_add_conn+0x110/0x250 [ 1623.403955] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1623.408626] ? CIFSSMBQFileInfo+0x965/0xae0 [ 1623.412963] fuse_fill_super+0xe0c/0x15c0 [ 1623.417116] ? fuse_get_root_inode+0xc0/0xc0 [ 1623.421524] ? up_write+0x17/0x60 [ 1623.424977] ? register_shrinker+0x15f/0x220 [ 1623.429383] ? sget_userns+0x768/0xc10 [ 1623.433277] ? get_anon_bdev+0x1c0/0x1c0 [ 1623.437331] ? sget+0xd9/0x110 [ 1623.440521] ? fuse_get_root_inode+0xc0/0xc0 [ 1623.444937] mount_nodev+0x4c/0xf0 [ 1623.448473] mount_fs+0x92/0x2a0 [ 1623.451842] vfs_kern_mount.part.0+0x5b/0x470 [ 1623.456343] do_mount+0xe65/0x2a30 [ 1623.459883] ? __do_page_fault+0x159/0xad0 [ 1623.464111] ? retint_kernel+0x2d/0x2d [ 1623.467997] ? copy_mount_string+0x40/0x40 [ 1623.472230] ? memset+0x20/0x40 [ 1623.475505] ? copy_mount_options+0x1fa/0x2f0 [ 1623.479994] ? copy_mnt_ns+0xa30/0xa30 [ 1623.483878] SyS_mount+0xa8/0x120 [ 1623.487329] ? copy_mnt_ns+0xa30/0xa30 [ 1623.491208] do_syscall_64+0x1d5/0x640 [ 1623.495077] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1623.500242] RIP: 0033:0x7f2196c8261a [ 1623.503928] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:33 executing program 4: r0 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x24, 0x44ca, 0x1002202, 0x6, 0x0, 0x8000, 0xa2d}}, 0x50) 08:33:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '\xaf#'}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@uid_gt={'uid>', r2}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@uid_gt={'uid>', r3}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) (async) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) (async) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {}, 0x2c, {[], [{@subj_type={'subj_type', 0x3d, '\xaf#'}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@uid_gt={'uid>', r2}}, {@subj_user={'subj_user', 0x3d, 'fuse\x00'}}, {@dont_measure}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}, {@uid_gt={'uid>', r3}}]}}) (async) 08:33:33 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) keyctl$link(0x8, r1, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) keyctl$link(0x8, r1, r0) (async) 08:33:33 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:33 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 75) [ 1623.511614] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1623.518860] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1623.526107] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1623.533357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1623.540611] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:33 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:33 executing program 3: iopl(0x1) 08:33:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x10}}, 0x20) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x24, 0x44ca, 0x1002202, 0x6, 0x0, 0x8000, 0xa2d}}, 0x50) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x24, 0x44ca, 0x1002202, 0x6, 0x0, 0x8000, 0xa2d}}, 0x50) (async) [ 1623.657285] FAULT_INJECTION: forcing a failure. [ 1623.657285] name failslab, interval 1, probability 0, space 0, times 0 08:33:33 executing program 3: iopl(0x1) [ 1623.699773] CPU: 1 PID: 13169 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1623.707673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1623.717024] Call Trace: [ 1623.719614] dump_stack+0x1b2/0x281 [ 1623.723244] should_fail.cold+0x10a/0x149 [ 1623.727395] should_failslab+0xd6/0x130 [ 1623.731370] kmem_cache_alloc+0x28e/0x3c0 [ 1623.735515] __d_alloc+0x2a/0xa20 [ 1623.738969] ? lock_acquire+0x170/0x3f0 [ 1623.742943] d_alloc+0x46/0x240 [ 1623.746223] d_alloc_name+0x70/0x80 08:33:33 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x35, 0x0, 0x38, 0x35, 0x34]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e6acd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) [ 1623.749852] ? d_alloc+0x240/0x240 [ 1623.753393] fuse_ctl_add_dentry+0x70/0x410 [ 1623.757712] ? __lockdep_init_map+0x100/0x560 [ 1623.762206] fuse_ctl_add_conn+0x148/0x250 [ 1623.766441] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1623.771107] ? CIFSSMBQFileInfo+0x965/0xae0 [ 1623.775432] fuse_fill_super+0xe0c/0x15c0 [ 1623.779577] ? fuse_get_root_inode+0xc0/0xc0 [ 1623.783986] ? up_write+0x17/0x60 [ 1623.787435] ? register_shrinker+0x15f/0x220 [ 1623.791841] ? sget_userns+0x768/0xc10 [ 1623.795731] ? get_anon_bdev+0x1c0/0x1c0 [ 1623.799785] ? sget+0xd9/0x110 [ 1623.802975] ? fuse_get_root_inode+0xc0/0xc0 [ 1623.807378] mount_nodev+0x4c/0xf0 [ 1623.810916] mount_fs+0x92/0x2a0 [ 1623.814279] vfs_kern_mount.part.0+0x5b/0x470 [ 1623.818766] do_mount+0xe65/0x2a30 [ 1623.822301] ? __do_page_fault+0x159/0xad0 [ 1623.826534] ? retint_kernel+0x2d/0x2d [ 1623.830419] ? copy_mount_string+0x40/0x40 [ 1623.834652] ? memset+0x20/0x40 [ 1623.837927] ? copy_mount_options+0x1fa/0x2f0 [ 1623.842423] ? copy_mnt_ns+0xa30/0xa30 [ 1623.846308] SyS_mount+0xa8/0x120 [ 1623.849755] ? copy_mnt_ns+0xa30/0xa30 [ 1623.853638] do_syscall_64+0x1d5/0x640 [ 1623.857528] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1623.862709] RIP: 0033:0x7f2196c8261a [ 1623.866406] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1623.874094] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1623.881342] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1623.888592] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:33 executing program 4: r0 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) 08:33:33 executing program 3: iopl(0x1) 08:33:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x2d, 0x4, 0x0, {0x1ab, 0x9, 0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2d) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x1, 0x4, 0x400}}, 0x30) 08:33:33 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 76) 08:33:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x10}}, 0x20) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 1623.895841] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1623.903086] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) r2 = accept(r0, &(0x7f0000000200)=@ethernet={0x0, @random}, &(0x7f0000000280)=0x80) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000100)=""/197, 0xc5) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x6040409}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa373}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x860) [ 1624.001851] FAULT_INJECTION: forcing a failure. [ 1624.001851] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.021161] CPU: 1 PID: 13209 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1624.029058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.038413] Call Trace: [ 1624.040999] dump_stack+0x1b2/0x281 [ 1624.044629] should_fail.cold+0x10a/0x149 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r6, &(0x7f0000002080)={0x60, 0x0, r7}, 0x60) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r9 = getegid() mount$fuse(0x0, &(0x7f00000062c0)='./file0\x00', &(0x7f0000006300), 0x130b802, &(0x7f0000006440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions}], [{@subj_user={'subj_user', 0x3d, '}'}}, {@appraise_type}]}}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) read$FUSE(r2, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r11 = getegid() read$FUSE(r1, &(0x7f0000004280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006600)=ANY=[@ANYBLOB="a002000000000000", @ANYRES64=r7, @ANYBLOB="020000000000000003000000000000000300000000000000000400000000000000000010ff0700000600000000000000000000000000000004000000000000000400000000000000fcffffffffffffff01000000000000000400000001000000060000000020000008000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="ff010000080000000000000005000000000000000400000000000000050000000000010027262a2d5d0000000200000000000000000000000000000001800000000000000900000000000000b4000000fe710000040000000000000004000000000000000500000000000000040000000000000056ffffffffffffff00000000000000001c000000030000000100000000c0000000040000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="01000000faffffff0000000006000000000000000200000000000000010000004108000000000000000000000500000000000000000000000000000003000000000000000000000000000080010000000c40000000000000000000007300000000000000200100000000000080000000000000000400000000000000010000000000000047000000020000000800000000400000ffffff7f", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r4, @ANYRES32=r12, @ANYBLOB="715b0000000000000000000003000000000000007f000000000000000a000000db0e00002f6465762f6675736500000000000000"], 0x2a0) write$FUSE_STATFS(r2, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r3, {{0x2, 0x80, 0x101, 0x4, 0x7, 0x3f, 0x4, 0x80000000}}}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1624.048779] should_failslab+0xd6/0x130 [ 1624.052756] kmem_cache_alloc+0x28e/0x3c0 [ 1624.056906] __d_alloc+0x2a/0xa20 [ 1624.060357] ? lock_acquire+0x170/0x3f0 [ 1624.064333] d_alloc+0x46/0x240 [ 1624.067612] d_alloc_name+0x70/0x80 [ 1624.071241] ? d_alloc+0x240/0x240 [ 1624.074783] fuse_ctl_add_dentry+0x70/0x410 [ 1624.079102] ? __lockdep_init_map+0x100/0x560 [ 1624.083611] fuse_ctl_add_conn+0x148/0x250 [ 1624.087854] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1624.092521] ? CIFSSMBQFileInfo+0x965/0xae0 [ 1624.096844] fuse_fill_super+0xe0c/0x15c0 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) (async) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r6, &(0x7f0000002080)={0x60, 0x0, r7}, 0x60) (async) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) (async, rerun: 32) r9 = getegid() (rerun: 32) mount$fuse(0x0, &(0x7f00000062c0)='./file0\x00', &(0x7f0000006300), 0x130b802, &(0x7f0000006440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions}], [{@subj_user={'subj_user', 0x3d, '}'}}, {@appraise_type}]}}) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) (async) read$FUSE(r2, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r11 = getegid() read$FUSE(r1, &(0x7f0000004280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006600)=ANY=[@ANYBLOB="a002000000000000", @ANYRES64=r7, @ANYBLOB="020000000000000003000000000000000300000000000000000400000000000000000010ff0700000600000000000000000000000000000004000000000000000400000000000000fcffffffffffffff01000000000000000400000001000000060000000020000008000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="ff010000080000000000000005000000000000000400000000000000050000000000010027262a2d5d0000000200000000000000000000000000000001800000000000000900000000000000b4000000fe710000040000000000000004000000000000000500000000000000040000000000000056ffffffffffffff00000000000000001c000000030000000100000000c0000000040000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="01000000faffffff0000000006000000000000000200000000000000010000004108000000000000000000000500000000000000000000000000000003000000000000000000000000000080010000000c40000000000000000000007300000000000000200100000000000080000000000000000400000000000000010000000000000047000000020000000800000000400000ffffff7f", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="09000000be000000000000000000000000000000ff0f0000000000000a000000030000002f6465762f667573650000000000000004000000000000000000000000000000ff010000000000000100000000000000000000000000008001000000000000000100000000000000000000000000000057000000000000007fffffffffffffffff0300000000000004000000030000000200000000a000002bffffff7b3818025cdf452d5275c98e4e6476f50e259952f4d919864db1a2972d80242e2ad4efb48d9d9611a98b479bc0bd4c70a7f6c46f76709f90e8ba0f93a9ca46b83a869fdc4bdf40f5e821e5fb37df17bd8fc9f059e778ce594c0fb08e71cf29a165cf83e5b4bbb0b080b2623b8b37c33896f913ef2aa1a56dd9459f", @ANYRES32=r4, @ANYRES32=r12, @ANYBLOB="715b0000000000000000000003000000000000007f000000000000000a000000db0e00002f6465762f6675736500000000000000"], 0x2a0) (async) write$FUSE_STATFS(r2, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r3, {{0x2, 0x80, 0x101, 0x4, 0x7, 0x3f, 0x4, 0x80000000}}}, 0x60) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1624.100991] ? fuse_get_root_inode+0xc0/0xc0 [ 1624.105393] ? up_write+0x17/0x60 [ 1624.108843] ? register_shrinker+0x15f/0x220 [ 1624.113256] ? sget_userns+0x768/0xc10 [ 1624.117161] ? get_anon_bdev+0x1c0/0x1c0 [ 1624.121228] ? sget+0xd9/0x110 [ 1624.124418] ? fuse_get_root_inode+0xc0/0xc0 [ 1624.128830] mount_nodev+0x4c/0xf0 [ 1624.132369] mount_fs+0x92/0x2a0 [ 1624.135733] vfs_kern_mount.part.0+0x5b/0x470 [ 1624.140230] do_mount+0xe65/0x2a30 [ 1624.143771] ? __do_page_fault+0x159/0xad0 [ 1624.148000] ? retint_kernel+0x2d/0x2d 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000040)=r1) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r6, &(0x7f0000002080)={0x60, 0x0, r7}, 0x60) (async) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) (async) r9 = getegid() mount$fuse(0x0, &(0x7f00000062c0)='./file0\x00', &(0x7f0000006300), 0x130b802, &(0x7f0000006440)={{}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@default_permissions}], [{@subj_user={'subj_user', 0x3d, '}'}}, {@appraise_type}]}}) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r9}}) read$FUSE(r2, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r11 = getegid() (async) read$FUSE(r1, &(0x7f0000004280)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000006600)=ANY=[@ANYBLOB="a002000000000000", @ANYRES64=r7, @ANYBLOB="020000000000000003000000000000000300000000000000000400000000000000000010ff0700000600000000000000000000000000000004000000000000000400000000000000fcffffffffffffff01000000000000000400000001000000060000000020000008000000", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="ff010000080000000000000005000000000000000400000000000000050000000000010027262a2d5d0000000200000000000000000000000000000001800000000000000900000000000000b4000000fe710000040000000000000004000000000000000500000000000000040000000000000056ffffffffffffff00000000000000001c000000030000000100000000c0000000040000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="01000000faffffff0000000006000000000000000200000000000000010000004108000000000000000000000500000000000000000000000000000003000000000000000000000000000080010000000c40000000000000000000007300000000000000200100000000000080000000000000000400000000000000010000000000000047000000020000000800000000400000ffffff7f", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r4, @ANYRES32=r12, @ANYBLOB="715b0000000000000000000003000000000000007f000000000000000a000000db0e00002f6465762f6675736500000000000000"], 0x2a0) write$FUSE_STATFS(r2, &(0x7f0000000040)={0x60, 0xfffffffffffffffe, r3, {{0x2, 0x80, 0x101, 0x4, 0x7, 0x3f, 0x4, 0x80000000}}}, 0x60) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1624.151889] ? copy_mount_string+0x40/0x40 [ 1624.156125] ? memset+0x20/0x40 [ 1624.159405] ? copy_mount_options+0x1fa/0x2f0 [ 1624.163911] ? copy_mnt_ns+0xa30/0xa30 [ 1624.167795] SyS_mount+0xa8/0x120 [ 1624.171242] ? copy_mnt_ns+0xa30/0xa30 [ 1624.175132] do_syscall_64+0x1d5/0x640 [ 1624.179024] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1624.184207] RIP: 0033:0x7f2196c8261a [ 1624.187910] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1624.195610] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) 08:33:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) r2 = accept(r0, &(0x7f0000000200)=@ethernet={0x0, @random}, &(0x7f0000000280)=0x80) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000100)=""/197, 0xc5) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x6040409}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa373}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x860) 08:33:33 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x10}}, 0x20) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 1624.202871] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1624.210136] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1624.217398] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1624.224660] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:33 executing program 4: r0 = accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) accept4$phonet_pipe(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x10, 0x0) (async) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) 08:33:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) 08:33:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x10}}, 0x20) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:33 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 77) 08:33:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) r2 = accept(r0, &(0x7f0000000200)=@ethernet={0x0, @random}, &(0x7f0000000280)=0x80) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000100)=""/197, 0xc5) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r2}) sendmsg$L2TP_CMD_SESSION_GET(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x6040409}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r1, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0xa373}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010100}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x860) 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0xfffffffffffffff5}, 0x20) (async) 08:33:34 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x10}}, 0x20) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) socket$inet_udplite(0x2, 0x2, 0x88) [ 1624.374991] FAULT_INJECTION: forcing a failure. [ 1624.374991] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.413873] CPU: 0 PID: 13255 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1624.421863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.431214] Call Trace: [ 1624.433800] dump_stack+0x1b2/0x281 [ 1624.437433] should_fail.cold+0x10a/0x149 [ 1624.441593] should_failslab+0xd6/0x130 [ 1624.445575] kmem_cache_alloc+0x28e/0x3c0 [ 1624.449723] __d_alloc+0x2a/0xa20 [ 1624.453184] ? lock_acquire+0x170/0x3f0 [ 1624.457163] d_alloc+0x46/0x240 [ 1624.460449] d_alloc_name+0x70/0x80 [ 1624.464072] ? d_alloc+0x240/0x240 [ 1624.467619] fuse_ctl_add_dentry+0x70/0x410 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) (async, rerun: 32) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (rerun: 32) 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_STATFS(r3, &(0x7f0000004140)={0x60, 0x0, r2, {{0x6, 0x20, 0x6, 0x8001, 0x3, 0x0, 0x9, 0xffffffff}}}, 0x60) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0xffffffffffffffda, r2, {{0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x20}}}, 0x60) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) [ 1624.471939] ? __lockdep_init_map+0x100/0x560 [ 1624.476438] fuse_ctl_add_conn+0x17c/0x250 [ 1624.480671] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1624.485334] ? CIFSSMBQFileInfo+0x965/0xae0 [ 1624.489660] fuse_fill_super+0xe0c/0x15c0 [ 1624.493810] ? fuse_get_root_inode+0xc0/0xc0 [ 1624.499083] ? up_write+0x17/0x60 [ 1624.502530] ? register_shrinker+0x15f/0x220 [ 1624.506937] ? sget_userns+0x768/0xc10 [ 1624.510835] ? get_anon_bdev+0x1c0/0x1c0 [ 1624.514894] ? sget+0xd9/0x110 [ 1624.518085] ? fuse_get_root_inode+0xc0/0xc0 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_STATFS(r3, &(0x7f0000004140)={0x60, 0x0, r2, {{0x6, 0x20, 0x6, 0x8001, 0x3, 0x0, 0x9, 0xffffffff}}}, 0x60) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0xffffffffffffffda, r2, {{0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x20}}}, 0x60) (async) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) [ 1624.522493] mount_nodev+0x4c/0xf0 [ 1624.526030] mount_fs+0x92/0x2a0 [ 1624.529399] vfs_kern_mount.part.0+0x5b/0x470 [ 1624.533895] do_mount+0xe65/0x2a30 [ 1624.537434] ? __do_page_fault+0x159/0xad0 [ 1624.541669] ? retint_kernel+0x2d/0x2d [ 1624.545563] ? copy_mount_string+0x40/0x40 [ 1624.549800] ? memset+0x20/0x40 [ 1624.553077] ? copy_mount_options+0x1fa/0x2f0 [ 1624.557574] ? copy_mnt_ns+0xa30/0xa30 [ 1624.561451] SyS_mount+0xa8/0x120 [ 1624.564886] ? copy_mnt_ns+0xa30/0xa30 [ 1624.568755] do_syscall_64+0x1d5/0x640 [ 1624.572626] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1624.577792] RIP: 0033:0x7f2196c8261a [ 1624.581484] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1624.589176] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1624.596511] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1624.603762] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1624.611017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1624.618265] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:34 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_STATFS(r3, &(0x7f0000004140)={0x60, 0x0, r2, {{0x6, 0x20, 0x6, 0x8001, 0x3, 0x0, 0x9, 0xffffffff}}}, 0x60) (async) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0xffffffffffffffda, r2, {{0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x20}}}, 0x60) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 08:33:34 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x38, 0x35, 0x61, 0x32, 0x54, 0x36, 0x32, 0x17039f885e488312, 0x61, 0x62, 0x37, 0x3e, 0x62, 0x64, 0x66]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:34 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 78) 08:33:34 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x10}}, 0x20) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) socket$inet_udplite(0x2, 0x2, 0x88) 08:33:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0, &(0x7f0000000200)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@uid_gt}, {@euid_lt={'euid<', r4}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'fd'}}, {@fowner_gt={'fowner>', r5}}]}}) 08:33:34 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x38, 0x35, 0x61, 0x32, 0x54, 0x36, 0x32, 0x17039f885e488312, 0x61, 0x62, 0x37, 0x3e, 0x62, 0x64, 0x66]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) [ 1624.747250] FAULT_INJECTION: forcing a failure. [ 1624.747250] name failslab, interval 1, probability 0, space 0, times 0 [ 1624.798682] CPU: 1 PID: 13313 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1624.806587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1624.815932] Call Trace: [ 1624.818520] dump_stack+0x1b2/0x281 [ 1624.822150] should_fail.cold+0x10a/0x149 [ 1624.826298] should_failslab+0xd6/0x130 [ 1624.830277] kmem_cache_alloc+0x28e/0x3c0 [ 1624.834427] __d_alloc+0x2a/0xa20 [ 1624.837878] ? lock_acquire+0x170/0x3f0 [ 1624.841856] d_alloc+0x46/0x240 [ 1624.845138] d_alloc_name+0x70/0x80 [ 1624.848767] ? d_alloc+0x240/0x240 [ 1624.852305] fuse_ctl_add_dentry+0x70/0x410 [ 1624.856620] ? __lockdep_init_map+0x100/0x560 [ 1624.861119] fuse_ctl_add_conn+0x17c/0x250 [ 1624.865352] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1624.870018] ? CIFSSMBQFileInfo+0x965/0xae0 [ 1624.874349] fuse_fill_super+0xe0c/0x15c0 [ 1624.878499] ? fuse_get_root_inode+0xc0/0xc0 [ 1624.882903] ? up_write+0x17/0x60 [ 1624.886349] ? register_shrinker+0x15f/0x220 [ 1624.890766] ? sget_userns+0x768/0xc10 [ 1624.894657] ? get_anon_bdev+0x1c0/0x1c0 [ 1624.898713] ? sget+0xd9/0x110 [ 1624.901901] ? fuse_get_root_inode+0xc0/0xc0 [ 1624.906305] mount_nodev+0x4c/0xf0 [ 1624.909841] mount_fs+0x92/0x2a0 [ 1624.913209] vfs_kern_mount.part.0+0x5b/0x470 [ 1624.917705] do_mount+0xe65/0x2a30 [ 1624.921245] ? __do_page_fault+0x159/0xad0 [ 1624.925477] ? retint_kernel+0x2d/0x2d [ 1624.929355] ? copy_mount_string+0x40/0x40 [ 1624.933586] ? memset+0x20/0x40 [ 1624.936863] ? copy_mount_options+0x1fa/0x2f0 [ 1624.941350] ? copy_mnt_ns+0xa30/0xa30 [ 1624.945233] SyS_mount+0xa8/0x120 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="310000ff3e096d1a000000000000000000"], 0x21) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x1c}}, 0x20) read$FUSE(r1, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) getresuid(&(0x7f0000004280)=0x0, &(0x7f00000042c0), &(0x7f0000004300)) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004340)={0x540, 0xffffffffffffffda, 0x0, [{{0x4, 0x1, 0x9, 0x9, 0x2, 0x6, {0x6, 0x800004ed, 0x1, 0xb2, 0x7, 0xffff, 0x2, 0x8, 0x5, 0xa000, 0xffff764a, 0xee00, 0xffffffffffffffff, 0xa1, 0x4}}, {0x0, 0x940, 0xa, 0x6, '\x02[^%--!}*^'}}, {{0x3, 0x2, 0x8000, 0x4, 0x3, 0xf41, {0x3, 0x6fbec658, 0x2, 0x5, 0x7880aae, 0x6, 0x8, 0x6, 0x57cea068, 0xc000, 0x925, 0xee01, 0xee00, 0x10000, 0x2243669f}}, {0x6, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x2, 0x3, 0x0, 0x2c34, 0xff, 0xa8, {0x6, 0x1, 0x6178, 0x100000000, 0x0, 0x6, 0x800, 0x3, 0xc342, 0x0, 0x10000, 0x0, 0x0, 0x1f, 0x4}}, {0x1, 0xffffffffffffffd1, 0xa, 0x8001, '/dev/fuse\x00'}}, {{0x3, 0x0, 0x401, 0x4, 0x7fffffff, 0x3, {0x6, 0x6, 0x3, 0x409, 0x5, 0x1, 0x7, 0x10001, 0x2ffe, 0x4000, 0x9, 0xee01, 0xee01, 0x8, 0x6}}, {0x5, 0x1f, 0xa, 0xffffff00, '/dev/fuse\x00'}}, {{0x6, 0x0, 0x7, 0x800, 0x101, 0x8, {0x1, 0xffffffffffffff1d, 0x5, 0xac3, 0x2, 0x6, 0x2, 0x7, 0x999, 0x4000, 0x1, r2, 0xee00, 0x80, 0x3000}}, {0x4, 0x8000, 0xa, 0x3c, '/dev/fuse\x00'}}, {{0x3, 0x2, 0x32, 0x800, 0x15, 0x200, {0x0, 0x9, 0x94ad, 0x9, 0x415, 0x6, 0x3ff, 0xa6b7, 0x0, 0x8000, 0xfffffffd, r3, r5, 0x8, 0x1ff}}, {0x3, 0xfffffffffffffff9, 0x0, 0x8}}, {{0x2, 0x0, 0x3, 0x200, 0x8, 0x400, {0x1, 0x80000000, 0x10000, 0xcc, 0x3, 0x10000, 0x3, 0x7fff, 0xb0, 0x2000, 0x1, r6, r8, 0x5, 0x3f}}, {0x1, 0x2, 0xa, 0x0, '/dev/fuse\x00'}}, {{0x2, 0x3, 0xffffffff, 0x5, 0x5, 0x6, {0x6, 0x100000000, 0x8, 0x800000000000000, 0x1, 0x6, 0x9, 0x8, 0x3, 0x8000, 0x8, 0xee01, r10, 0xffffffff, 0x6}}, {0x1, 0x8000000000000001, 0xa, 0x2, '/dev/fuse\x00'}}]}, 0x540) [ 1624.948678] ? copy_mnt_ns+0xa30/0xa30 [ 1624.952561] do_syscall_64+0x1d5/0x640 [ 1624.956459] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1624.961640] RIP: 0033:0x7f2196c8261a [ 1624.965335] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1624.973028] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1624.980276] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1624.987521] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 08:33:34 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x37, 0x38, 0x35, 0x61, 0x32, 0x54, 0x36, 0x32, 0x17039f885e488312, 0x61, 0x62, 0x37, 0x3e, 0x62, 0x64, 0x66]}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="310000ff3e096d1a000000000000000000"], 0x21) (async) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x1c}}, 0x20) (async) read$FUSE(r1, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() (async) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) (async) getresuid(&(0x7f0000004280)=0x0, &(0x7f00000042c0), &(0x7f0000004300)) (async) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004340)={0x540, 0xffffffffffffffda, 0x0, [{{0x4, 0x1, 0x9, 0x9, 0x2, 0x6, {0x6, 0x800004ed, 0x1, 0xb2, 0x7, 0xffff, 0x2, 0x8, 0x5, 0xa000, 0xffff764a, 0xee00, 0xffffffffffffffff, 0xa1, 0x4}}, {0x0, 0x940, 0xa, 0x6, '\x02[^%--!}*^'}}, {{0x3, 0x2, 0x8000, 0x4, 0x3, 0xf41, {0x3, 0x6fbec658, 0x2, 0x5, 0x7880aae, 0x6, 0x8, 0x6, 0x57cea068, 0xc000, 0x925, 0xee01, 0xee00, 0x10000, 0x2243669f}}, {0x6, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x2, 0x3, 0x0, 0x2c34, 0xff, 0xa8, {0x6, 0x1, 0x6178, 0x100000000, 0x0, 0x6, 0x800, 0x3, 0xc342, 0x0, 0x10000, 0x0, 0x0, 0x1f, 0x4}}, {0x1, 0xffffffffffffffd1, 0xa, 0x8001, '/dev/fuse\x00'}}, {{0x3, 0x0, 0x401, 0x4, 0x7fffffff, 0x3, {0x6, 0x6, 0x3, 0x409, 0x5, 0x1, 0x7, 0x10001, 0x2ffe, 0x4000, 0x9, 0xee01, 0xee01, 0x8, 0x6}}, {0x5, 0x1f, 0xa, 0xffffff00, '/dev/fuse\x00'}}, {{0x6, 0x0, 0x7, 0x800, 0x101, 0x8, {0x1, 0xffffffffffffff1d, 0x5, 0xac3, 0x2, 0x6, 0x2, 0x7, 0x999, 0x4000, 0x1, r2, 0xee00, 0x80, 0x3000}}, {0x4, 0x8000, 0xa, 0x3c, '/dev/fuse\x00'}}, {{0x3, 0x2, 0x32, 0x800, 0x15, 0x200, {0x0, 0x9, 0x94ad, 0x9, 0x415, 0x6, 0x3ff, 0xa6b7, 0x0, 0x8000, 0xfffffffd, r3, r5, 0x8, 0x1ff}}, {0x3, 0xfffffffffffffff9, 0x0, 0x8}}, {{0x2, 0x0, 0x3, 0x200, 0x8, 0x400, {0x1, 0x80000000, 0x10000, 0xcc, 0x3, 0x10000, 0x3, 0x7fff, 0xb0, 0x2000, 0x1, r6, r8, 0x5, 0x3f}}, {0x1, 0x2, 0xa, 0x0, '/dev/fuse\x00'}}, {{0x2, 0x3, 0xffffffff, 0x5, 0x5, 0x6, {0x6, 0x100000000, 0x8, 0x800000000000000, 0x1, 0x6, 0x9, 0x8, 0x3, 0x8000, 0x8, 0xee01, r10, 0xffffffff, 0x6}}, {0x1, 0x8000000000000001, 0xa, 0x2, '/dev/fuse\x00'}}]}, 0x540) [ 1624.994768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1625.002031] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:34 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) 08:33:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0, &(0x7f0000000200)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@uid_gt}, {@euid_lt={'euid<', r4}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'fd'}}, {@fowner_gt={'fowner>', r5}}]}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) (async) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000200)) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@uid_gt}, {@euid_lt={'euid<', r4}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'fd'}}, {@fowner_gt={'fowner>', r5}}]}}) (async) 08:33:34 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="310000ff3e096d1a000000000000000000"], 0x21) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x1c}}, 0x20) read$FUSE(r1, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = getegid() write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) getresuid(&(0x7f0000004280)=0x0, &(0x7f00000042c0), &(0x7f0000004300)) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004340)={0x540, 0xffffffffffffffda, 0x0, [{{0x4, 0x1, 0x9, 0x9, 0x2, 0x6, {0x6, 0x800004ed, 0x1, 0xb2, 0x7, 0xffff, 0x2, 0x8, 0x5, 0xa000, 0xffff764a, 0xee00, 0xffffffffffffffff, 0xa1, 0x4}}, {0x0, 0x940, 0xa, 0x6, '\x02[^%--!}*^'}}, {{0x3, 0x2, 0x8000, 0x4, 0x3, 0xf41, {0x3, 0x6fbec658, 0x2, 0x5, 0x7880aae, 0x6, 0x8, 0x6, 0x57cea068, 0xc000, 0x925, 0xee01, 0xee00, 0x10000, 0x2243669f}}, {0x6, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x2, 0x3, 0x0, 0x2c34, 0xff, 0xa8, {0x6, 0x1, 0x6178, 0x100000000, 0x0, 0x6, 0x800, 0x3, 0xc342, 0x0, 0x10000, 0x0, 0x0, 0x1f, 0x4}}, {0x1, 0xffffffffffffffd1, 0xa, 0x8001, '/dev/fuse\x00'}}, {{0x3, 0x0, 0x401, 0x4, 0x7fffffff, 0x3, {0x6, 0x6, 0x3, 0x409, 0x5, 0x1, 0x7, 0x10001, 0x2ffe, 0x4000, 0x9, 0xee01, 0xee01, 0x8, 0x6}}, {0x5, 0x1f, 0xa, 0xffffff00, '/dev/fuse\x00'}}, {{0x6, 0x0, 0x7, 0x800, 0x101, 0x8, {0x1, 0xffffffffffffff1d, 0x5, 0xac3, 0x2, 0x6, 0x2, 0x7, 0x999, 0x4000, 0x1, r2, 0xee00, 0x80, 0x3000}}, {0x4, 0x8000, 0xa, 0x3c, '/dev/fuse\x00'}}, {{0x3, 0x2, 0x32, 0x800, 0x15, 0x200, {0x0, 0x9, 0x94ad, 0x9, 0x415, 0x6, 0x3ff, 0xa6b7, 0x0, 0x8000, 0xfffffffd, r3, r5, 0x8, 0x1ff}}, {0x3, 0xfffffffffffffff9, 0x0, 0x8}}, {{0x2, 0x0, 0x3, 0x200, 0x8, 0x400, {0x1, 0x80000000, 0x10000, 0xcc, 0x3, 0x10000, 0x3, 0x7fff, 0xb0, 0x2000, 0x1, r6, r8, 0x5, 0x3f}}, {0x1, 0x2, 0xa, 0x0, '/dev/fuse\x00'}}, {{0x2, 0x3, 0xffffffff, 0x5, 0x5, 0x6, {0x6, 0x100000000, 0x8, 0x800000000000000, 0x1, 0x6, 0x9, 0x8, 0x3, 0x8000, 0x8, 0xee01, r10, 0xffffffff, 0x6}}, {0x1, 0x8000000000000001, 0xa, 0x2, '/dev/fuse\x00'}}]}, 0x540) 08:33:34 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 79) 08:33:34 executing program 3: ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x0, @remote}}) r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "2f38ce771d5d47e1f5fdf30334eb8c4112ab0dc69c0d2f26ae1f8458970fb44f57c8647cf493a5f1ecb38aae962f3a8f850ec236892f542f9381ab6c995b6d98", 0x18}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff8, 0x1) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "c5821c4d4b7f0d12433f70070000013045912c1a62a55d98aacabd8784edb0d63cc0bf978925e9f8b2a93c04008d3dcc0fb500", 0x39}, 0x48, 0xfffffffffffffffc) 08:33:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = getegid() write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000280)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}}) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0, &(0x7f0000000200)) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@uid_gt}, {@euid_lt={'euid<', r4}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '/dev/fuse\x00'}}, {@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}, {@obj_user={'obj_user', 0x3d, 'fd'}}, {@fowner_gt={'fowner>', r5}}]}}) [ 1625.156657] FAULT_INJECTION: forcing a failure. [ 1625.156657] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.190523] CPU: 0 PID: 13365 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 08:33:34 executing program 3: ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x0, @remote}}) r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "2f38ce771d5d47e1f5fdf30334eb8c4112ab0dc69c0d2f26ae1f8458970fb44f57c8647cf493a5f1ecb38aae962f3a8f850ec236892f542f9381ab6c995b6d98", 0x18}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff8, 0x1) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "c5821c4d4b7f0d12433f70070000013045912c1a62a55d98aacabd8784edb0d63cc0bf978925e9f8b2a93c04008d3dcc0fb500", 0x39}, 0x48, 0xfffffffffffffffc) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x0, @remote}}) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "2f38ce771d5d47e1f5fdf30334eb8c4112ab0dc69c0d2f26ae1f8458970fb44f57c8647cf493a5f1ecb38aae962f3a8f850ec236892f542f9381ab6c995b6d98", 0x18}, 0x48, 0x0) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff8, 0x1) (async) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "c5821c4d4b7f0d12433f70070000013045912c1a62a55d98aacabd8784edb0d63cc0bf978925e9f8b2a93c04008d3dcc0fb500", 0x39}, 0x48, 0xfffffffffffffffc) (async) 08:33:34 executing program 3: ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x0, @remote}}) r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "2f38ce771d5d47e1f5fdf30334eb8c4112ab0dc69c0d2f26ae1f8458970fb44f57c8647cf493a5f1ecb38aae962f3a8f850ec236892f542f9381ab6c995b6d98", 0x18}, 0x48, 0x0) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff8, 0x1) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "c5821c4d4b7f0d12433f70070000013045912c1a62a55d98aacabd8784edb0d63cc0bf978925e9f8b2a93c04008d3dcc0fb500", 0x39}, 0x48, 0xfffffffffffffffc) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x0, @remote}}) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "2f38ce771d5d47e1f5fdf30334eb8c4112ab0dc69c0d2f26ae1f8458970fb44f57c8647cf493a5f1ecb38aae962f3a8f850ec236892f542f9381ab6c995b6d98", 0x18}, 0x48, 0x0) (async) keyctl$KEYCTL_MOVE(0x1e, r0, 0x0, 0xfffffffffffffff8, 0x1) (async) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000200)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "c5821c4d4b7f0d12433f70070000013045912c1a62a55d98aacabd8784edb0d63cc0bf978925e9f8b2a93c04008d3dcc0fb500", 0x39}, 0x48, 0xfffffffffffffffc) (async) 08:33:34 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x30, 0x62, 0x63, 0x33, 0x61, 0x39, 0x35, 0x0, 0x33, 0x38, 0x0, 0x65, 0x61, 0x38, 0x36, 0x64]}, &(0x7f0000000180)={0x0, "4fdb8bfd3d3072cd300e1f2fd253782fbcec715860e4e7015289f9742402573ccf89549510addb9d743e1a0227cdfae8b67f8f78bfe0b322842311d1d50af8af", 0x31}, 0x48, r0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r4, 0x1) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "973dbbc4712be38a26ea9a2d16a72331d67fd24c0d5356e27d9650d796fcad439ba6d43267d9650524e77fe84096203586ab52c9769d519d76445cef7bf387d6", 0x2a}, 0x48, r5) [ 1625.198422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.207781] Call Trace: [ 1625.210371] dump_stack+0x1b2/0x281 [ 1625.214007] should_fail.cold+0x10a/0x149 [ 1625.218154] should_failslab+0xd6/0x130 [ 1625.222133] kmem_cache_alloc+0x28e/0x3c0 [ 1625.226290] alloc_inode+0xa0/0x170 [ 1625.229914] new_inode+0x1d/0xf0 [ 1625.233281] fuse_ctl_add_dentry+0x8d/0x410 [ 1625.237599] ? __lockdep_init_map+0x100/0x560 [ 1625.242095] fuse_ctl_add_conn+0x148/0x250 [ 1625.246340] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1625.251018] ? CIFSSMBQFileInfo+0x166/0xae0 08:33:34 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) r2 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x30, 0x62, 0x63, 0x33, 0x61, 0x39, 0x35, 0x0, 0x33, 0x38, 0x0, 0x65, 0x61, 0x38, 0x36, 0x64]}, &(0x7f0000000180)={0x0, "4fdb8bfd3d3072cd300e1f2fd253782fbcec715860e4e7015289f9742402573ccf89549510addb9d743e1a0227cdfae8b67f8f78bfe0b322842311d1d50af8af", 0x31}, 0x48, r0) (async) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) (async) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r4, 0x1) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "973dbbc4712be38a26ea9a2d16a72331d67fd24c0d5356e27d9650d796fcad439ba6d43267d9650524e77fe84096203586ab52c9769d519d76445cef7bf387d6", 0x2a}, 0x48, r5) [ 1625.255342] fuse_fill_super+0xe0c/0x15c0 [ 1625.259488] ? fuse_get_root_inode+0xc0/0xc0 [ 1625.263895] ? up_write+0x17/0x60 [ 1625.267345] ? register_shrinker+0x15f/0x220 [ 1625.271757] ? sget_userns+0x768/0xc10 [ 1625.275654] ? get_anon_bdev+0x1c0/0x1c0 [ 1625.279714] ? sget+0xd9/0x110 [ 1625.282905] ? fuse_get_root_inode+0xc0/0xc0 [ 1625.287315] mount_nodev+0x4c/0xf0 [ 1625.290851] mount_fs+0x92/0x2a0 [ 1625.294219] vfs_kern_mount.part.0+0x5b/0x470 [ 1625.298715] do_mount+0xe65/0x2a30 [ 1625.302255] ? __do_page_fault+0x159/0xad0 [ 1625.306489] ? retint_kernel+0x2d/0x2d [ 1625.310374] ? copy_mount_string+0x40/0x40 [ 1625.314606] ? memset+0x20/0x40 [ 1625.317881] ? copy_mount_options+0x1fa/0x2f0 [ 1625.322370] ? copy_mnt_ns+0xa30/0xa30 [ 1625.326257] SyS_mount+0xa8/0x120 [ 1625.329707] ? copy_mnt_ns+0xa30/0xa30 [ 1625.333601] do_syscall_64+0x1d5/0x640 [ 1625.337498] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1625.342683] RIP: 0033:0x7f2196c8261a [ 1625.346391] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:33:35 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x30, 0x62, 0x63, 0x33, 0x61, 0x39, 0x35, 0x0, 0x33, 0x38, 0x0, 0x65, 0x61, 0x38, 0x36, 0x64]}, &(0x7f0000000180)={0x0, "4fdb8bfd3d3072cd300e1f2fd253782fbcec715860e4e7015289f9742402573ccf89549510addb9d743e1a0227cdfae8b67f8f78bfe0b322842311d1d50af8af", 0x31}, 0x48, r0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r4, 0x1) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "973dbbc4712be38a26ea9a2d16a72331d67fd24c0d5356e27d9650d796fcad439ba6d43267d9650524e77fe84096203586ab52c9769d519d76445cef7bf387d6", 0x2a}, 0x48, r5) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) (async) add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x30, 0x62, 0x63, 0x33, 0x61, 0x39, 0x35, 0x0, 0x33, 0x38, 0x0, 0x65, 0x61, 0x38, 0x36, 0x64]}, &(0x7f0000000180)={0x0, "4fdb8bfd3d3072cd300e1f2fd253782fbcec715860e4e7015289f9742402573ccf89549510addb9d743e1a0227cdfae8b67f8f78bfe0b322842311d1d50af8af", 0x31}, 0x48, r0) (async) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$RTC_UIE_OFF(r3, 0x7004) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) (async) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) (async) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r4, 0x1) (async) add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) (async) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "973dbbc4712be38a26ea9a2d16a72331d67fd24c0d5356e27d9650d796fcad439ba6d43267d9650524e77fe84096203586ab52c9769d519d76445cef7bf387d6", 0x2a}, 0x48, r5) (async) [ 1625.354097] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1625.361359] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1625.368622] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1625.375885] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1625.383149] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:35 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="310000ff3e096d1a000000000000000000"], 0x21) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x1c}}, 0x20) (async) read$FUSE(r1, &(0x7f0000000200)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r5 = getegid() write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r5}}) (async) getresuid(&(0x7f0000004280)=0x0, &(0x7f00000042c0), &(0x7f0000004300)) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() (async) write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) (async) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r10 = getegid() write$FUSE_OPEN(r9, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r10}}) (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000004340)={0x540, 0xffffffffffffffda, 0x0, [{{0x4, 0x1, 0x9, 0x9, 0x2, 0x6, {0x6, 0x800004ed, 0x1, 0xb2, 0x7, 0xffff, 0x2, 0x8, 0x5, 0xa000, 0xffff764a, 0xee00, 0xffffffffffffffff, 0xa1, 0x4}}, {0x0, 0x940, 0xa, 0x6, '\x02[^%--!}*^'}}, {{0x3, 0x2, 0x8000, 0x4, 0x3, 0xf41, {0x3, 0x6fbec658, 0x2, 0x5, 0x7880aae, 0x6, 0x8, 0x6, 0x57cea068, 0xc000, 0x925, 0xee01, 0xee00, 0x10000, 0x2243669f}}, {0x6, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x2, 0x3, 0x0, 0x2c34, 0xff, 0xa8, {0x6, 0x1, 0x6178, 0x100000000, 0x0, 0x6, 0x800, 0x3, 0xc342, 0x0, 0x10000, 0x0, 0x0, 0x1f, 0x4}}, {0x1, 0xffffffffffffffd1, 0xa, 0x8001, '/dev/fuse\x00'}}, {{0x3, 0x0, 0x401, 0x4, 0x7fffffff, 0x3, {0x6, 0x6, 0x3, 0x409, 0x5, 0x1, 0x7, 0x10001, 0x2ffe, 0x4000, 0x9, 0xee01, 0xee01, 0x8, 0x6}}, {0x5, 0x1f, 0xa, 0xffffff00, '/dev/fuse\x00'}}, {{0x6, 0x0, 0x7, 0x800, 0x101, 0x8, {0x1, 0xffffffffffffff1d, 0x5, 0xac3, 0x2, 0x6, 0x2, 0x7, 0x999, 0x4000, 0x1, r2, 0xee00, 0x80, 0x3000}}, {0x4, 0x8000, 0xa, 0x3c, '/dev/fuse\x00'}}, {{0x3, 0x2, 0x32, 0x800, 0x15, 0x200, {0x0, 0x9, 0x94ad, 0x9, 0x415, 0x6, 0x3ff, 0xa6b7, 0x0, 0x8000, 0xfffffffd, r3, r5, 0x8, 0x1ff}}, {0x3, 0xfffffffffffffff9, 0x0, 0x8}}, {{0x2, 0x0, 0x3, 0x200, 0x8, 0x400, {0x1, 0x80000000, 0x10000, 0xcc, 0x3, 0x10000, 0x3, 0x7fff, 0xb0, 0x2000, 0x1, r6, r8, 0x5, 0x3f}}, {0x1, 0x2, 0xa, 0x0, '/dev/fuse\x00'}}, {{0x2, 0x3, 0xffffffff, 0x5, 0x5, 0x6, {0x6, 0x100000000, 0x8, 0x800000000000000, 0x1, 0x6, 0x9, 0x8, 0x3, 0x8000, 0x8, 0xee01, r10, 0xffffffff, 0x6}}, {0x1, 0x8000000000000001, 0xa, 0x2, '/dev/fuse\x00'}}]}, 0x540) 08:33:35 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r1) r2 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @auto=[0x30, 0x62, 0x63, 0x33, 0x61, 0x39, 0x35, 0x0, 0x33, 0x38, 0x0, 0x65, 0x61, 0x38, 0x36, 0x64]}, &(0x7f0000000180)={0x0, "4fdb8bfd3d3072cd300e1f2fd253782fbcec715860e4e7015289f9742402573ccf89549510addb9d743e1a0227cdfae8b67f8f78bfe0b322842311d1d50af8af", 0x31}, 0x48, r0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) r4 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "d8fbfc098d86817976b364504a60eb80c2241816f7837a31c7a825e9800bb30cdafb4247d9372229dfc6de1823062912971a1f46d7b26f4b831bd9a6a8d62854"}, 0x48, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000002140), 0x0, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r1, r2, r4, 0x1) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "973dbbc4712be38a26ea9a2d16a72331d67fd24c0d5356e27d9650d796fcad439ba6d43267d9650524e77fe84096203586ab52c9769d519d76445cef7bf387d6", 0x2a}, 0x48, r5) 08:33:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 08:33:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) (async) 08:33:35 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 80) 08:33:35 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/zd1301', 0x204001, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) iopl(0x5) sendmsg$SMC_PNETID_ADD(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2892540}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x20}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x80000) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) syz_open_dev$rtc(&(0x7f0000000280), 0x600, 0x44200) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000200)={0xc223}) r4 = socket$phonet_pipe(0x23, 0x5, 0x2) getpeername(r4, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/58, &(0x7f0000000180)=0x3a) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:35 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x8}}, 0x20) 08:33:35 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) 08:33:35 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/zd1301', 0x204001, 0x1c) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) (async) iopl(0x5) sendmsg$SMC_PNETID_ADD(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2892540}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x20}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x80000) (async) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) syz_open_dev$rtc(&(0x7f0000000280), 0x600, 0x44200) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000200)={0xc223}) r4 = socket$phonet_pipe(0x23, 0x5, 0x2) getpeername(r4, 0x0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/58, &(0x7f0000000180)=0x3a) (async) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) 08:33:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) [ 1625.564867] FAULT_INJECTION: forcing a failure. [ 1625.564867] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.611369] CPU: 1 PID: 13467 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1625.619268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.628618] Call Trace: [ 1625.631205] dump_stack+0x1b2/0x281 [ 1625.634835] should_fail.cold+0x10a/0x149 [ 1625.638985] should_failslab+0xd6/0x130 [ 1625.642956] kmem_cache_alloc+0x28e/0x3c0 [ 1625.647107] alloc_inode+0xa0/0x170 [ 1625.650732] new_inode+0x1d/0xf0 [ 1625.654103] fuse_ctl_add_dentry+0x8d/0x410 [ 1625.658425] ? __lockdep_init_map+0x100/0x560 [ 1625.662920] fuse_ctl_add_conn+0x1b0/0x250 [ 1625.667154] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1625.671818] ? CIFSSMBQFileInfo+0x166/0xae0 [ 1625.676143] fuse_fill_super+0xe0c/0x15c0 [ 1625.680293] ? fuse_get_root_inode+0xc0/0xc0 [ 1625.684699] ? up_write+0x17/0x60 [ 1625.688146] ? register_shrinker+0x15f/0x220 [ 1625.692552] ? sget_userns+0x768/0xc10 [ 1625.696441] ? get_anon_bdev+0x1c0/0x1c0 [ 1625.700494] ? sget+0xd9/0x110 [ 1625.703677] ? fuse_get_root_inode+0xc0/0xc0 [ 1625.708081] mount_nodev+0x4c/0xf0 08:33:35 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x8}}, 0x20) 08:33:35 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)=r0) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x8}}, 0x20) [ 1625.711618] mount_fs+0x92/0x2a0 [ 1625.714983] vfs_kern_mount.part.0+0x5b/0x470 [ 1625.719479] do_mount+0xe65/0x2a30 [ 1625.723016] ? __do_page_fault+0x159/0xad0 [ 1625.727247] ? retint_kernel+0x2d/0x2d [ 1625.731133] ? copy_mount_string+0x40/0x40 [ 1625.735367] ? memset+0x20/0x40 [ 1625.738642] ? copy_mount_options+0x1fa/0x2f0 [ 1625.743134] ? copy_mnt_ns+0xa30/0xa30 [ 1625.747018] SyS_mount+0xa8/0x120 [ 1625.750471] ? copy_mnt_ns+0xa30/0xa30 [ 1625.754357] do_syscall_64+0x1d5/0x640 08:33:35 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000002580)=0x0, &(0x7f00000025c0), &(0x7f0000002600)) read$FUSE(r1, &(0x7f0000002640)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000004700), &(0x7f0000004740)=0x0, &(0x7f0000004780)) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = getegid() write$FUSE_OPEN(r5, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r6}}) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) read$FUSE(r1, &(0x7f0000004980)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000006ac0)={&(0x7f0000000240)={0x50, 0x0, 0xfffffffffffff000, {0x7, 0x24, 0xaf81, 0x4, 0x1, 0x8000, 0x6, 0x3}}, &(0x7f00000002c0)={0x18, 0x0, 0x8, {0x3}}, &(0x7f0000000300)={0x18, 0x0, 0x9, {0x6}}, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x566, {0xe358}}, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x2}}, &(0x7f00000003c0)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x9, 0x2, 0xffffffffffffffff}}}, &(0x7f0000002440)={0x60, 0x0, 0x3ff, {{0x3, 0x8, 0x87, 0x0, 0x3ff, 0x1000, 0x400, 0x6}}}, &(0x7f00000024c0)={0x18, 0x0, 0xa48, {0x3f}}, &(0x7f0000002500)={0x1a, 0xfffffffffffffff5, 0x9, {'/dev/fuse\x00'}}, &(0x7f0000002540)={0x20, 0x0, 0x81, {0x0, 0x14}}, &(0x7f0000004680)={0x78, 0x0, 0x0, {0x3, 0x0, 0x0, {0x1, 0x2, 0xfffffffffffffffd, 0x10001, 0x48, 0x7fff, 0x7f, 0xa79, 0x7, 0xc000, 0x7, r2, r3, 0x5}}}, &(0x7f00000047c0)={0x90, 0xfffffffffffffffe, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x401, 0x95, 0x5, {0x6, 0xd362, 0x5, 0x9, 0x9, 0x5, 0x3, 0x5, 0x6, 0x1000, 0x1, r4, r6, 0x80, 0x7}}}, &(0x7f0000004880)={0x10, 0x0, 0x1fa0}, &(0x7f00000048c0)={0xb0, 0xffffffffffffffda, 0x4, [{{0x0, 0x2, 0x0, 0x3, 0x4, 0x8fe, {0x2, 0x1, 0xfff, 0x19, 0x7, 0xa8a, 0xff, 0xfffffffd, 0xd3, 0xa000, 0x4, 0xee01, r8, 0x6d9, 0x9}}, {0x5, 0x6, 0x1, 0x2, '^'}}]}, &(0x7f00000069c0)={0xa0, 0x0, 0x9, {{0x1, 0x1, 0x0, 0x5, 0x9b2, 0x3, {0x0, 0xfffffffffffffffa, 0x6, 0x1, 0x0, 0x7f, 0x7fffffff, 0x8c, 0x5, 0xc000, 0x8000, r9, 0xee01, 0x4, 0x4}}, {0x0, 0xa}}}, &(0x7f0000006a80)={0x20, 0x0, 0x6e, {0x4, 0x0, 0x1d79, 0x1ff}}}) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r10) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4881868fd4f4505d) 08:33:35 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/zd1301', 0x204001, 0x1c) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r3) iopl(0x5) (async) sendmsg$SMC_PNETID_ADD(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2892540}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'geneve0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x20}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x80000) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000240)) syz_open_dev$rtc(&(0x7f0000000280), 0x600, 0x44200) (async) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000200)={0xc223}) (async) r4 = socket$phonet_pipe(0x23, 0x5, 0x2) getpeername(r4, 0x0, &(0x7f0000000180)) (async) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/58, &(0x7f0000000180)=0x3a) (async) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) [ 1625.758244] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1625.763427] RIP: 0033:0x7f2196c8261a [ 1625.767128] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1625.774836] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1625.782105] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1625.789372] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1625.796637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1625.803899] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) 08:33:35 executing program 4: write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x6, 0x80142, 0x2, 0x5, 0xffffffff, 0x8a5f}}, 0x50) sched_setparam(0xffffffffffffffff, &(0x7f0000000040)=0x8) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) get_robust_list(0xffffffffffffffff, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES64=r0]) 08:33:35 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 81) 08:33:35 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002180)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) 08:33:35 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000002580)=0x0, &(0x7f00000025c0), &(0x7f0000002600)) read$FUSE(r1, &(0x7f0000002640)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000004700), &(0x7f0000004740)=0x0, &(0x7f0000004780)) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = getegid() write$FUSE_OPEN(r5, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r6}}) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) read$FUSE(r1, &(0x7f0000004980)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000006ac0)={&(0x7f0000000240)={0x50, 0x0, 0xfffffffffffff000, {0x7, 0x24, 0xaf81, 0x4, 0x1, 0x8000, 0x6, 0x3}}, &(0x7f00000002c0)={0x18, 0x0, 0x8, {0x3}}, &(0x7f0000000300)={0x18, 0x0, 0x9, {0x6}}, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x566, {0xe358}}, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x2}}, &(0x7f00000003c0)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x9, 0x2, 0xffffffffffffffff}}}, &(0x7f0000002440)={0x60, 0x0, 0x3ff, {{0x3, 0x8, 0x87, 0x0, 0x3ff, 0x1000, 0x400, 0x6}}}, &(0x7f00000024c0)={0x18, 0x0, 0xa48, {0x3f}}, &(0x7f0000002500)={0x1a, 0xfffffffffffffff5, 0x9, {'/dev/fuse\x00'}}, &(0x7f0000002540)={0x20, 0x0, 0x81, {0x0, 0x14}}, &(0x7f0000004680)={0x78, 0x0, 0x0, {0x3, 0x0, 0x0, {0x1, 0x2, 0xfffffffffffffffd, 0x10001, 0x48, 0x7fff, 0x7f, 0xa79, 0x7, 0xc000, 0x7, r2, r3, 0x5}}}, &(0x7f00000047c0)={0x90, 0xfffffffffffffffe, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x401, 0x95, 0x5, {0x6, 0xd362, 0x5, 0x9, 0x9, 0x5, 0x3, 0x5, 0x6, 0x1000, 0x1, r4, r6, 0x80, 0x7}}}, &(0x7f0000004880)={0x10, 0x0, 0x1fa0}, &(0x7f00000048c0)={0xb0, 0xffffffffffffffda, 0x4, [{{0x0, 0x2, 0x0, 0x3, 0x4, 0x8fe, {0x2, 0x1, 0xfff, 0x19, 0x7, 0xa8a, 0xff, 0xfffffffd, 0xd3, 0xa000, 0x4, 0xee01, r8, 0x6d9, 0x9}}, {0x5, 0x6, 0x1, 0x2, '^'}}]}, &(0x7f00000069c0)={0xa0, 0x0, 0x9, {{0x1, 0x1, 0x0, 0x5, 0x9b2, 0x3, {0x0, 0xfffffffffffffffa, 0x6, 0x1, 0x0, 0x7f, 0x7fffffff, 0x8c, 0x5, 0xc000, 0x8000, r9, 0xee01, 0x4, 0x4}}, {0x0, 0xa}}}, &(0x7f0000006a80)={0x20, 0x0, 0x6e, {0x4, 0x0, 0x1d79, 0x1ff}}}) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r10) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4881868fd4f4505d) socket$nl_crypto(0x10, 0x3, 0x15) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) (async) read$FUSE(r1, &(0x7f0000002640)={0x2020}, 0x2020) (async) getresuid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r5, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r6}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) (async) read$FUSE(r1, &(0x7f0000004980)={0x2020}, 0x2020) (async) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000006ac0)={&(0x7f0000000240)={0x50, 0x0, 0xfffffffffffff000, {0x7, 0x24, 0xaf81, 0x4, 0x1, 0x8000, 0x6, 0x3}}, &(0x7f00000002c0)={0x18, 0x0, 0x8, {0x3}}, &(0x7f0000000300)={0x18, 0x0, 0x9, {0x6}}, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x566, {0xe358}}, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x2}}, &(0x7f00000003c0)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x9, 0x2, 0xffffffffffffffff}}}, &(0x7f0000002440)={0x60, 0x0, 0x3ff, {{0x3, 0x8, 0x87, 0x0, 0x3ff, 0x1000, 0x400, 0x6}}}, &(0x7f00000024c0)={0x18, 0x0, 0xa48, {0x3f}}, &(0x7f0000002500)={0x1a, 0xfffffffffffffff5, 0x9, {'/dev/fuse\x00'}}, &(0x7f0000002540)={0x20, 0x0, 0x81, {0x0, 0x14}}, &(0x7f0000004680)={0x78, 0x0, 0x0, {0x3, 0x0, 0x0, {0x1, 0x2, 0xfffffffffffffffd, 0x10001, 0x48, 0x7fff, 0x7f, 0xa79, 0x7, 0xc000, 0x7, r2, r3, 0x5}}}, &(0x7f00000047c0)={0x90, 0xfffffffffffffffe, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x401, 0x95, 0x5, {0x6, 0xd362, 0x5, 0x9, 0x9, 0x5, 0x3, 0x5, 0x6, 0x1000, 0x1, r4, r6, 0x80, 0x7}}}, &(0x7f0000004880)={0x10, 0x0, 0x1fa0}, &(0x7f00000048c0)={0xb0, 0xffffffffffffffda, 0x4, [{{0x0, 0x2, 0x0, 0x3, 0x4, 0x8fe, {0x2, 0x1, 0xfff, 0x19, 0x7, 0xa8a, 0xff, 0xfffffffd, 0xd3, 0xa000, 0x4, 0xee01, r8, 0x6d9, 0x9}}, {0x5, 0x6, 0x1, 0x2, '^'}}]}, &(0x7f00000069c0)={0xa0, 0x0, 0x9, {{0x1, 0x1, 0x0, 0x5, 0x9b2, 0x3, {0x0, 0xfffffffffffffffa, 0x6, 0x1, 0x0, 0x7f, 0x7fffffff, 0x8c, 0x5, 0xc000, 0x8000, r9, 0xee01, 0x4, 0x4}}, {0x0, 0xa}}}, &(0x7f0000006a80)={0x20, 0x0, 0x6e, {0x4, 0x0, 0x1d79, 0x1ff}}}) (async) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r10) (async) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4881868fd4f4505d) (async) 08:33:35 executing program 4: write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x6, 0x80142, 0x2, 0x5, 0xffffffff, 0x8a5f}}, 0x50) (async) sched_setparam(0xffffffffffffffff, &(0x7f0000000040)=0x8) (async) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) get_robust_list(0xffffffffffffffff, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES64=r0]) 08:33:35 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) [ 1625.955866] FAULT_INJECTION: forcing a failure. [ 1625.955866] name failslab, interval 1, probability 0, space 0, times 0 [ 1625.968296] CPU: 1 PID: 13531 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1625.976190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1625.985538] Call Trace: [ 1625.988121] dump_stack+0x1b2/0x281 [ 1625.991753] should_fail.cold+0x10a/0x149 [ 1625.995912] should_failslab+0xd6/0x130 [ 1625.999888] kmem_cache_alloc+0x28e/0x3c0 [ 1626.004042] alloc_inode+0xa0/0x170 [ 1626.007681] new_inode+0x1d/0xf0 [ 1626.011052] fuse_ctl_add_dentry+0x8d/0x410 [ 1626.015372] ? __lockdep_init_map+0x100/0x560 [ 1626.019867] fuse_ctl_add_conn+0x17c/0x250 [ 1626.024099] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1626.028772] fuse_fill_super+0xe0c/0x15c0 [ 1626.032920] ? fuse_get_root_inode+0xc0/0xc0 [ 1626.037330] ? up_write+0x17/0x60 [ 1626.040782] ? register_shrinker+0x15f/0x220 [ 1626.045187] ? sget_userns+0x768/0xc10 [ 1626.049077] ? get_anon_bdev+0x1c0/0x1c0 [ 1626.053134] ? sget+0xd9/0x110 [ 1626.056329] ? fuse_get_root_inode+0xc0/0xc0 [ 1626.060736] mount_nodev+0x4c/0xf0 [ 1626.064278] mount_fs+0x92/0x2a0 [ 1626.067647] vfs_kern_mount.part.0+0x5b/0x470 [ 1626.072143] do_mount+0xe65/0x2a30 [ 1626.075681] ? __do_page_fault+0x159/0xad0 [ 1626.079914] ? retint_kernel+0x2d/0x2d [ 1626.083802] ? copy_mount_string+0x40/0x40 [ 1626.088036] ? memset+0x20/0x40 [ 1626.091317] ? copy_mount_options+0x1fa/0x2f0 [ 1626.095808] ? copy_mnt_ns+0xa30/0xa30 [ 1626.099694] SyS_mount+0xa8/0x120 [ 1626.103149] ? copy_mnt_ns+0xa30/0xa30 [ 1626.107036] do_syscall_64+0x1d5/0x640 [ 1626.110931] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1626.116116] RIP: 0033:0x7f2196c8261a [ 1626.119821] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1626.127527] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1626.134793] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1626.142057] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1626.149319] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 08:33:35 executing program 4: write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x6, 0x80142, 0x2, 0x5, 0xffffffff, 0x8a5f}}, 0x50) (async) sched_setparam(0xffffffffffffffff, &(0x7f0000000040)=0x8) (async) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) get_robust_list(0xffffffffffffffff, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES64=r0]) 08:33:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6695f6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75f05f69643dff78e02b0635928212e099cd72e0a4668ebe3d2226f8393b220e05c77c6f2db9d3600feb6c66726b35cbd205abb7ee9e24d4e7aec8d0731a5854030ac963907f16d2f116b85374", @ANYRESDEC=0x0, @ANYBLOB="2cfbf034085c858a613f4882a0c23b89174506660962edd8509ba3e51a3d096cf1ae832305ce894df34d0d4768e2771fe6a18957e4ac852b488d1747d110b25b7dd682fe4e4e58d39484ad43ebae76738d267d286da82ae0c1c30af348a270e06be2403568a10e28381a5020d0f87ad009d86cfc69dc27adc943b6c7f4c3aca386b80b73721a000b7c4e7c"]) 08:33:35 executing program 2: write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000000c0)={0x50, 0xfffffffffffffff5, 0x0, {0x7, 0x24, 0x6, 0x80142, 0x2, 0x5, 0xffffffff, 0x8a5f}}, 0x50) sched_setparam(0xffffffffffffffff, &(0x7f0000000040)=0x8) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) get_robust_list(0xffffffffffffffff, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000340)={&(0x7f0000000300)}}, &(0x7f0000000400)=0x18) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00', @ANYRES64=r0]) [ 1626.156590] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:35 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) 08:33:35 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000002580)=0x0, &(0x7f00000025c0), &(0x7f0000002600)) read$FUSE(r1, &(0x7f0000002640)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000004700), &(0x7f0000004740)=0x0, &(0x7f0000004780)) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = getegid() write$FUSE_OPEN(r5, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r6}}) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) read$FUSE(r1, &(0x7f0000004980)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000006ac0)={&(0x7f0000000240)={0x50, 0x0, 0xfffffffffffff000, {0x7, 0x24, 0xaf81, 0x4, 0x1, 0x8000, 0x6, 0x3}}, &(0x7f00000002c0)={0x18, 0x0, 0x8, {0x3}}, &(0x7f0000000300)={0x18, 0x0, 0x9, {0x6}}, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x566, {0xe358}}, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x2}}, &(0x7f00000003c0)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x9, 0x2, 0xffffffffffffffff}}}, &(0x7f0000002440)={0x60, 0x0, 0x3ff, {{0x3, 0x8, 0x87, 0x0, 0x3ff, 0x1000, 0x400, 0x6}}}, &(0x7f00000024c0)={0x18, 0x0, 0xa48, {0x3f}}, &(0x7f0000002500)={0x1a, 0xfffffffffffffff5, 0x9, {'/dev/fuse\x00'}}, &(0x7f0000002540)={0x20, 0x0, 0x81, {0x0, 0x14}}, &(0x7f0000004680)={0x78, 0x0, 0x0, {0x3, 0x0, 0x0, {0x1, 0x2, 0xfffffffffffffffd, 0x10001, 0x48, 0x7fff, 0x7f, 0xa79, 0x7, 0xc000, 0x7, r2, r3, 0x5}}}, &(0x7f00000047c0)={0x90, 0xfffffffffffffffe, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x401, 0x95, 0x5, {0x6, 0xd362, 0x5, 0x9, 0x9, 0x5, 0x3, 0x5, 0x6, 0x1000, 0x1, r4, r6, 0x80, 0x7}}}, &(0x7f0000004880)={0x10, 0x0, 0x1fa0}, &(0x7f00000048c0)={0xb0, 0xffffffffffffffda, 0x4, [{{0x0, 0x2, 0x0, 0x3, 0x4, 0x8fe, {0x2, 0x1, 0xfff, 0x19, 0x7, 0xa8a, 0xff, 0xfffffffd, 0xd3, 0xa000, 0x4, 0xee01, r8, 0x6d9, 0x9}}, {0x5, 0x6, 0x1, 0x2, '^'}}]}, &(0x7f00000069c0)={0xa0, 0x0, 0x9, {{0x1, 0x1, 0x0, 0x5, 0x9b2, 0x3, {0x0, 0xfffffffffffffffa, 0x6, 0x1, 0x0, 0x7f, 0x7fffffff, 0x8c, 0x5, 0xc000, 0x8000, r9, 0xee01, 0x4, 0x4}}, {0x0, 0xa}}}, &(0x7f0000006a80)={0x20, 0x0, 0x6e, {0x4, 0x0, 0x1d79, 0x1ff}}}) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r10) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4881868fd4f4505d) socket$nl_crypto(0x10, 0x3, 0x15) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) (async) read$FUSE(r1, &(0x7f0000002640)={0x2020}, 0x2020) (async) getresuid(&(0x7f0000004700), &(0x7f0000004740), &(0x7f0000004780)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r5, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r6}}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) getegid() (async) write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) (async) read$FUSE(r1, &(0x7f0000004980)={0x2020}, 0x2020) (async) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000006ac0)={&(0x7f0000000240)={0x50, 0x0, 0xfffffffffffff000, {0x7, 0x24, 0xaf81, 0x4, 0x1, 0x8000, 0x6, 0x3}}, &(0x7f00000002c0)={0x18, 0x0, 0x8, {0x3}}, &(0x7f0000000300)={0x18, 0x0, 0x9, {0x6}}, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x566, {0xe358}}, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x2}}, &(0x7f00000003c0)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x9, 0x2, 0xffffffffffffffff}}}, &(0x7f0000002440)={0x60, 0x0, 0x3ff, {{0x3, 0x8, 0x87, 0x0, 0x3ff, 0x1000, 0x400, 0x6}}}, &(0x7f00000024c0)={0x18, 0x0, 0xa48, {0x3f}}, &(0x7f0000002500)={0x1a, 0xfffffffffffffff5, 0x9, {'/dev/fuse\x00'}}, &(0x7f0000002540)={0x20, 0x0, 0x81, {0x0, 0x14}}, &(0x7f0000004680)={0x78, 0x0, 0x0, {0x3, 0x0, 0x0, {0x1, 0x2, 0xfffffffffffffffd, 0x10001, 0x48, 0x7fff, 0x7f, 0xa79, 0x7, 0xc000, 0x7, r2, r3, 0x5}}}, &(0x7f00000047c0)={0x90, 0xfffffffffffffffe, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x401, 0x95, 0x5, {0x6, 0xd362, 0x5, 0x9, 0x9, 0x5, 0x3, 0x5, 0x6, 0x1000, 0x1, r4, r6, 0x80, 0x7}}}, &(0x7f0000004880)={0x10, 0x0, 0x1fa0}, &(0x7f00000048c0)={0xb0, 0xffffffffffffffda, 0x4, [{{0x0, 0x2, 0x0, 0x3, 0x4, 0x8fe, {0x2, 0x1, 0xfff, 0x19, 0x7, 0xa8a, 0xff, 0xfffffffd, 0xd3, 0xa000, 0x4, 0xee01, r8, 0x6d9, 0x9}}, {0x5, 0x6, 0x1, 0x2, '^'}}]}, &(0x7f00000069c0)={0xa0, 0x0, 0x9, {{0x1, 0x1, 0x0, 0x5, 0x9b2, 0x3, {0x0, 0xfffffffffffffffa, 0x6, 0x1, 0x0, 0x7f, 0x7fffffff, 0x8c, 0x5, 0xc000, 0x8000, r9, 0xee01, 0x4, 0x4}}, {0x0, 0xa}}}, &(0x7f0000006a80)={0x20, 0x0, 0x6e, {0x4, 0x0, 0x1d79, 0x1ff}}}) (async) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r10) (async) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4881868fd4f4505d) (async) 08:33:35 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 82) 08:33:36 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5", 0x2}, 0x48, 0xfffffffffffffffc) (async) 08:33:36 executing program 2: r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) getresuid(&(0x7f0000002580)=0x0, &(0x7f00000025c0), &(0x7f0000002600)) read$FUSE(r1, &(0x7f0000002640)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000004700), &(0x7f0000004740)=0x0, &(0x7f0000004780)) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r6 = getegid() write$FUSE_OPEN(r5, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r6}}) r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r8 = getegid() write$FUSE_OPEN(r7, &(0x7f00000001c0)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000140)={{'fd', 0x3d, r7}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r8}}) read$FUSE(r1, &(0x7f0000004980)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000006ac0)={&(0x7f0000000240)={0x50, 0x0, 0xfffffffffffff000, {0x7, 0x24, 0xaf81, 0x4, 0x1, 0x8000, 0x6, 0x3}}, &(0x7f00000002c0)={0x18, 0x0, 0x8, {0x3}}, &(0x7f0000000300)={0x18, 0x0, 0x9, {0x6}}, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x566, {0xe358}}, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x2}}, &(0x7f00000003c0)={0x28, 0x0, 0x4, {{0xffffffffffffffff, 0x9, 0x2, 0xffffffffffffffff}}}, &(0x7f0000002440)={0x60, 0x0, 0x3ff, {{0x3, 0x8, 0x87, 0x0, 0x3ff, 0x1000, 0x400, 0x6}}}, &(0x7f00000024c0)={0x18, 0x0, 0xa48, {0x3f}}, &(0x7f0000002500)={0x1a, 0xfffffffffffffff5, 0x9, {'/dev/fuse\x00'}}, &(0x7f0000002540)={0x20, 0x0, 0x81, {0x0, 0x14}}, &(0x7f0000004680)={0x78, 0x0, 0x0, {0x3, 0x0, 0x0, {0x1, 0x2, 0xfffffffffffffffd, 0x10001, 0x48, 0x7fff, 0x7f, 0xa79, 0x7, 0xc000, 0x7, r2, r3, 0x5}}}, &(0x7f00000047c0)={0x90, 0xfffffffffffffffe, 0x3, {0x2, 0x2, 0xfffffffffffffff7, 0x401, 0x95, 0x5, {0x6, 0xd362, 0x5, 0x9, 0x9, 0x5, 0x3, 0x5, 0x6, 0x1000, 0x1, r4, r6, 0x80, 0x7}}}, &(0x7f0000004880)={0x10, 0x0, 0x1fa0}, &(0x7f00000048c0)={0xb0, 0xffffffffffffffda, 0x4, [{{0x0, 0x2, 0x0, 0x3, 0x4, 0x8fe, {0x2, 0x1, 0xfff, 0x19, 0x7, 0xa8a, 0xff, 0xfffffffd, 0xd3, 0xa000, 0x4, 0xee01, r8, 0x6d9, 0x9}}, {0x5, 0x6, 0x1, 0x2, '^'}}]}, &(0x7f00000069c0)={0xa0, 0x0, 0x9, {{0x1, 0x1, 0x0, 0x5, 0x9b2, 0x3, {0x0, 0xfffffffffffffffa, 0x6, 0x1, 0x0, 0x7f, 0x7fffffff, 0x8c, 0x5, 0xc000, 0x8000, r9, 0xee01, 0x4, 0x4}}, {0x0, 0xa}}}, &(0x7f0000006a80)={0x20, 0x0, 0x6e, {0x4, 0x0, 0x1d79, 0x1ff}}}) write$FUSE_OPEN(r1, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r10 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r10) sendmsg$L2TP_CMD_SESSION_GET(r10, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x9}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x3f}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x4881868fd4f4505d) 08:33:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@blksize}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}]}}) 08:33:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6695f6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75f05f69643dff78e02b0635928212e099cd72e0a4668ebe3d2226f8393b220e05c77c6f2db9d3600feb6c66726b35cbd205abb7ee9e24d4e7aec8d0731a5854030ac963907f16d2f116b85374", @ANYRESDEC=0x0, @ANYBLOB="2cfbf034085c858a613f4882a0c23b89174506660962edd8509ba3e51a3d096cf1ae832305ce894df34d0d4768e2771fe6a18957e4ac852b488d1747d110b25b7dd682fe4e4e58d39484ad43ebae76738d267d286da82ae0c1c30af348a270e06be2403568a10e28381a5020d0f87ad009d86cfc69dc27adc943b6c7f4c3aca386b80b73721a000b7c4e7c"]) (rerun: 32) 08:33:36 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) 08:33:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@blksize}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}]}}) 08:33:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2851}, 0x40) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x1, &(0x7f0000000180)=@raw=[@generic={0x81, 0x6, 0x3, 0x20, 0x2}], &(0x7f0000000200)='GPL\x00', 0x7, 0xc1, &(0x7f0000000240)=""/193, 0x1f00, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x7, 0x4, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480)=r3, 0x4) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) [ 1626.370375] FAULT_INJECTION: forcing a failure. [ 1626.370375] name failslab, interval 1, probability 0, space 0, times 0 08:33:36 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) [ 1626.424563] CPU: 1 PID: 13613 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1626.432463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.441815] Call Trace: [ 1626.444400] dump_stack+0x1b2/0x281 [ 1626.448026] should_fail.cold+0x10a/0x149 [ 1626.452180] should_failslab+0xd6/0x130 [ 1626.456157] kmem_cache_alloc+0x28e/0x3c0 [ 1626.460319] alloc_inode+0xa0/0x170 [ 1626.463941] new_inode+0x1d/0xf0 [ 1626.467308] fuse_ctl_add_dentry+0x8d/0x410 08:33:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2851}, 0x40) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x1, &(0x7f0000000180)=@raw=[@generic={0x81, 0x6, 0x3, 0x20, 0x2}], &(0x7f0000000200)='GPL\x00', 0x7, 0xc1, &(0x7f0000000240)=""/193, 0x1f00, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x7, 0x4, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480)=r3, 0x4) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2851}, 0x40) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x1, &(0x7f0000000180)=@raw=[@generic={0x81, 0x6, 0x3, 0x20, 0x2}], &(0x7f0000000200)='GPL\x00', 0x7, 0xc1, &(0x7f0000000240)=""/193, 0x1f00, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x7, 0x4, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480)=r3, 0x4) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x9}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2851}, 0x40) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x1, &(0x7f0000000180)=@raw=[@generic={0x81, 0x6, 0x3, 0x20, 0x2}], &(0x7f0000000200)='GPL\x00', 0x7, 0xc1, &(0x7f0000000240)=""/193, 0x1f00, 0x14, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x7, 0x4, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff]}, 0x80) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000480)=r3, 0x4) (async) write$FUSE_OPEN(r2, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) (async) 08:33:36 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) (async) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) (async) [ 1626.471627] ? __lockdep_init_map+0x100/0x560 [ 1626.476124] fuse_ctl_add_conn+0x17c/0x250 [ 1626.480358] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 1626.485027] ? CIFSSMBQFileInfo+0x965/0xae0 [ 1626.489347] fuse_fill_super+0xe0c/0x15c0 [ 1626.493496] ? fuse_get_root_inode+0xc0/0xc0 [ 1626.497907] ? up_write+0x17/0x60 [ 1626.501356] ? register_shrinker+0x15f/0x220 [ 1626.505766] ? sget_userns+0x768/0xc10 [ 1626.509659] ? get_anon_bdev+0x1c0/0x1c0 [ 1626.513716] ? sget+0xd9/0x110 [ 1626.516913] ? fuse_get_root_inode+0xc0/0xc0 [ 1626.521320] mount_nodev+0x4c/0xf0 [ 1626.524856] mount_fs+0x92/0x2a0 [ 1626.528230] vfs_kern_mount.part.0+0x5b/0x470 [ 1626.532724] do_mount+0xe65/0x2a30 [ 1626.536269] ? __do_page_fault+0x159/0xad0 [ 1626.540498] ? retint_kernel+0x2d/0x2d [ 1626.544384] ? copy_mount_string+0x40/0x40 [ 1626.548617] ? memset+0x20/0x40 [ 1626.551900] ? copy_mount_options+0x1fa/0x2f0 [ 1626.556398] ? copy_mnt_ns+0xa30/0xa30 [ 1626.560282] SyS_mount+0xa8/0x120 [ 1626.563731] ? copy_mnt_ns+0xa30/0xa30 [ 1626.567619] do_syscall_64+0x1d5/0x640 [ 1626.571508] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1626.576692] RIP: 0033:0x7f2196c8261a [ 1626.580392] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1626.588096] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1626.595367] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1626.602631] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1626.609898] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1626.617162] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 08:33:36 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (fail_nth: 83) 08:33:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002140)={0x0, 0xee00, r1}, 0xc) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) socket$l2tp(0x2, 0x2, 0x73) 08:33:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6695f6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75f05f69643dff78e02b0635928212e099cd72e0a4668ebe3d2226f8393b220e05c77c6f2db9d3600feb6c66726b35cbd205abb7ee9e24d4e7aec8d0731a5854030ac963907f16d2f116b85374", @ANYRESDEC=0x0, @ANYBLOB="2cfbf034085c858a613f4882a0c23b89174506660962edd8509ba3e51a3d096cf1ae832305ce894df34d0d4768e2771fe6a18957e4ac852b488d1747d110b25b7dd682fe4e4e58d39484ad43ebae76738d267d286da82ae0c1c30af348a270e06be2403568a10e28381a5020d0f87ad009d86cfc69dc27adc943b6c7f4c3aca386b80b73721a000b7c4e7c"]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6695f6", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75f05f69643dff78e02b0635928212e099cd72e0a4668ebe3d2226f8393b220e05c77c6f2db9d3600feb6c66726b35cbd205abb7ee9e24d4e7aec8d0731a5854030ac963907f16d2f116b85374", @ANYRESDEC=0x0, @ANYBLOB="2cfbf034085c858a613f4882a0c23b89174506660962edd8509ba3e51a3d096cf1ae832305ce894df34d0d4768e2771fe6a18957e4ac852b488d1747d110b25b7dd682fe4e4e58d39484ad43ebae76738d267d286da82ae0c1c30af348a270e06be2403568a10e28381a5020d0f87ad009d86cfc69dc27adc943b6c7f4c3aca386b80b73721a000b7c4e7c"]) (async) 08:33:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@blksize}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x400}}]}}) 08:33:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 08:33:36 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002140)={0x0, 0xee00, r1}, 0xc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) socket$l2tp(0x2, 0x2, 0x73) 08:33:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0x0, r2}, 0x60) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f0000002200)={0xa0, 0xa2d14f0c6840d2e, r2, {{0x3, 0x0, 0x1, 0x8000000000000001, 0x72c, 0xff, {0x1, 0x2, 0x2, 0x0, 0x48000000, 0x80000000, 0x4b28, 0x3, 0x4, 0xa000, 0x3, r3, 0xffffffffffffffff, 0x5053, 0x3}}, {0x0, 0x18}}}, 0xa0) 08:33:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) write$FUSE_STATFS(r3, &(0x7f0000004140)={0x60, 0x0, r2, {{0x6, 0x20, 0x6, 0x8001, 0x3, 0x0, 0x9, 0xffffffff}}}, 0x60) write$FUSE_STATFS(r1, &(0x7f0000002080)={0x60, 0xffffffffffffffda, r2, {{0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x20}}}, 0x60) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 08:33:36 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f00000001c0)={0x20}, 0xffffffffffffff3f) 08:33:36 executing program 0: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000100), &(0x7f0000002200)=0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f0000000040)=r3) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LK(r4, &(0x7f0000000040)={0x28, 0x0, r5, {{0xfffffffffffffffd, 0x7, 0x1}}}, 0x28) [ 1626.781825] FAULT_INJECTION: forcing a failure. [ 1626.781825] name failslab, interval 1, probability 0, space 0, times 0 08:33:36 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000400), r0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002140)={0x0, 0xee00, r1}, 0xc) (async) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "c5821c4d4b7f0d12433f706e3e57cd3045912ca433362098aacabd8784edb0d63cc0c2978921085663f1b30584f6820cce3a58f4e978b2a93c5b798d3dcc0fb5"}, 0x48, 0xfffffffffffffffc) (async) socket$l2tp(0x2, 0x2, 0x73) [ 1626.828599] CPU: 1 PID: 13694 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1626.836501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1626.845849] Call Trace: [ 1626.848441] dump_stack+0x1b2/0x281 [ 1626.852074] should_fail.cold+0x10a/0x149 [ 1626.856241] should_failslab+0xd6/0x130 [ 1626.860217] __kmalloc_track_caller+0x2bc/0x400 [ 1626.864887] ? do_mount+0x1e41/0x2a30 [ 1626.868692] kstrdup+0x36/0x70 [ 1626.871886] do_mount+0x1e41/0x2a30 [ 1626.875513] ? __do_page_fault+0x159/0xad0 [ 1626.879744] ? retint_kernel+0x2d/0x2d [ 1626.883667] ? copy_mount_string+0x40/0x40 [ 1626.887899] ? memset+0x20/0x40 [ 1626.891175] ? copy_mount_options+0x1fa/0x2f0 [ 1626.895668] ? copy_mnt_ns+0xa30/0xa30 [ 1626.899554] SyS_mount+0xa8/0x120 [ 1626.903004] ? copy_mnt_ns+0xa30/0xa30 [ 1626.906887] do_syscall_64+0x1d5/0x640 [ 1626.910776] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1626.915960] RIP: 0033:0x7f2196c8261a [ 1626.919661] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1626.927367] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1626.934632] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1626.941898] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1626.949163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1626.956420] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 [ 1626.983924] BUG: unable to handle kernel paging request at fffffffffffffffc [ 1626.991043] IP: do_mount+0x1ef2/0x2a30 [ 1626.994915] PGD 8e6b067 P4D 8e6b067 PUD 8e6d067 PMD 0 [ 1627.000194] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1627.004676] Modules linked in: [ 1627.007871] CPU: 1 PID: 13694 Comm: syz-executor.1 Not tainted 4.14.280-syzkaller #0 [ 1627.015734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.025064] task: ffff8880a94902c0 task.stack: ffff88807c318000 [ 1627.031112] RIP: 0010:do_mount+0x1ef2/0x2a30 [ 1627.035502] RSP: 0018:ffff88807c31fd90 EFLAGS: 00010246 [ 1627.040839] RAX: dffffc0000000000 RBX: 00000000fffffff4 RCX: ffffc90007c0a000 [ 1627.048092] RDX: 1fffffffffffffff RSI: ffffffff818e8bc4 RDI: fffffffffffffffc [ 1627.055341] RBP: fffffffffffffff4 R08: ffffffff8ba0981c R09: 0000000000000001 [ 1627.062590] R10: 0000000000000000 R11: ffff8880a94902c0 R12: ffff8880aab3e428 [ 1627.069853] R13: ffffffff891e9ee0 R14: 0000000000000000 R15: 0000000000000020 [ 1627.077110] FS: 00007f21955f6700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 [ 1627.085313] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1627.091173] CR2: fffffffffffffffc CR3: 00000000aa72e000 CR4: 00000000003406e0 [ 1627.098421] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1627.105691] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1627.112938] Call Trace: [ 1627.115512] ? __do_page_fault+0x159/0xad0 [ 1627.119722] ? retint_kernel+0x2d/0x2d [ 1627.123590] ? copy_mount_string+0x40/0x40 [ 1627.127904] ? memset+0x20/0x40 [ 1627.131166] ? copy_mount_options+0x1fa/0x2f0 [ 1627.135649] ? copy_mnt_ns+0xa30/0xa30 [ 1627.139514] SyS_mount+0xa8/0x120 [ 1627.142950] ? copy_mnt_ns+0xa30/0xa30 [ 1627.146815] do_syscall_64+0x1d5/0x640 [ 1627.150684] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 1627.155851] RIP: 0033:0x7f2196c8261a [ 1627.159537] RSP: 002b:00007f21955f5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1627.167219] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2196c8261a [ 1627.174466] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1627.181711] RBP: 00007f21955f6020 R08: 00007f21955f6020 R09: 0000000020000000 [ 1627.188955] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1627.196200] R13: 0000000020000080 R14: 00007f21955f5fe0 R15: 0000000020000140 [ 1627.203456] Code: c6 ff 48 89 ef 48 63 eb e8 7c 61 ff ff 48 8d 7d 08 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 80 3c 02 00 0f 85 4b 08 00 00 <48> 8b 5d 08 e8 b5 ba c6 ff 48 8d 7b 70 e8 dc 52 b2 ff 4c 89 ef [ 1627.222536] RIP: do_mount+0x1ef2/0x2a30 RSP: ffff88807c31fd90 [ 1627.228391] CR2: fffffffffffffffc [ 1627.231826] ---[ end trace af7cb60374b44563 ]--- [ 1627.236555] Kernel panic - not syncing: Fatal exception [ 1627.242158] Kernel Offset: disabled [ 1627.245764] Rebooting in 86400 seconds..