[ 68.998481][ T26] audit: type=1800 audit(1565207040.839:27): pid=10085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 69.037919][ T26] audit: type=1800 audit(1565207040.839:28): pid=10085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 69.845410][ T26] audit: type=1800 audit(1565207041.749:29): pid=10085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 69.867905][ T26] audit: type=1800 audit(1565207041.749:30): pid=10085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.195' (ECDSA) to the list of known hosts. 2019/08/07 19:44:13 fuzzer started 2019/08/07 19:44:16 dialing manager at 10.128.0.26:42013 2019/08/07 19:44:16 syscalls: 2484 2019/08/07 19:44:16 code coverage: enabled 2019/08/07 19:44:16 comparison tracing: enabled 2019/08/07 19:44:16 extra coverage: extra coverage is not supported by the kernel 2019/08/07 19:44:16 setuid sandbox: enabled 2019/08/07 19:44:16 namespace sandbox: enabled 2019/08/07 19:44:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/07 19:44:16 fault injection: enabled 2019/08/07 19:44:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/07 19:44:16 net packet injection: enabled 2019/08/07 19:44:16 net device setup: enabled 19:45:03 executing program 0: 19:45:03 executing program 1: syzkaller login: [ 131.699756][T10254] IPVS: ftp: loaded support on port[0] = 21 [ 131.801886][T10254] chnl_net:caif_netlink_parms(): no params data found [ 131.870384][T10257] IPVS: ftp: loaded support on port[0] = 21 [ 131.879347][T10254] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.887643][T10254] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.909427][T10254] device bridge_slave_0 entered promiscuous mode [ 131.919913][T10254] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.931112][T10254] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.939488][T10254] device bridge_slave_1 entered promiscuous mode 19:45:03 executing program 2: [ 131.978023][T10254] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.002358][T10254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.051163][T10254] team0: Port device team_slave_0 added [ 132.066717][T10254] team0: Port device team_slave_1 added [ 132.143058][T10257] chnl_net:caif_netlink_parms(): no params data found [ 132.161081][T10260] IPVS: ftp: loaded support on port[0] = 21 19:45:04 executing program 3: [ 132.197944][T10254] device hsr_slave_0 entered promiscuous mode [ 132.275920][T10254] device hsr_slave_1 entered promiscuous mode [ 132.323898][T10254] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.331062][T10254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.338490][T10254] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.345598][T10254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.371877][T10262] IPVS: ftp: loaded support on port[0] = 21 19:45:04 executing program 4: [ 132.488005][T10257] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.499675][T10257] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.509988][T10257] device bridge_slave_0 entered promiscuous mode [ 132.548603][T10257] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.556330][T10257] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.564333][T10257] device bridge_slave_1 entered promiscuous mode [ 132.578053][T10254] 8021q: adding VLAN 0 to HW filter on device bond0 19:45:04 executing program 5: [ 132.687541][T10254] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.700733][T10265] IPVS: ftp: loaded support on port[0] = 21 [ 132.739329][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.749627][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.768358][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.776910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 132.805297][T10257] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 132.833430][T10257] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 132.853231][T10270] IPVS: ftp: loaded support on port[0] = 21 [ 132.862624][T10260] chnl_net:caif_netlink_parms(): no params data found [ 132.871588][T10262] chnl_net:caif_netlink_parms(): no params data found [ 132.888232][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.898449][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.907053][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.914202][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.927890][T10257] team0: Port device team_slave_0 added [ 132.943807][T10257] team0: Port device team_slave_1 added [ 132.958647][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.967480][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.976252][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.983381][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.032379][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 133.086805][T10257] device hsr_slave_0 entered promiscuous mode [ 133.125402][T10257] device hsr_slave_1 entered promiscuous mode [ 133.165221][T10257] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.177443][T10262] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.184546][T10262] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.192412][T10262] device bridge_slave_0 entered promiscuous mode [ 133.204637][T10262] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.212285][T10262] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.220035][T10262] device bridge_slave_1 entered promiscuous mode [ 133.243361][T10262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.261177][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 133.273136][T10262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.303712][T10260] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.312383][T10260] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.320151][T10260] device bridge_slave_0 entered promiscuous mode [ 133.329908][T10260] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.337161][T10260] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.344755][T10260] device bridge_slave_1 entered promiscuous mode [ 133.352784][T10262] team0: Port device team_slave_0 added [ 133.360103][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 133.368697][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 133.377350][ T3559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 133.401860][T10262] team0: Port device team_slave_1 added [ 133.417752][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 133.427526][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 133.527633][T10262] device hsr_slave_0 entered promiscuous mode [ 133.565539][T10262] device hsr_slave_1 entered promiscuous mode [ 133.625248][T10262] debugfs: Directory 'hsr0' with parent '/' already present! [ 133.634054][T10260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.647639][T10260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 133.657701][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.666197][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.674906][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.687108][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.722385][T10254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 133.749756][T10260] team0: Port device team_slave_0 added [ 133.757078][T10260] team0: Port device team_slave_1 added [ 133.807708][T10270] chnl_net:caif_netlink_parms(): no params data found [ 133.841113][T10265] chnl_net:caif_netlink_parms(): no params data found [ 133.927441][T10260] device hsr_slave_0 entered promiscuous mode [ 133.985634][T10260] device hsr_slave_1 entered promiscuous mode [ 134.025298][T10260] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.042114][T10254] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 134.104132][T10265] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.112278][T10265] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.121440][T10265] device bridge_slave_0 entered promiscuous mode [ 134.129353][T10265] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.136908][T10265] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.144558][T10265] device bridge_slave_1 entered promiscuous mode [ 134.161603][T10270] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.169585][T10270] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.177717][T10270] device bridge_slave_0 entered promiscuous mode [ 134.210813][T10265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 134.223186][T10270] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.230495][T10270] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.239362][T10270] device bridge_slave_1 entered promiscuous mode [ 134.258240][T10265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.280257][T10265] team0: Port device team_slave_0 added [ 134.288358][T10265] team0: Port device team_slave_1 added 19:45:06 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0x2003, 0x80080) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x200, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000340)=0x7ff) close(r0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x604202, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000240)={0x200, 0x9, 0x0, 'queue0\x00', 0x1}) poll(&(0x7f0000000100)=[{r0}], 0x1, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000000)) [ 134.305018][T10270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 19:45:06 executing program 0: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = signalfd(r0, &(0x7f0000000140)={0x8001}, 0x7) sendfile(r0, r1, &(0x7f0000000000), 0xffffffffffffff83) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="747970653df7edd4232c706172743d307830305e5a0530303030303030303030303030302c636f6465706167653d63703835322c66696c655f756d61736b3d3031373737373737373737373737373737373763ccebfd261d1b55686172736574396d6163696e7569742c646f6e745f686173682c0054801bf7f2c19a2f8d675ac3074bfb78bf9caac986f141fa02ff22c77605662c3740d9a88ef2be10500ce77957325793e9fd18db13ef84e833dd200d35bf4216ad54ac42eef8f20d181cceab4cf08940c3942f8541f506c87379cef2d8d3853ef17d2adb5ca37c0b6a5176d1f5146e5cc0d7cd54948b9b3511217f99111545750b194bf3e991c8f3adb21acc540ab24777f12b2ce5d46afa87cebf8434361a196b954de414821c08dac268a8973cb44c675c859e317ee288432b8d00020000827b82f364c7f49a1bb625ed109670ce2615d3d8ca0235f29b835ce6d498d6"]) [ 134.356519][T10257] 8021q: adding VLAN 0 to HW filter on device bond0 19:45:06 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x6, @mcast1, 0x4a}, {0xa, 0x4e24, 0x894, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfff}, 0x5, [0xffffffff, 0x7f, 0x3, 0x5, 0x308, 0x7, 0x1, 0x91]}, 0x5c) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_bond\x00'}) [ 134.397728][T10285] hfs: unable to parse mount options [ 134.403849][T10265] device hsr_slave_0 entered promiscuous mode [ 134.465563][T10265] device hsr_slave_1 entered promiscuous mode [ 134.495353][T10265] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.506935][T10270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.532399][T10270] team0: Port device team_slave_0 added [ 134.549625][T10270] team0: Port device team_slave_1 added [ 134.597059][T10270] device hsr_slave_0 entered promiscuous mode [ 134.645553][T10270] device hsr_slave_1 entered promiscuous mode [ 134.705158][T10270] debugfs: Directory 'hsr0' with parent '/' already present! [ 134.718372][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.725941][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.735402][T10257] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.744851][T10260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.769274][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 134.778146][ T3556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.787020][ T3556] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.794058][ T3556] bridge0: port 1(bridge_slave_0) entered forwarding state 19:45:06 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @loopback}}, [0x3f, 0x4, 0x9, 0x7, 0x4, 0xfffffffffffffff8, 0x6753, 0x7, 0x9, 0x1f, 0x8196, 0xeb, 0x1, 0x6, 0x80000001]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r1, 0x8001}, 0x8) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000180)="24000000010407031dfffd946fa2830009200a0009000100041d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 134.821502][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 134.833410][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 134.844515][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.853286][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.860461][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state 19:45:06 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x0, 0x0}, 0x10) r0 = socket(0x0, 0x3, 0x36dd636) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffecf, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x97}, 0x70) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 134.876911][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.884763][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.903491][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 134.913172][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 134.938181][T10262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 134.954504][T10260] 8021q: adding VLAN 0 to HW filter on device team0 [ 134.981153][T10257] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 134.993098][T10257] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 135.013564][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.022536][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.031331][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.040848][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.051180][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.061147][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.071412][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 19:45:07 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'hwsim0\x00', 0x8}) ioctl$sock_SIOCETHTOOL(r1, 0x8981, &(0x7f0000000040)={'sit0\x00', 0x0}) [ 135.079991][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.088548][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.097363][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.106378][ T2986] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.113544][ T2986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.151535][T10262] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.173999][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.181931][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.191245][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.199255][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.207181][ T2986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.232172][T10257] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 135.242557][T10270] 8021q: adding VLAN 0 to HW filter on device bond0 19:45:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x1, 0x0) [ 135.253953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.266163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.274505][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.281601][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.298523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.307639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.316352][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.323422][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.331415][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.341284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 135.349923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.352024][T10314] overlayfs: missing 'lowerdir' [ 135.358390][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.370284][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.377969][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.386797][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 135.395492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 135.405823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 135.413627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.422446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.448383][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.465886][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 135.474455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 135.483293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.492008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.500506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.509016][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.522796][T10270] 8021q: adding VLAN 0 to HW filter on device team0 [ 135.538222][T10262] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 135.549962][T10262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.557829][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 135.567637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 135.575890][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.583421][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 135.592362][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 135.601039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 135.609276][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.617330][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 135.626939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.640040][T10260] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 135.652544][T10260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 135.667478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 135.676244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.684576][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.691677][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 19:45:07 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4000000000000) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000001c0)={0x0, 0x3, {0x53, 0x0, 0x645c, {}, {}, @rumble={0xffffffff, 0x8000}}, {0x0, 0x0, 0x0, {0x4}, {}, @cond=[{0x0, 0x0, 0x1ff, 0x100, 0x4, 0x1}, {0x101, 0x0, 0x4, 0x322e, 0x0, 0x3}]}}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='4/\bgzoup\x00Tz\xf7\x05\xbc\f\x02\xff\xab\x84\xe4J\xa8:\r\xefje0\x99?\x89 \x9dV\xd6\xf2\xb3\xee\x15\xfd7P\xb2\x17\xebE`\x886\xb01\x9e\xc1i*\xbae\xc4\x84\a/\xbbN\xa5\xeds3?\xa2/K\xa5\xce\xd9\x00\x00\xe8w\x16:\xa1\xe0\xbd\x93\x15\x9c\xa7\xa8r\xc0v\xcb$$\x15\xf1\v\xddn\x7f\xa6\x99\xcc7#2I\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab\v\xe4!\x9a\xba\xf2\x99\xf8\xf6mw\xae\xfa\xcacg\xdc\xd7D\xef\xbb/\xa0G\n\x81\x00\x00\x00g\x9aE\x0e\\\xb8\xd2q\x8f\xeb\x89\x90:l\xe9[=\"n\xd0\xe2\v\x8b)<\x0f\xbf\x88M\x01\xbd\x8f6\x0e\n\x1c\x85j\"g#\xf8\v\x18!\xcb*-s\bR\xf6k\x7f\xc0\x9f\'\xc3\x94\xbc\xf8\xacr6\xa0\xe7\xf1\xacS\x1f\xe6YH\xe8\x15\xc6\xde\xab\xf8\x1d}\xfd\x03\xda\x13\xb7\xa4A\xb8\xd5Jr\xeeB\xc7m\xad\xca\xf7\xbc\xcc\x8d\r9\x1b\xf8\xcd\xa3\xe8\xfc\xf2\x8b0x0, 0x1000, "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"}, &(0x7f00000010c0)=0x1008) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000001100)=r1, 0x4) r2 = socket(0xa, 0x1, 0x0) ioctl(r2, 0x8916, &(0x7f0000000000)) 19:45:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000080)=0x1) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000002c0)=0x1f, 0x4) socketpair(0x0, 0x0, 0x7ff, &(0x7f0000000100)) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x80000000, 0x9, 0xc0, &(0x7f0000000140)="8f3aa8dd090410558d316b2935190abeff034ae2178aae32bf036df754829ffa2cac7bea460bf79dd56d9ba6d24cf4fb802abeffa74c406364308442ef483ec79b49ee4c36b7d0b8be91ca7481bd0341cfd1e497862cdef71a3ffbdc88953c0bb87092664d894134945a5440a614111439085bcc607fcb5d77be279c05689ab72453777b2217351a1b47f817674b854219e84e9872f2112231d6ce3ec55bea636c999df9ccd798fee6ec2d5feedf6a6056cfeb799b89b524906d7972d73b510e"}) close(r1) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x19b4, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x80000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x401) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x5) [ 137.066275][T10370] BTRFS error (device loop3): open_ctree failed 19:45:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x808200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 137.237673][ T26] audit: type=1804 audit(1565207109.139:33): pid=10404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir554024029/syzkaller.KHlJHK/1/file0" dev="sda1" ino=16530 res=1 19:45:09 executing program 3: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) 19:45:09 executing program 2: ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48800200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x1b4, r3, 0x210, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x404c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @local, 0x2}}}}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast1}, 0x30a504140000000}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8312}, @TIPC_NLA_SOCK_REF={0x8}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 19:45:09 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)={0x0, 0x901, 0x0, {}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "8f6b0534bfdfde6c1098a6a7b6e9fe2264996e5bcf631f33617a7aa51481877da55bed640357bee7b07bb8e3f7cc10b239a75fd5a3ca173b8f82e9f7a569f29a"}}, 0x80}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0x1, 0x9, 0x9, 0x1, 0x7, 0x40, 0x7, 0x20, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000240)={0x1, 0x7, 0x200, 0x9, 0x5, 0x4, 0x3f, 0x3, r3}, &(0x7f0000000280)=0x20) [ 137.328717][ T26] audit: type=1800 audit(1565207109.139:34): pid=10404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16530 res=0 [ 137.437398][T10417] BTRFS error (device loop3): superblock checksum mismatch [ 137.505669][T10417] BTRFS error (device loop3): open_ctree failed 19:45:09 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, &(0x7f0000000080)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$VT_ACTIVATE(r1, 0x5606, 0x9) 19:45:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0, 0x0) preadv(r0, &(0x7f0000000780)=[{0x0}, {&(0x7f00000001c0)=""/127, 0x7f}, {&(0x7f0000000680)=""/225, 0xe1}], 0x3, 0x0) recvmmsg(r0, 0x0, 0x178, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000980)='net/sofH\x16tnet_sua') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r1, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={r2, 0x0, 0x10}, 0xc) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000880), &(0x7f0000000940)=0x4) r3 = syz_open_procfs(0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}, 0x2}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000007c0)='user\x00', &(0x7f0000000a80)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, 0x0, &(0x7f0000000900)='$[', 0xffffffffffffffff) add_key$keyring(&(0x7f00000009c0)='keyring\x00', &(0x7f0000000a00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$DRM_IOCTL_IRQ_BUSID(r4, 0xc0106403, &(0x7f0000000240)={0x0, 0x0, 0x9, 0x5}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000640)='./file0\x00') request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendmsg$alg(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000280)="5aadb0fd61c0cbf7c673259e5a9ea2ab2f84ed78d846ba955f11bf15b5a1edcb8597d2594239f07d0484d775feda96d9ec0b8cf99be3aece8ab989a5e1095a54e07df3384e37e8e8263104126dcee8bcd748cf2f1c5dd71d502176f3abf33530d2afc0bee4fb0d5d8e3bb70189980e559fab0c612812ec6779e9278843953776c83ef3d8c48dc5c1929763484c421ec64f930800412a6d9437f7b99e8c9b5390", 0xa0}, {&(0x7f0000000340)="6c844c2112039962862c88430d3511d0cd0ebf812fb11c9151220ed6ceedb98d674337f6b1308debe7d4eecbd8230791ef2597c5db1f78e25697f8a0bd68181b9eb242384a0b99308e6d2f74c7ad54b2280e7a2e01551c831e13c5ecf88547d57afaab6792a87ea20db62f11902045a1678d5eac1404ef71bc8096af01f270b60427a3438a00d5a3fe5db9c44644520aa9c1541106050f11eac923adb0dec63703", 0xa1}, {&(0x7f0000000400)="5284ef120dbf9ec7e7229ca33709b1e38c3877ec35cb856cf36139764c00bdee10", 0x21}, {&(0x7f0000000440)="e4da485dfe457160dffc2d5bdb8f6f", 0xf}, {&(0x7f0000000480)="c58b33a628169e0f72bb37", 0xb}, {&(0x7f00000004c0)="d168ca8ef2742a5741b03c3b58be96c5e8e499670e149ced8c561e090d58d26ea33b349f413bc9581ccca6090fb982035c1f6f1551c928077f3f758deb0f8476eb1a6b6170d49623191246d9b47f4a5de1d9f25863c27d3341837a9703cde2bbd4f6f2b6e0f8a7464f4ae0f13ea03bc7b23244c58bb19550b69185d82e13efcd40916a20c3c6f2e189ef2233f0ffe33521151239ccbbf955256624ffd6f76d7369165c3f79933c0655e5463749690c433eb0de3eaa7f86be17d8ae3fba055b991b48e6ee8a79a78f768f", 0xca}], 0x6, &(0x7f0000000ac0)=[@iv={0xc8, 0x117, 0x2, 0xaf, "e276283e2194d29904f8d5a9a9ff5e1646d46e319c784eb24f92ba524d212f79c585c813e29618cba319ecaa5f5f67e441a2a19e783f3222b281be4045f04616abdac21e6e706863a67999246289c3a832b7cd563e57e4cb0ae92e3b5a2ecfc51a97716471f1fb873c18d904974b71848cf52ec5b5fdd68a30922cdd06d4370dba8151e229aec86ee7a6d7076b4ce392a923f7b8a7f7ca7d746bf00ecefa868047704a82590f9a14ca9b6cf2f4d802"}, @assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x98, 0x117, 0x2, 0x81, "635e7512b4894aa541ef4e67390e7c535925c1e5d3647eebcb0a10e0ea5dd44ce97abc2c001f4edac40b61b71aa891aedbb9971e9043e29a9bb16e25a6ecff31aecd9206af94d68879ade135df74d14f228a21f724a127d343661287b95f6736392762a4e9ae99711a97dd8370230d2e53daf2d5455222c42dd67e490e5835a0c2"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x550}, @assoc={0x18, 0x117, 0x4, 0xffff}], 0x208, 0x4000}, 0x0) sendto$inet(r5, 0x0, 0x0, 0x0, 0x0, 0xb2) r6 = syz_open_procfs(0x0, &(0x7f0000000600)='net/fib_trie\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000180)) preadv(r6, &(0x7f0000003240)=[{&(0x7f0000000d00)=""/4096, 0x1000}, {&(0x7f0000003500)=""/130, 0x82}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/145, 0x91}, {&(0x7f0000002e80)=""/206, 0xfffffffffffffe88}, {&(0x7f0000003480)=""/82, 0x52}, {&(0x7f0000003380)=""/241, 0xf1}, {&(0x7f0000003180)=""/141, 0x8d}], 0x8, 0x0) 19:45:09 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x10000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x210) 19:45:09 executing program 3: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) 19:45:09 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000040)) mq_open(&(0x7f0000000080)='!selinuxselinux\x00', 0x0, 0x0, 0x0) 19:45:09 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x10000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, 0x0, 0x210) 19:45:09 executing program 4: syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x2f, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400002, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) syz_extract_tcp_res(&(0x7f00000000c0)={0x41424344, 0x41424344}, 0x8, 0x19) syz_emit_ethernet(0x1b4, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000000000000810018008848000000006164516301768706ff010000000000000000000000000001ff0200000000000000000000000000013209000000000000c204000000010105000000000005020000c204000000060730000080010a07001002000000000000000000000000000000a9ef000000000000f9ffffffffffffff7f00000000000000050200000000003f000df868000000320204013f20800000000000000000000000ffffac1414bb8704020100000000fe8000000000000000000000000000bb00000000000000000000ffffac1414bb4e214e21", @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="00100020907800081312752ac95d18bb5ce5155fc6ffab2bfc851312059ea37e8b274dee63fcdd2b038bb21e0003030004022202d6763df963008473f2ed97441b2ed51f81aed6055d7f5c45720e69e066f432ddcffdd4de8bde9b6eb0a5172a5cccb66c374bea537dd54688eb94a8d491fa4a096b7934abb47ebee5340c7056d12a1c7a5b9bb183231e0f66e07dccc30377543a21194d589b4e0cac2f05247df6b419090032753d0eaa06745d3280800318f8c342bd3c6fcdfbcd7472127559d4f686ea6dea06fe90ec"], 0x0) [ 138.281018][T10446] BTRFS error (device loop3): superblock checksum mismatch 19:45:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001340)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000009780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000140)={r3, 0x1000, "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"}, &(0x7f0000001180)=0x1008) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8000, 0x200000) ioctl$KDGETLED(r4, 0x4b31, &(0x7f0000000040)) 19:45:10 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x20000) fcntl$notify(r0, 0x402, 0x2) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x2) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x2710}}) accept4$nfc_llcp(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) 19:45:10 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ppoll(&(0x7f0000000040)=[{r2}, {r0, 0x8150}], 0x2, 0x0, 0x0, 0x0) [ 138.335608][T10446] BTRFS error (device loop3): open_ctree failed [ 138.376834][T10475] fuse: Unknown parameter 'roo oode' [ 138.434989][T10475] fuse: Unknown parameter 'roo oode' 19:45:10 executing program 2: ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000580)={'nr0\x01\x00', 0x801}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xbc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48800200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x1b4, r3, 0x210, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x404c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x27}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @local, 0x2}}}}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x6, @ipv4={[], [], @multicast1}, 0x30a504140000000}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8312}, @TIPC_NLA_SOCK_REF={0x8}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf29\x01\x8dmsJ\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0') 19:45:10 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0xfffffffffffffffe, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0}}], 0x11, 0x0, 0x0) shmget(0x0, 0x7000, 0x408, &(0x7f0000ff8000/0x7000)=nil) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) 19:45:10 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x83) mount(0x0, &(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)='bdev\x00', 0x0, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x0, 0x3) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="22b3cc130895f6eb179ada6341b13d2e1f873d4df75d8c80bc11bf7a09c2c6154d66037fa839d56d64e9b6f08781af0be968346668", 0x35}, {&(0x7f0000000100)="66d48095680c17e153b4ff9e2bc9f429d40c87ac174f7c01bbd4d6257eddfc3ff4fe8e09f3c7f1615570dbbe1055bdd4d7406812ed312a17f531e3424abd4df65fa0b042a055dc297576c08ea170b8d54ad98c4988634db744e994dde61efc892a1a3f0f19b73d5816bd225d82060e3ad96d1de28f0a631d744a3665e428ec39339368fb613745f9dbf4af900fe917ea80464e1f2857518c1f3d78e9fda4860f3759d2ecab9b411cbd734c2f26e398a76bcb5b7185415a8c6a5ede576941eac85c803070231ed7918294a9a713b5456edaf4f75451169be0ffa8dd6abc233d327846a2d68a8fdb6176de2a18d290e7205a1be54b7caa", 0xf6}, {&(0x7f0000000200)="3dcfba8a2717a9d94f31bd08566d308ac621e93c55fe69e8cc9279808206b2bf114ff97c01f84ca5fff6d1376623b1b6a61e79da1226bf2961c4823818d3a593e9299c2ca88af28111fbba53e23daeedac291fb9ba15d5d34e9c8a456e91ea9c8ed375f7da13b8180c9f78f28d1baddb44ebbf28a067839673cf2d7e5f517f33a2f36412eb0c790cf81244e1ed9f9dddf473af2090f7ac00b85fa94400079443e9af7f854fccf7834ce62d869f96b56a1dcab03f0badaf4f978dbb540b72977f470addf94e5b617220091828f5c7605a58e58dd8657da8", 0xd7}, {&(0x7f0000000300)="3a04ac5782736f180fdb0a09c212a7fa875b6c6a81e14f0466078a2508cab74d924ab9a00704c1d64755dd733ae8b39065612e5e12b425ee482eb0aa882b0a4121879e02b4290645cb246fd6a8018fb5697b17b828658c24588e72ec0fe68063388274944238f4f415d66692e3d1e9dccd45ff2d210b9668d1d50215efdb3701823c03ed2716211292dd95b17baa53e404965d4f", 0x94}, {&(0x7f00000003c0)="2dff3eeb03e8c49fb9b7c86f8fd782b269699c25e05b82257dc2f46fc0a7f00e6104bacfbfe4b9750a00760b0495cfc036be6c6d87574cb1fafffe20297d0b047750ef3e2517d110956f91d457da9efffab0cf3c94d8c98fa6a67292648855a2a48ce4078935cf8f0399228b133baa91bec9b6c59fb13c9a50f6714aa53277230027f8f2f48a0861c722dfadf889be5a39010b8d995d619da4f92e", 0x9b}, {&(0x7f0000000040)="7a50f0fc2aee84df05442416a7bcbbc971927d5789187806095c7b653f5f308449d3ae58806adeb19df9e4067f16f7b7d043f7e07ccca464568957edc85ed60b21620cc6a6bd86ecfeb63458772ec6045fda51f3f9edabef3f0df40ad9aa", 0x5e}], 0x6) 19:45:10 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x800040000, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000240)={0x0, &(0x7f00000001c0), 0x0, r2, 0xe}) 19:45:10 executing program 3: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) shmget$private(0x0, 0x3000, 0x1000, &(0x7f0000ffc000/0x3000)=nil) 19:45:10 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ppoll(&(0x7f0000000040)=[{r2}, {r0, 0x8150}], 0x2, 0x0, 0x0, 0x0) 19:45:10 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x1, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x2, 0x801) ftruncate(r1, 0xa3c1) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="e1affde3", 0x4) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000140)='/dev/autofs\x00', 0xc, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000240)={0x1, 0x8, 0x7f}) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={0xfffffffffffffffe}}, 0x0) [ 139.043735][T10495] BTRFS error (device loop3): superblock checksum mismatch [ 139.068395][T10500] fuse: Unknown parameter 'roo oode' 19:45:11 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r0, &(0x7f0000000040)="5ee2b3baf141f9e0f07882435ba5e93b406d900bc50cdf796e2b03f63d23708988fcad82321f8abe225136bf2b4c99bc", &(0x7f0000000080)=""/196}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xa, 0x3}]]}}}]}, 0x3c}}, 0x0) 19:45:11 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xe, 0x400) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000040)={0x200, 0x1fe0000000000, 0x11, 0x6, 0x30000000, 0x8001}) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623690f00080004000c0816000b770000a3c728f1c46b7b31afdc1338d544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e00090100000000000000000700140100000000080000000000000018000a00"], 0x1}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:45:11 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0xfffffffffffffffe, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0}}], 0x11, 0x0, 0x0) shmget(0x0, 0x7000, 0x408, &(0x7f0000ff8000/0x7000)=nil) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) [ 139.125320][T10495] BTRFS error (device loop3): open_ctree failed 19:45:11 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ppoll(&(0x7f0000000040)=[{r2}, {r0, 0x8150}], 0x2, 0x0, 0x0, 0x0) [ 139.276923][T10516] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 139.309818][T10522] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 19:45:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0xfffffffffffffffe, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0}}], 0x11, 0x0, 0x0) shmget(0x0, 0x7000, 0x408, &(0x7f0000ff8000/0x7000)=nil) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) [ 139.352300][T10526] fuse: Unknown parameter 'roo oode' 19:45:11 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000140)={0x7, 0xffffffffffffff81, 0xfffffffffffffffb}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180), 0x1f7) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x2d, "89391364274fd3e92d4e63bb554813cc0634d0f8fe957d62533104d6743ffafc59e892b5191983550a33d6b4d5"}, &(0x7f00000001c0)=0x35) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f00000002c0)={0x8, 0x3, 0x68b}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x4}, 0x8) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) accept4$llc(r0, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000300)=0x10, 0x802) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x81, 0x8002) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @multicast2}, 0x0, 0x3}, &(0x7f0000000040)=0x20) 19:45:11 executing program 3: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) 19:45:11 executing program 0: r0 = socket(0x11, 0x800000006, 0xfc73) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x41) sendto$inet6(r0, &(0x7f00000003c0)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e1", 0x2c, 0x0, 0x0, 0x0) 19:45:11 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) r3 = dup(r0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000140)) connect$caif(r3, &(0x7f00000000c0)=@dgm, 0x18) bind$isdn(r2, &(0x7f0000000180)={0x22, 0x6, 0x3, 0x6, 0x8}, 0x6) 19:45:11 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ppoll(&(0x7f0000000040)=[{r2}, {r0, 0x8150}], 0x2, 0x0, 0x0, 0x0) 19:45:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0xfffffffffffffffe, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0}}], 0x11, 0x0, 0x0) shmget(0x0, 0x7000, 0x408, &(0x7f0000ff8000/0x7000)=nil) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) 19:45:11 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000080)) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000240)=""/178) getpeername(r1, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000300)=0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xd, 0x8, 0x6, 0x3f, 0x180, r1, 0x5, [], r2, r1}, 0x3c) r3 = dup(r0) r4 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000180)={0xffffffffffffffff, r4, 0x9, 0x1000, &(0x7f0000000700)="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", 0x400, 0x3, 0x0, 0x7, 0x2, 0x0, 0x4, 'syz0\x00'}) recvfrom$inet6(r3, &(0x7f0000000000)=""/15, 0xf, 0x60, 0x0, 0x0) [ 139.996890][T10548] fuse: Unknown parameter 'roo oode' 19:45:11 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) r3 = dup(r0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000140)) connect$caif(r3, &(0x7f00000000c0)=@dgm, 0x18) bind$isdn(r2, &(0x7f0000000180)={0x22, 0x6, 0x3, 0x6, 0x8}, 0x6) 19:45:12 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0xfffffffffffffffe, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x3a4, 0x0}}], 0x11, 0x0, 0x0) shmget(0x0, 0x7000, 0x408, &(0x7f0000ff8000/0x7000)=nil) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) [ 140.096759][T10547] BTRFS error (device loop3): superblock checksum mismatch [ 140.135257][T10547] BTRFS error (device loop3): open_ctree failed 19:45:12 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x43, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000002c0)=""/162, &(0x7f0000000380)=0xa2) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040)={0x0, 0x40}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x1, 0x0) 19:45:12 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x3ea}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') r1 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f00000014c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000380)={0x0, 0x1, {0x0, 0x78, 0x594, {0xc860}, {0x7}, @rumble={0x0, 0x6}}, {0x57, 0x3ff, 0x1fe000000000000, {0x8, 0xcc}, {0x0, 0x1}, @const={0x4, {0x8, 0x3285, 0x6}}}}) request_key(&(0x7f00000006c0)='rxrpc\x00', &(0x7f0000000700)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00', 0x101}) 19:45:12 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) r3 = dup(r0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000140)) connect$caif(r3, &(0x7f00000000c0)=@dgm, 0x18) bind$isdn(r2, &(0x7f0000000180)={0x22, 0x6, 0x3, 0x6, 0x8}, 0x6) 19:45:12 executing program 3: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 140.288921][T10581] fuse: Unknown parameter 'roo oode' 19:45:12 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:12 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) [ 140.463442][T10592] BTRFS error (device loop3): superblock checksum mismatch 19:45:12 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) r3 = dup(r0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000140)) connect$caif(r3, &(0x7f00000000c0)=@dgm, 0x18) bind$isdn(r2, &(0x7f0000000180)={0x22, 0x6, 0x3, 0x6, 0x8}, 0x6) [ 140.566491][T10592] BTRFS error (device loop3): open_ctree failed [ 140.591118][T10600] BTRFS error (device loop0): superblock checksum mismatch [ 140.600239][T10605] fuse: Bad value for 'fd' 19:45:12 executing program 3: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:12 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) r3 = dup(r0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000140)) connect$caif(r3, &(0x7f00000000c0)=@dgm, 0x18) [ 140.695462][T10600] BTRFS error (device loop0): open_ctree failed 19:45:12 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) [ 140.777244][T10613] BTRFS error (device loop3): superblock checksum mismatch 19:45:12 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) r3 = dup(r0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000140)) [ 140.835243][T10613] BTRFS error (device loop3): open_ctree failed [ 140.932634][T10619] BTRFS error (device loop0): superblock checksum mismatch [ 141.055736][T10619] BTRFS error (device loop0): open_ctree failed 19:45:13 executing program 4: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 141.155214][T10595] device lo entered promiscuous mode [ 141.190702][T10629] device lo left promiscuous mode [ 141.296773][T10635] BTRFS error (device loop4): superblock checksum mismatch [ 141.300014][T10639] fuse: Bad value for 'fd' [ 141.325727][T10630] device lo entered promiscuous mode 19:45:13 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x3ea}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') r1 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f00000014c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000380)={0x0, 0x1, {0x0, 0x78, 0x594, {0xc860}, {0x7}, @rumble={0x0, 0x6}}, {0x57, 0x3ff, 0x1fe000000000000, {0x8, 0xcc}, {0x0, 0x1}, @const={0x4, {0x8, 0x3285, 0x6}}}}) request_key(&(0x7f00000006c0)='rxrpc\x00', &(0x7f0000000700)={'syz', 0x1}, 0x0, 0xfffffffffffffffa) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00', 0x101}) 19:45:13 executing program 3: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:13 executing program 1: socket$kcm(0xa, 0x2, 0x73) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r1, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) 19:45:13 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) fcntl$setstatus(r0, 0x4, 0x46043) 19:45:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 141.365392][T10635] BTRFS error (device loop4): open_ctree failed 19:45:13 executing program 1: socket$kcm(0xa, 0x2, 0x73) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r1, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) 19:45:13 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 141.534694][T10647] BTRFS error (device loop0): superblock checksum mismatch [ 141.542550][T10649] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop3 [ 141.557998][T10655] fuse: Bad value for 'fd' 19:45:13 executing program 1: socket$kcm(0xa, 0x2, 0x73) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000100)) setsockopt$inet_buf(r1, 0x0, 0x9, &(0x7f0000000040)="e60f4cfff6df3912a84379e57199dc9bdcf1681457f68159de8c4505d2e20a6a35a19f4ce5b4dd350a4ce1555da7", 0x2e) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) 19:45:13 executing program 3: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 141.645316][T10647] BTRFS error (device loop0): open_ctree failed [ 141.659394][T10661] device lo left promiscuous mode 19:45:13 executing program 4: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:13 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) r2 = dup(r0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000140)) [ 141.809869][T10668] BTRFS error (device loop3): superblock checksum mismatch 19:45:13 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5a69, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 141.871550][T10677] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 141.995947][T10668] BTRFS error (device loop3): open_ctree failed [ 142.131028][T10689] BTRFS error (device loop0): superblock checksum mismatch [ 142.208728][T10689] BTRFS error (device loop0): open_ctree failed [ 142.368720][T10674] device lo entered promiscuous mode 19:45:14 executing program 2: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:14 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) 19:45:14 executing program 4: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:14 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:14 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:14 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) [ 142.492962][T10699] BTRFS error (device loop3): superblock checksum mismatch 19:45:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 142.595390][T10699] BTRFS error (device loop3): open_ctree failed [ 142.604379][T10709] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop0 [ 142.621772][T10702] BTRFS error (device loop4): superblock checksum mismatch 19:45:14 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) 19:45:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:14 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 142.674781][T10714] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 19:45:14 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) [ 142.771792][T10731] fuse: Unknown parameter 'roo oode' [ 142.815247][T10702] BTRFS error (device loop4): open_ctree failed 19:45:14 executing program 3: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:14 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 142.909184][T10736] BTRFS error (device loop0): superblock checksum mismatch [ 142.972598][T10744] fuse: Unknown parameter 'roo oode' [ 142.975196][T10736] BTRFS error (device loop0): open_ctree failed 19:45:14 executing program 4: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:14 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) 19:45:14 executing program 2: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 143.031459][T10746] BTRFS error (device loop3): superblock checksum mismatch 19:45:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:15 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) [ 143.125438][T10746] BTRFS error (device loop3): open_ctree failed 19:45:15 executing program 0: getpid() getpid() r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x80000) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 143.192994][T10762] fuse: Unknown parameter 'roo oode' 19:45:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:15 executing program 3: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 143.246035][T10757] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop2 [ 143.260449][T10755] BTRFS error (device loop4): superblock checksum mismatch [ 143.305239][T10769] fuse: Unknown parameter 'roo oode' 19:45:15 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x73) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) 19:45:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 143.381472][T10755] BTRFS error (device loop4): open_ctree failed 19:45:15 executing program 2: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 143.450336][T10782] fuse: Unknown parameter 'roo oode' 19:45:15 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 143.496923][T10779] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop3 [ 143.520485][T10773] BTRFS error (device loop0): superblock checksum mismatch 19:45:15 executing program 4: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:15 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x73) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) [ 143.628695][T10801] fuse: Unknown parameter 'roo oode' 19:45:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:15 executing program 3: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:15 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x73) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000140)) [ 143.685293][T10773] BTRFS error (device loop0): open_ctree failed [ 143.708780][T10791] BTRFS error (device loop2): superblock checksum mismatch [ 143.805587][T10791] BTRFS error (device loop2): open_ctree failed 19:45:15 executing program 0: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:15 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 143.879619][T10815] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 19:45:15 executing program 1: socket$kcm(0xa, 0x2, 0x73) r0 = dup(0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) [ 143.924390][T10806] BTRFS error (device loop4): superblock checksum mismatch 19:45:15 executing program 3: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:15 executing program 2: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 144.065645][T10806] BTRFS error (device loop4): open_ctree failed 19:45:16 executing program 1: socket$kcm(0xa, 0x2, 0x73) r0 = dup(0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) 19:45:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 144.114972][T10829] BTRFS error (device loop0): superblock checksum mismatch [ 144.157174][T10836] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop3 19:45:16 executing program 4: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:16 executing program 5: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:16 executing program 1: socket$kcm(0xa, 0x2, 0x73) r0 = dup(0xffffffffffffffff) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) [ 144.295259][T10829] BTRFS error (device loop0): open_ctree failed [ 144.318092][T10842] BTRFS error (device loop2): superblock checksum mismatch 19:45:16 executing program 3: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 144.395522][T10842] BTRFS error (device loop2): open_ctree failed 19:45:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) dup(r0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) 19:45:16 executing program 0: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:16 executing program 5: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:16 executing program 2: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) dup(r0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) [ 144.556480][T10858] BTRFS error (device loop4): superblock checksum mismatch [ 144.568420][T10867] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop4 new:/dev/loop3 19:45:16 executing program 5: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:16 executing program 3: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 144.655592][T10858] BTRFS error (device loop4): open_ctree failed [ 144.690187][T10870] BTRFS error (device loop0): superblock checksum mismatch 19:45:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) dup(r0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000140)) 19:45:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:16 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 144.845394][T10870] BTRFS error (device loop0): open_ctree failed [ 144.861642][T10886] BTRFS error (device loop2): superblock checksum mismatch [ 144.875313][T10894] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop3 19:45:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, 0x0) 19:45:16 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:16 executing program 0: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 145.055505][T10886] BTRFS error (device loop2): open_ctree failed [ 145.068145][T10901] BTRFS error (device loop4): superblock checksum mismatch [ 145.073475][T10910] fuse: Unknown parameter 'roo oode' 19:45:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:17 executing program 3: getpid() getpid() syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 145.185371][T10901] BTRFS error (device loop4): open_ctree failed [ 145.216395][T10914] BTRFS error (device loop0): superblock checksum mismatch [ 145.261615][T10920] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop1 [ 145.302154][T10932] fuse: Unknown parameter 'roo oode' 19:45:17 executing program 3: getpid() getpid() syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:17 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 145.356325][T10914] BTRFS error (device loop0): open_ctree failed 19:45:17 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 145.497604][T10931] BTRFS error (device loop2): superblock checksum mismatch 19:45:17 executing program 0: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 145.580079][T10947] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop1 [ 145.601651][T10950] fuse: Unknown parameter 'roo oode' 19:45:17 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 3: getpid() getpid() syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 145.675874][T10931] BTRFS error (device loop2): open_ctree failed 19:45:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 145.747526][T10964] fuse: Unknown parameter 'roo oode' 19:45:17 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 145.826563][T10962] BTRFS error (device loop0): superblock checksum mismatch [ 145.846785][T10974] fuse: Unknown parameter 'roo oode' [ 145.903336][T10973] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop1 19:45:17 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 145.963268][T10985] fuse: Unknown parameter 'roo oode' [ 145.975378][T10962] BTRFS error (device loop0): open_ctree failed 19:45:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 146.165861][T10998] BTRFS error (device loop1): superblock checksum mismatch 19:45:18 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 146.385356][T10998] BTRFS error (device loop1): open_ctree failed 19:45:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:18 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 146.544774][T11020] BTRFS error (device loop0): superblock checksum mismatch 19:45:18 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 146.645179][T11020] BTRFS error (device loop0): open_ctree failed [ 146.774100][T11047] fuse: Bad value for 'fd' 19:45:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 146.843786][T11050] BTRFS error (device loop1): superblock checksum mismatch 19:45:18 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:18 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 146.946663][T11050] BTRFS error (device loop1): open_ctree failed 19:45:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 147.004193][T11064] fuse: Bad value for 'fd' 19:45:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:19 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 147.152290][T11080] fuse: Bad value for 'fd' 19:45:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:19 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:19 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 147.420163][T11095] BTRFS error (device loop1): superblock checksum mismatch 19:45:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 147.585215][T11095] BTRFS error (device loop1): open_ctree failed 19:45:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:19 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:19 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:19 executing program 1: getpid() syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:19 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:20 executing program 1: getpid() syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:20 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:20 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:20 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 19:45:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:20 executing program 1: getpid() syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:20 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) [ 148.692527][T11209] fuse: Missing mount parameter(s) 19:45:20 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 19:45:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 148.913945][T11235] fuse: Missing mount parameter(s) 19:45:20 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:20 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 19:45:20 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 149.167349][T11260] fuse: Missing mount parameter(s) 19:45:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 19:45:21 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:21 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 149.452167][T11277] fuse: Unknown parameter 'roo oode' 19:45:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) 19:45:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) [ 149.728425][T11305] fuse: Unknown parameter 'roo oode' 19:45:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 149.810119][T11315] fuse: Unknown parameter 'roo oode' 19:45:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:21 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:21 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) [ 149.969297][T11325] fuse: Unknown parameter 'roo oode' 19:45:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) [ 150.178430][T11350] fuse: Unknown parameter 'roo oode' 19:45:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) 19:45:22 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:22 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 150.414366][T11368] fuse: Unknown parameter 'roo oode' 19:45:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 19:45:22 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) [ 150.769640][T11398] fuse: Unknown parameter 'roo oode' 19:45:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 150.987660][T11409] fuse: Unknown parameter 'roo oode' 19:45:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:22 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) 19:45:23 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 151.230533][T11434] fuse: Unknown parameter 'roo oode' 19:45:23 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 151.402425][T11448] fuse: Unknown parameter 'roo oode' 19:45:23 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 151.609889][T11465] fuse: Unknown parameter 'roo oode' 19:45:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) [ 151.790349][T11486] fuse: Unknown parameter 'roo oode' 19:45:23 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:23 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) [ 151.913613][T11494] fuse: Unknown parameter 'roo oode' 19:45:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) [ 152.059647][T11511] fuse: Unknown parameter 'roo oode' 19:45:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB]) 19:45:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) [ 152.314592][T11522] fuse: Unknown parameter 'roo oode' 19:45:24 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',']) 19:45:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',']) [ 152.566547][T11549] fuse: Unknown parameter 'roo oode' 19:45:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',']) [ 152.732021][T11561] fuse: Unknown parameter 'roo oode' 19:45:24 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 152.858376][T11567] fuse: Unknown parameter 'roo oode' 19:45:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x10000}], 0xf43, 0x0) [ 153.143946][T11592] fuse: Unknown parameter 'roo oode' 19:45:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 19:45:25 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) [ 153.412238][T11618] fuse: Unknown parameter 'roo oode' 19:45:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) [ 153.550931][T11624] fuse: Unknown parameter 'roo oode' 19:45:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',\x00']) 19:45:25 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',\x00']) [ 153.846427][T11649] fuse: Unknown parameter 'roo oode' 19:45:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 154.018659][T11666] fuse: Unknown parameter 'roo oode' 19:45:25 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB, @ANYBLOB=',\x00']) 19:45:25 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYBLOB=',\x00']) 19:45:26 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) [ 154.127680][T11678] fuse: Unknown parameter 'roo oode' 19:45:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 154.376748][T11693] fuse: Unknown parameter 'roo oode' 19:45:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYBLOB=',\x00']) 19:45:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 154.626661][T11721] fuse: Unknown parameter 'roo oode' 19:45:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYBLOB=',\x00']) 19:45:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) [ 154.778122][T11733] fuse: Unknown parameter 'roo oode' 19:45:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYBLOB=',\x00']) 19:45:26 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) [ 154.909729][T11745] fuse: Unknown parameter 'roo oode' 19:45:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYBLOB=',\x00']) 19:45:26 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) [ 155.086460][T11761] fuse: Unknown parameter 'roo oode' 19:45:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYBLOB=',\x00']) 19:45:27 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 155.383038][T11784] fuse: Unknown parameter 'roo oode' 19:45:27 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYBLOB=',\x00']) 19:45:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 155.649437][T11804] fuse: Unknown parameter 'roo oode' 19:45:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYBLOB=',\x00']) 19:45:27 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 155.862183][T11827] fuse: Unknown parameter 'roo oode' 19:45:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYBLOB=',\x00']) 19:45:27 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 156.068526][T11845] fuse: Unknown parameter 'roo oode' 19:45:28 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 156.184529][T11856] fuse: Unknown parameter 'roo oode' 19:45:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:28 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 156.380149][T11877] fuse: Unknown parameter 'roo oode' 19:45:28 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 156.607992][T11895] fuse: Unknown parameter 'roo oode' 19:45:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:28 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 156.797604][T11911] fuse: Bad value for 'fd' 19:45:28 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:28 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:28 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf43, 0x0) [ 156.971934][T11930] fuse: Bad value for 'fd' 19:45:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:29 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:29 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 157.291442][T11955] fuse: Bad value for 'fd' 19:45:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 157.421467][T11965] fuse: Bad value for 'fd' 19:45:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 157.552606][T11978] fuse: Bad value for 'fd' 19:45:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:29 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 157.723861][T11995] fuse: Bad value for 'fd' 19:45:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 157.896453][T12008] fuse: Unknown parameter 'roo oode' 19:45:29 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:29 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 158.149530][T12030] fuse: Unknown parameter 'roo oode' 19:45:30 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:30 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 158.335546][T12046] fuse: Unknown parameter 'roo oode' 19:45:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e588", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 158.620302][T12066] fuse: Unknown parameter 'roo oode' 19:45:30 executing program 3: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e588", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:30 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) 19:45:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:30 executing program 4: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 158.813397][T12080] fuse: Unknown parameter 'roo oode' 19:45:30 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:30 executing program 4: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:30 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf43, 0x0) [ 159.049730][T12100] fuse: Unknown parameter 'roo oode' 19:45:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 159.179584][T12114] fuse: Unknown parameter 'roo oode' 19:45:31 executing program 4: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:31 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 159.414206][T12130] fuse: Unknown parameter 'roo oode' 19:45:31 executing program 4: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 159.614498][T12149] fuse: Unknown parameter 'roo oode' 19:45:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:31 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:31 executing program 2: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 159.901332][T12170] fuse: Unknown parameter 'roo oode' 19:45:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:31 executing program 2: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 160.072138][T12186] fuse: Unknown parameter 'roo oode' 19:45:32 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 160.179695][T12195] fuse: Unknown parameter 'roo oode' 19:45:32 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 160.331410][T12211] fuse: Unknown parameter 'roo oode' 19:45:32 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 160.494465][T12220] fuse: Unknown parameter 'roo oode' 19:45:32 executing program 2: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:32 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) 19:45:32 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) [ 160.737223][T12238] fuse: Unknown parameter 'roo oode' 19:45:32 executing program 2: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf43, 0x0) [ 161.077814][T12267] fuse: Unknown parameter 'roo oode' 19:45:33 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) 19:45:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:33 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 161.300251][T12290] fuse: Unknown parameter 'roo oode' 19:45:33 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 19:45:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) [ 161.526537][T12308] fuse: Unknown parameter 'roo oode' 19:45:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 161.747536][T12324] BTRFS error (device loop0): superblock checksum mismatch 19:45:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486cc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 161.807888][T12336] fuse: Unknown parameter 'roo oode' 19:45:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:33 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 161.888273][T12324] BTRFS error (device loop0): open_ctree failed [ 161.965954][T12347] fuse: Unknown parameter 'roo oode' 19:45:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf43, 0x0) 19:45:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486cc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:34 executing program 1: getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 162.177071][T12363] fuse: Unknown parameter 'roo oode' 19:45:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf43, 0x0) 19:45:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486cc", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:34 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 162.372035][T12376] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop1 [ 162.387663][T12369] BTRFS error (device loop0): superblock checksum mismatch [ 162.468578][T12380] fuse: Unknown parameter 'roo oode' 19:45:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:34 executing program 1: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 162.565238][T12369] BTRFS error (device loop0): open_ctree failed 19:45:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 162.661735][T12403] fuse: Unknown parameter 'roo oode' 19:45:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:34 executing program 0: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) [ 162.819537][T12413] fuse: Unknown parameter 'roo oode' 19:45:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 162.871749][T12405] BTRFS error (device loop1): superblock checksum mismatch 19:45:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:34 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 163.014689][T12432] fuse: Unknown parameter 'roo oode' [ 163.029201][T12405] BTRFS error (device loop1): open_ctree failed 19:45:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) 19:45:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 163.172528][T12441] fuse: Unknown parameter 'roo oode' [ 163.178396][T12427] BTRFS error (device loop0): superblock checksum mismatch 19:45:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:35 executing program 1: getpid() getpid() syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) 19:45:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf43, 0x0) [ 163.335471][T12427] BTRFS error (device loop0): open_ctree failed [ 163.393867][T12455] fuse: Unknown parameter 'roo oode' 19:45:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) 19:45:35 executing program 0: getpid() getpid() syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x262, 0x10000}], 0xf43, 0x0) 19:45:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 163.515396][T12463] BTRFS error (device loop1): superblock checksum mismatch 19:45:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 163.645972][T12463] BTRFS error (device loop1): open_ctree failed 19:45:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 163.690136][T12479] fuse: Unknown parameter 'roo oode' 19:45:35 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYBLOB=',\x00']) [ 163.735459][T12481] BTRFS error (device loop0): superblock checksum mismatch 19:45:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 163.895184][T12481] BTRFS error (device loop0): open_ctree failed 19:45:35 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 163.947031][T12500] kasan: CONFIG_KASAN_INLINE enabled [ 163.970968][T12500] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 163.982487][T12500] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 163.989489][T12500] CPU: 0 PID: 12500 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190807 #61 [ 163.998621][T12500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.008818][T12500] RIP: 0010:kstrtouint+0x85/0x1a0 [ 164.013935][T12500] Code: 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 bc e4 34 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 db 00 00 00 [ 164.033535][T12500] RSP: 0018:ffff888063af79e0 EFLAGS: 00010246 [ 164.041268][T12500] RAX: dffffc0000000000 RBX: ffff888063af7b38 RCX: ffffc900109da000 [ 164.050149][T12500] RDX: 0000000000000000 RSI: ffffffff833d27f4 RDI: 0000000000000000 [ 164.058114][T12500] RBP: ffff888063af7a70 R08: ffff888064dac640 R09: ffffed1013223a89 [ 164.066085][T12500] R10: ffffed1013223a88 R11: 0000000000000003 R12: 0000000000000000 [ 164.074065][T12500] R13: 1ffff1100c75ef3d R14: ffff888063af7a48 R15: 0000000000000000 [ 164.082051][T12500] FS: 00007fa77e9cd700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 164.092036][T12500] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.098658][T12500] CR2: 00007feda891b110 CR3: 0000000090e19000 CR4: 00000000001406f0 [ 164.106625][T12500] Call Trace: [ 164.109918][T12500] ? __x64_sys_mount+0xbe/0x150 [ 164.114794][T12500] ? _kstrtoul+0x170/0x170 [ 164.119230][T12500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.125483][T12500] fs_parse+0xde1/0x1080 [ 164.129920][T12500] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.137873][T12500] ? __x64_sys_mount+0xbe/0x150 [ 164.142811][T12500] ? do_syscall_64+0xfa/0x760 [ 164.147702][T12500] fuse_parse_param+0xac/0x750 [ 164.152468][T12500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.158710][T12500] ? process_init_reply+0x1650/0x1650 [ 164.164110][T12500] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 164.169839][T12500] ? __lookup_constant+0xd6/0x100 [ 164.174873][T12500] ? process_init_reply+0x1650/0x1650 [ 164.180274][T12500] vfs_parse_fs_param+0x2ca/0x540 [ 164.185404][T12500] vfs_parse_fs_string+0x105/0x170 [ 164.190525][T12500] ? vfs_parse_fs_param+0x540/0x540 [ 164.195727][T12500] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 164.201464][T12500] ? process_init_reply+0x1650/0x1650 [ 164.206839][T12500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.213077][T12500] ? vfs_parse_fs_param+0xcd/0x540 [ 164.218200][T12500] generic_parse_monolithic+0x181/0x200 [ 164.224134][T12500] ? vfs_parse_fs_string+0x170/0x170 [ 164.229441][T12500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.235691][T12500] ? alloc_fs_context+0x434/0x6d0 [ 164.240709][T12500] ? vfs_parse_fs_string+0x170/0x170 [ 164.246010][T12500] parse_monolithic_mount_data+0x69/0x90 [ 164.251663][T12500] do_mount+0x1369/0x1c30 [ 164.256011][T12500] ? copy_mount_string+0x40/0x40 [ 164.260969][T12500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 164.267238][T12500] ? copy_mount_options+0x2e8/0x3f0 [ 164.272438][T12500] ksys_mount+0xdb/0x150 [ 164.277126][T12500] __x64_sys_mount+0xbe/0x150 [ 164.281827][T12500] do_syscall_64+0xfa/0x760 [ 164.286355][T12500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.292265][T12500] RIP: 0033:0x459829 [ 164.296412][T12500] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:45:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf43, 0x0) [ 164.316101][T12500] RSP: 002b:00007fa77e9ccc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 164.324716][T12500] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459829 [ 164.332683][T12500] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 164.340675][T12500] RBP: 000000000075bf20 R08: 0000000020000200 R09: 0000000000000000 [ 164.348656][T12500] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa77e9cd6d4 [ 164.356790][T12500] R13: 00000000004c5e2b R14: 00000000004da898 R15: 00000000ffffffff [ 164.364757][T12500] Modules linked in: [ 164.377041][T12500] ---[ end trace f2577ff86b92d2f1 ]--- [ 164.382806][T12500] RIP: 0010:kstrtouint+0x85/0x1a0 [ 164.385292][T12492] kobject: 'loop3' (00000000a4b4b919): kobject_uevent_env [ 164.388765][T12500] Code: 04 00 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 bc e4 34 fe 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 db 00 00 00 [ 164.397615][T12492] kobject: 'loop3' (00000000a4b4b919): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.415505][T12500] RSP: 0018:ffff888063af79e0 EFLAGS: 00010246 [ 164.431465][T12500] RAX: dffffc0000000000 RBX: ffff888063af7b38 RCX: ffffc900109da000 [ 164.439674][T12500] RDX: 0000000000000000 RSI: ffffffff833d27f4 RDI: 0000000000000000 [ 164.448946][T12481] kobject: 'loop0' (00000000e712361f): kobject_uevent_env [ 164.451494][T12500] RBP: ffff888063af7a70 R08: ffff888064dac640 R09: ffffed1013223a89 [ 164.456261][T12481] kobject: 'loop0' (00000000e712361f): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 164.464898][T12500] R10: ffffed1013223a88 R11: 0000000000000003 R12: 0000000000000000 [ 164.515278][T12505] kobject: 'loop4' (00000000987ff430): kobject_uevent_env 19:45:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0xf43, 0x0) [ 164.518097][T12500] R13: 1ffff1100c75ef3d R14: ffff888063af7a48 R15: 0000000000000000 [ 164.529672][T12505] kobject: 'loop4' (00000000987ff430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.573502][T12508] fuse: Unknown parameter 'roo oode' 19:45:36 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f096f6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0844aa035e70f59d0919806af561d58b2ffbcc6bada74428b044b2a999c42a4dca1fcc4e7944eecacdf2545844c69fdf838d4ed0806f47a4712de5260be0cef918ae83c02a1eef3c2ba8cc88232053c109486ccc992ae48ff7d10742a7c28b32ea08a488c7e8afd1e9cc3d5db86676865f28459f6fb3723f9e5880a0bb9f670b9872440cb3273f48d19d64f72d0a3cf09661fb6101b42da38c8f873a7d21e3c02fad36b273dd9c79ee682708277002574", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) [ 164.627345][T12500] FS: 00007fa77e9cd700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 164.645352][T12500] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.652318][T12505] kobject: 'loop4' (00000000987ff430): kobject_uevent_env [ 164.661571][T12500] CR2: 0000000000607304 CR3: 0000000090e19000 CR4: 00000000001406e0 [ 164.671002][T12505] kobject: 'loop4' (00000000987ff430): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.672203][T12500] Kernel panic - not syncing: Fatal exception [ 164.688700][T12500] Kernel Offset: disabled [ 164.693040][T12500] Rebooting in 86400 seconds..