75c7b94be52904c7af87ae06fb4821da96c8e36f01ecba992857091f0f0ea6110621827e32b76c2e44fd68c6e469bf11ec27efa7745ac5df9c2bedd6cefeb8e45d658f4184d62178da7d163534ab354be1545c789b16554066b41469c071cd326ba2b76185f930ba5e11a8fd331bfb6b28449e93b67e4026961b4d45881012b5e8209aac1a77667788fc421ef7b8afa2ddb80637b30c738bcaf5ac740e18d39a1f5c7390431409008602199e461594514c3470f0083572f609c490dfbbd92843766b029405d20dbcc95b9e6e384d5b962f82b089bb0528391df1889cb62a721b9f4a291fa1d14f3d0fb423e2c5792554deb1775de28eb521bbf1cbb1e3caaa7e6aba7b08eadd3b9ab013fe30224673639d96312a7592ed9e2c266f0703e6f3e2977f76c95e9513a4c06e2d816ba4babd9c94506c0efe532559964131cec5f217c0d0791271164a2d7f39425ea731e93aa524021f93ec00e1e32b90c0d78f1b8ad9b5583c91b571a534f5f1e095216f748edcddfa07ebbbda331eb8e8051c27fb0a0329af233d15235798221d754cbef9ef8178bf78df857f38d4fba5dae65f5ebb07c8cb933f256150bcfd2124fe3d9abadb55829d9ef77328aa7a330fed7723af4588c63f3f6053bce494cdf93a1ccf0a8ecd8108ab5990c69e96349eff0499509218e04672fd0f09b8e6e6b3f4bd376f848782dd0f7d6ab98eb33ed61d12a7265f93d065bdd973aa5f27f96640eca8fe623929efb26f9e1ebee9cdcdc007f1515dc484b6a54ad43b78a21e967033f9e25dfd742b7155bfb483903061effbda4663040043ce5c2c7a2c40b8e34902b207b31f52d868cdb2933b89652f696b5ef26e7ff74898a3b06981228c08f969a243bd145a294c4ea9fc4e0500ef4b427596014b10b17409f0c7abd5ad51b43e1412f9aaadf9f91cb14f357ee10c2e310c6f6ed30d85aa485fec5f1a2051003240a3078063e1e87f9c156516bd92e230994d624cdb8bde495584c1a7bd4efb489f683de94f348f65f66efa3a2cee1beff4ffa53ae7f86f22d28d08ad9dfd3ea1e24156d9dbecca0ec7f4a63ce50f979ecc93d324caa6d600037cc31cf9447a6e5eeb975f9c15d8a3e3384b2ed3d29e94630401063efbed7f38f9ad1d220b1956378401e78f99eede58c5c4055839089bc3441b6daf557aae6573e87655a99734da8bcdb0f69f08e0182e35de24839db76d7c72bbfa2013f37dc6816bbbbba2dd08f53388e58a2636dfd6d8983672fcec0121ba8672ef3cf11f1819df70b5a9f8df19f67d5a0f04a9539718dda47353dc0ef49c0c2bb444268bea91942622f568e620617e66e9969c2b7b7d1fe1bf6c9b0bf60b342219638db4821755abdf0266bf761b6c54b737a88c644db9acd976f6529291ed1c8c59a2bd9e9107af799d05cf866854b3b77dde6ba778be88745c9d5cea0a126d0b122b5f84e1c751e33d224997e965c269ae5938adf6f61cd6bb9e0d94746d8edb862c50c7dd19180def6daee1d1920eea458e35c78fe1bc111fb2a6c9acf22e0286ede811acbab94cf64ffb57cbae4abec2e557f427174c72bc4e5b3a1f9e16a4687c9a77463f44656036b5dfa59cabbc9fb2023cb05f297bb3943e56c9c83f8ad50a724878e72eb6a6f6de5f2f3eb1e444fcb592a84a3160a1743f322e06b1186b31137fe7c1c0ed7605d3c213eee48481f6b9c77406c39f8e546b449068c70f9d5705bcae0918db291eeec90a556d6e680d89f2971834e711780cc0b12c2dc8c138702839fb0b61079b095c4d3fd705990af1f31d7213ddbaa9653e5965ea5e0fddcabab1a90f98a69d40547a7e04558abe30c49baf6a4413d66fbbe4c4e190a2f3edfa55a445182f5b064b8db3a20e317c9b5af209f723fde45d441cb98a7e0d280b4e752deeeab2f1f40d9378eef8015ee28e4e91ba50dbb2e3de7c964510bec6521b01205bc6d11b39f289bbb3ff584ba4d5961a01d309c34ac6d5d498993bc8abbf59d26a42d1eb18403e49521e693dc0464dd12037426a3af9ccde843c82aa609e090df3d8a57c0ffcf314a5ba08735f595e0c456ea4e372568e1e1f08880fcd4b233fb2666c87499edd85f2fd466d3dde44d47c15c72a30995f7d349a6f771593c217cdeeeff092033e1b2b326214df8905de6e5f3d168fa56868f41b3c24f5938733a50936a0d9d6acc05f80ea2b4947daa3687c33b2834b989c9767d34f30581a477e7cbac34c7b28398c29492f583bb3f28dbc1e81fd98289a4ffbb0ef1b2c52a1739439cd6ac5a8c071084c78cf83fcfd923b880fec0e200084012350d3d455a074f773255acd343f0ff379f77459012e071754eebfae5008873a1ba91381febe27e130a8b51c58d4beee1771803ba105f379f588b4b5326c4be90c414f6cf1071e16774db20698078d5711daae97b55570b02700b62f9b19b90e3692eaa5989271b5a55ab317e329cabeba9a3c7d9a5cbb75fa9ade03571d00c7f7c8a5b6c5739b130ca5895fd8016189872519bdee03887f631f22b019ff2386738594b75ad6cbe45510d893944cfd8611e5ec699a4ad3235d91e57a3f73cfecd7efe7e740f37e818b128b9d90f60aff656d41d7605f3e9ff4c7940da745f24d61b9578226cf63854727de3ad80fafd8f6b2d238ae767f3e3d9efbb43b932e70d60733813d0c9648d8c864567c24561ebf54157f73cfe498dde2d13f9225dfa2e767f1ca0d464636726b2a3d61f216b8b6b6f4158be5e215c58dfcd1d5d352cc0622b005599fe0a67bf986583e21544d47eedf9e0ebb67f9d95b1c2eaced284c1d73f5afc8111c41cb51033fdb4f090149eb7880cf9a657b78e01188ec7bc306875659864004af8d6112db1c4cb93b69f5c80ef387f5aadd8d479f462e5c4de433f7b312bbd1ec2dfb631c25c4bfb93c09d2eef2b3903560c7c76756a1b3558585df310f995cb13faaa720c2f03271164a15ce3ccbbd0945bbcbabdb1ad5806a767af113ff3e3e1e8086cac228c288646231425d60951ea09bd6cd36a3dc2adc0dfc46696c437fa5df1775a8848b1418ac1f4f0e24a578ca0b5c03fcf3039c395dffbc3fb6f24caf6c1a5e09791e4f18d23f93a5cc8b0254b8600352c7a1fdd7a7c1e356b70f7a1bd33053959246eb9f34d5b6bcf2ebdb68b667f7b668c22277ae1bc3353e83b2db1f2428506dacd0a23391cd06ddcf2871307aff5348627924ba6d6d673ee78ba6243e0c6a6dab59da7817820a8c338ea51615d81d7898a237ab3535000aa61c222b3f5e275daba35fced28f78783c82032ea182b73f8dbdefcef47877953555dacb7aef4a807c62001fb25cdb6c54c2abca88aa87eff0fa68deffcc83a056d015eb351b83ec7c5f179f8038df1777bd913db336e4c15c58fbea06e89d343c7973b1746a518391523cb1ea55e0b44f76dd37c481a51c4467fbf884069ff1a32703dc86f9a4f2fdf2f196afd72c8ef5823166f028055f7b5ba0d239c1ca752000597c96aadb52678af48a89fa91cd263db7badef48f38c0c7b1a67856e3b99934a4312ace63eabee0d1dbc39b36f5231c80bdf063ba763d5fb80a255bca5d23f5aadc6aa861555f2b2febbe72e95d210d5134110fe24db077500d381cdb9a7ce9fa9e9c7e063edcd5ea268ad333cb629fe58d476e0b0475e7c0c3b4725789848e4d5421d16df6388f07cb477"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000006bd80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xb9, "a8ebabdaafde90"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000006cd80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {0x0, r7}, {r8}, {}, {}, {r9}], 0x8, "17b67cbe0e6e66"}) write$FUSE_POLL(r4, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, 0x18) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000f900000001060000000000005d00"], 0x22) 03:05:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:37 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:37 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:37 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, 0x0, {0x38b3, 0x800, 0x0, {0x3, 0xe9b3, 0x2, 0x0, 0x0, 0x3, 0x9, 0xfffffffd, 0xe9, 0xc000, 0xc45d, 0x0, 0x0, 0x4, 0x70ae3b70}}}, 0x78) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gro=\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 03:05:37 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:37 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:37 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, @none, 0x3f}, 0xa) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x6, 0x33, 0xf2}}, 0x30) r3 = socket(0x10, 0x4, 0x8) setsockopt$MRT_TABLE(r3, 0x0, 0xcf, &(0x7f0000000080)=0xfe, 0x4) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="66640458a60cd9bd19c76d3d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x684800, 0x0) 03:05:38 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:38 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) (async) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, @none, 0x3f}, 0xa) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x6, 0x33, 0xf2}}, 0x30) r3 = socket(0x10, 0x4, 0x8) setsockopt$MRT_TABLE(r3, 0x0, 0xcf, &(0x7f0000000080)=0xfe, 0x4) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="66640458a60cd9bd19c76d3d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x684800, 0x0) 03:05:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_BMAP(r1, &(0x7f0000000140)={0x18, 0x0, r3, {0x1000}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r5 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r5}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000280)={0x0, r6, "37d75680556ce886174b8b832b92bfa0fe74f74d3c13be846d420642d34ef4634ee21d0f20960d43151088fc7fa1e75b328c9a3a704ca69cf323ec4c32e626ca17bd429f43d78f2d1d4becfeae3497e60e739e6d2bee95ff6af109e3881c94ea31a4dcec4416e3bc694f0cd987aaef43e6ba1f400c53c8f4ef02c76795e6fa6b5e3b51322dbfa76e418e47e4c6c1fae0f2d237027756905a09d254432171dd56d60327ae4def9651080435fbab263eade12df0db8a9b8a89b34d982319fda0cd8f2098865d367d6396563c370db0435e9f08ecb11530b3769a9b164743a2342044c5eca146d46b11d0f9bcb3ee68ebe77ad2e94b6949c24d151e1bd821e28404", "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"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000006ab80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000006ad80)={0x0, 0x0, "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", "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"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000006bd80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xb9, "a8ebabdaafde90"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000006cd80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {0x0, r7}, {r8}, {}, {}, {r9}], 0x8, "17b67cbe0e6e66"}) (async) write$FUSE_POLL(r4, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, 0x18) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000f900000001060000000000005d00"], 0x22) 03:05:38 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, @none, 0x3f}, 0xa) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x6, 0x33, 0xf2}}, 0x30) (async, rerun: 64) r3 = socket(0x10, 0x4, 0x8) (rerun: 64) setsockopt$MRT_TABLE(r3, 0x0, 0xcf, &(0x7f0000000080)=0xfe, 0x4) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="66640458a60cd9bd19c76d3d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x684800, 0x0) 03:05:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:38 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="17726f6f746d6f64653d303030de61300c713030303030303030302c757365725f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRES16=r1, @ANYBLOB=',\x00']) 03:05:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:39 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:39 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="17726f6f746d6f64653d303030de61300c713030303030303030302c757365725f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRES16=r1, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="17726f6f746d6f64653d303030de61300c713030303030303030302c757365725f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRES16=r1, @ANYBLOB=',\x00']) (async) 03:05:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_BMAP(r1, &(0x7f0000000140)={0x18, 0x0, r3, {0x1000}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) r5 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r5}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r5, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000280)={0x0, r6, "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", "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"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81f8943c, &(0x7f000006ab80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000006ad80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000006bd80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0xb9, "a8ebabdaafde90"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000006cd80)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {0x0, r7}, {r8}, {}, {}, {r9}], 0x8, "17b67cbe0e6e66"}) (async) write$FUSE_POLL(r4, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x5}}, 0x18) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000f900000001060000000000005d00"], 0x22) 03:05:39 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:39 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="17726f6f746d6f64653d303030de61300c713030303030303030302c757365725f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRES16=r1, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="17726f6f746d6f64653d303030de61300c713030303030303030302c757365725f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRES16=r1, @ANYBLOB=',\x00']) (async) 03:05:39 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 2: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:40 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_READ'}}]}}) syz_mount_image$gfs2meta(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x72b, 0x8, &(0x7f0000000380)=[{&(0x7f0000000140)="e94da41600ecacd7fc0b1b41824fef4e8b3819585ebf44679b3943da9fb6de72328f373c32ff2fd05928df49366b67e3c6fe7822776dd07cd1ed4c57b42be9eaf759f186207f83a695aea2d35ef907288644ea4415b2e0b48d3417be1bd866201f3486c737bcc399a9e706355a13712bf4558c4ea008b6bd44f544284879561fd6b8e0bb71af31619ede30c0693440a6399b284115db77bd4c3d38d98420b78edbd88c07382198086d3c1962071ffe66116d8954a0bbb1e8c7c6c7fa8ea9e32d", 0xc0, 0xffffffff7fffffff}, {&(0x7f0000000200)="267376a14ec80960273c4bbfcf83a6566758be159ca59d8540bc98b5a1e598c99c7bb95846091a6b4e2b362f47663678405f91530eed26f89afa663ebc5661a404f5f205a071bb815b0d6e17f7", 0x4d, 0xa52}, {&(0x7f0000000280)="649d648507485c28d645fea300c231c7a1437801623be333e116a218bb290ae283c3aedae85b1c478b1859", 0x2b, 0x7ff}, {&(0x7f00000004c0)="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", 0x1000, 0x101}, {&(0x7f00000014c0)="64f70ce6b720c1955420ca97ea4496762e5f487eead6e0234a8242704d49f7de574cd2788b05d588c5972a06b2dce82af8b49a0115c09245da86e66ecb2f6dddaef77436db8a0b9bf09ce9f90895b80ab874801a36ea9c03587ba59aa24fdbb02c65a0ec8a153f2eca99c419f6b2c76f32ccc8a5648df6e9e2757a9d7d74acadef6df8cdf8126c777bd8c7b4d415f1ada6ab40caddb256614e8834af091003d95f11f0d5700a9c534b56595f6b334054489fce6fe6bfd8c41dfecb65f75d69fd446f52d85a15e788f3b2bc87be7fb103a5741704568bc7b1954060f0", 0xdc, 0x7fffffff}, {&(0x7f00000015c0)="cb85fa51e5f35c43a049e39c81e88a53795bdbc63081cc1d063c881d0543dccdfd74b66a5497e49bcdd168a4be150e2dd7d941fff72d4030416bf404f8b0c086718ac444d445e4e3f24d8cc33e6fbc0588257212d2dcbaaf6b437ceb29340bf28e7468790d3ef29588bc1e346716a908a4b3e3b4fcf98a663c54cb31645657dc893889ea1e98ca6868823eefbc2de420d2a054a6b7267c7f2c5b973256fb2c2fe8f346ae3a43c0829c29ec006d73cbaf03847bfce3ec6e4e61cef40f1a877c34a1e0cf59efb348e405b31238", 0xcc, 0x80000001}, {&(0x7f00000016c0)="e96a145d2626da0709b75811b34b1d56a9d8228d9bb6590fce189148f7ab414db2a03144e747970a63429091e4089c3d44a397decd99640fc490b81661206ec82b8872eee1637aacc8292859cc525490cde4366810d8fd071284e13596ea8fca89339d25129523f32058e9ac48160fb78f06f2da1fc72ad29519df10a239cb53dd81e6cc2b57d7b9dd20dca05dfb70c67d3fd2111ee3d315fb0839265337ca117237beeb652115404dcec9c93a08037f94e3cffdb2832b79e3412ebdad820b2c8fe6136046", 0xc5, 0xc82}, {&(0x7f00000017c0)="d0bdd8586757534ccc5810ecc22ececc95a80ef0f07ad7e474a44f55ba9f7518e5dcf503076c87698f34bd67d0a4384aff8a5598bfb5e078d9008ef3a7056a2c6fdedf1ddbcd59f3a2ac6d454efa95c197f3274cce3a8a2452dcc62bfebf7383080286b622f18ef2d7d541f4e6f23290d0ed4eb49ab82daa54e5359b5569ac76c72797bbb3432a03481cafe8001ee95120f6c4419f65544850df6d99c9bd899c4c5247b34e28b80a3af776e3b05ddd566fa70a8e21d4543b36d162e5650af41fbeb0212130b0c8d9c0433099377b232cf1929a460f993be917f1c806adddbd8c62f60e0590540adf2b4f7b", 0xeb, 0x80000001}], 0x40000, &(0x7f00000002c0)={[{'^+@:*!+}\''}, {'{'}, {'group_id'}, {'allow_other'}, {'user_id'}, {'\xaf'}, {'group_id'}, {'@,'}, {'user_id'}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'allow_other'}}, {@subj_role={'subj_role', 0x3d, '#'}}]}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000018c0)=0x1) r2 = inotify_init() inotify_rm_watch(r2, 0x0) 03:05:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 2: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:40 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_READ'}}]}}) (async) syz_mount_image$gfs2meta(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x72b, 0x8, &(0x7f0000000380)=[{&(0x7f0000000140)="e94da41600ecacd7fc0b1b41824fef4e8b3819585ebf44679b3943da9fb6de72328f373c32ff2fd05928df49366b67e3c6fe7822776dd07cd1ed4c57b42be9eaf759f186207f83a695aea2d35ef907288644ea4415b2e0b48d3417be1bd866201f3486c737bcc399a9e706355a13712bf4558c4ea008b6bd44f544284879561fd6b8e0bb71af31619ede30c0693440a6399b284115db77bd4c3d38d98420b78edbd88c07382198086d3c1962071ffe66116d8954a0bbb1e8c7c6c7fa8ea9e32d", 0xc0, 0xffffffff7fffffff}, {&(0x7f0000000200)="267376a14ec80960273c4bbfcf83a6566758be159ca59d8540bc98b5a1e598c99c7bb95846091a6b4e2b362f47663678405f91530eed26f89afa663ebc5661a404f5f205a071bb815b0d6e17f7", 0x4d, 0xa52}, {&(0x7f0000000280)="649d648507485c28d645fea300c231c7a1437801623be333e116a218bb290ae283c3aedae85b1c478b1859", 0x2b, 0x7ff}, {&(0x7f00000004c0)="5b3253ad8ffb9a3f9d5eea4541a00eba484649dd521a90873f82e043e3613437de3f39d29c670147e325e4dcb157f0f75652d021ca0ca2c2f17dac559fafd225a3346507ded792a8c72fd45f5712495e9d3eef0e8ba948272b3a79ee704a8c1fe21c7c680f10b0da0f7fd8ee0d9ae09de963c5795ba785399feb9a4af8f70e89f8a46334ecba0191705ddf8213affa6e2fa556a547e8b8149fc048c6ae743ae4c9c5a779f1cb408c5439423356671515fc36f17053659ac39a6ea90e7a7af7bc054a22d019cf5fe71554569148c91de39ee476402dd51e4324d5053357363652cd9b1e47c2d5e22ab04d9c59b8136706699b2cdfaa033bb2e8a8ca4ce080b98b2fdcc919299dd48d0ca94edda68cda2ee9322f5ec8d07dea2fecea235f9affcefeb0e282202cba4665b2b46f7a20943466af9961b2e59e6caec6ece255d3cf5ec8d223bd6e21c0ceacdb74054725d052a949c914aab1358caff0b6194a9c28fc3f51cb23264ac5218e4b5aae75378249e37cc6636e456bc44c3a732d7a5c3ae853a6a7babd84effe90bec2522ab369bdba5a424164ad2436d116967bab54c5d5e5ecf294de206cd9cb2e9c2053b6ad5b7cd133e39254d2608bba4bafbdab08d0c7e5feb8384df444a7c7fc35f99ddeefba786f70f68c450036de5db6b98414dcb3228acda7859334dfc9738b7314ceebf4b233e8e43e8e3a70b96808a8e34a974ed0d2a41f09958fc1d5cec3e7dbe6f747853d6d1e1f8fd92e7d64d039b3faf22651781e906317eb6f74184fc0c32006165bd8b8c71ed0bb08967956b2f322f66f4ae37b7854fe5a96b9a96fa603aeb8b9e419aed5c7aea8333cddeadf89632b85fcf7580f45f1d3ea9935f8ba58567143882e1e3eb6d104a36e8f3d0faa6e61881c4e62cb708c4eea311725856b53913a23c872c66047e07b3d136102fdd90cf220612019f755ec66a676ee8df5b36213d4fb7e3e26489713451c0d6bdfd58f77f83943f4432ee2df63a8584a9d48f1338c5e5a5fbd87932f4111f42d0826d7931ead5b2af81eb65d15607166b3f244820ac8d1b5609933f527902200adf898b19c2b25b324cae374b3edbe6fbdf947cd3f40250abacd2ffd6be3493ddf97eb416a56573d7d06a52e840fad99569799d69c91a5f3aea73bc174a86f86f716eda135a29b8daa498009a5f0326a1af98c929c298d7fb307e60260068af0608edd9483fd434ba955ba5182198376bab84c5eb45ac0298d3020bfd5bd9593b9275521250b4f4bf9fd37b758dd095ea4ded510227e004869dc3b15d6146cf954c91b635ee13693872ef4bcf0425b87d24f8256bb340cd24e8304dc1dc0c08ab6f1f2b4dff821c80348d7e36ef39144ed28b90b3d5ca8885f087a1d539023b585869c98db471cde4ebb1851f1943ca796c6e131d65f12094f2eefccf3900cc52c88d830759ea6f2223965619148e3d8ad097469e47fbe798685559ebf63ab6a778dc02dccf87873fefe74f7faa1dde71cce5264b1da4ce4827d3c838b3bc831ad334bbb616a392b87e3860434001b8355e20b9fd51d87d91ce5ba3a71ae9816b5b1475c644149971542c9bcd123ee65d657d663d2f11b62db838338b652533771adde9ed6d2ea2440789f95d8247e58b3c03eb1f9ded36e1bb406ce31af90fc809a4d1ff39ef65546c373f4be46ba70a80d83007d0cb6fd422f613099db22e5eafed57f4e144351c3226d9e12157a19e127357be2fd36d79a08eb4573ab033bb34eb1d55aa0271815adf2ac3578168f0916c1c0604d0e7c252f37556553973981a3b80193f678095e3b949642e11e01788e9cac2cf3dccc3bba4daa7e9eb3c2ae3c816da3277302a86864b94718ad49b269c14d8c265735fa922eb608eecee50df36170110c05450238db52e3fca27c24f1b65584332099c5bad8ae945600c97ced93a7cbfbd0aca300596d282f1d560ffc7f879d894c0464444034a01b61cdfdc29941b9292e996980b1084863eba9cf0a847b2f7cc699cb7b3a143d47ab756fa1627354946c7db79cbdabbf6319aaf60c2cea49811ea95d2dc6d3fa48361bff85a106fdc0586052fd81e34a1c51dd9d375c89d90f3dd181e3e2435ca7a8344036485b8632492fd4d1bf44237c0aa719885fd4545be891f550c2c9c0a1726b5925791fa196e195ab19eb2898c0da698904fa74369fc8c78c6318b157036cd4f36b427ca54dbce015129ebb9e0fe3a1eb6748bfc94cb0d20a2386b74a6bcd32d04f019d94a804a6f113e3204a459665acef2538d023155473f205cee2efc2ce04fc222cf42a2642d32a1c6af7782fadd3f156782789755731f99f18d0d39a95e3d0294b7f15fc4b03d93c3ad57d027d9b4f274a1c060db117a6033c44119599dd1ac6e5e668a74d7d52806f1459cb00577a403891db6e886371d72e595879ce5c3e69902b931833ec26e998f6e9ad0d72d5e974f8192333e3d63538369d54c28a7cd5335cc4337d4a2178ba68da005cf47ee7423959a065e3da9ff0f3b3798a4267a752724ab12f55684581107b121a78dc25f62c579423c40c4a8403bba6c5685e8348887af18be9fa022bc7d21c4dfb28e6257adc2456e800581167a14b96f09c3da35ff165c580fccfbb3060fad648910f61eaa2252ad529684974e17e170864f1b82e492c7490088848b001f13b5da1a94e20d1f761fd20d59a09aa3bdde9545efaa09a8b1dc095b3e6307d1c4cffa51eb672d64bf7dd328f4428a4630f71fdc03857214c0feaf2f8e739e68db98b94704a1906026c08550015c6142247edeb220c3362871289bcdfff5e77ae89cbdcc5061a78977d782c5a89b358b6aad00c17a39d26b38cb494de7e9b224723cd0ef805b0225efff98435b501134f6ffd57f23cd7a5d75802a1865e540d5e70976e51f1d490f40e5c1c3c40ca479611a01ae323b685b8e72146f094a1559844fcc5e85d57c54b736fcc3d5ed270065d8444836d58c30bf927a7457b8e7149651e4f7091fe48835a1642c6905da2cb53fbc1b1b0f8cc38d044c152010a4f4b081c02d82758f710b8d7a9bae04c1cd5e4a6a01d4e9cdcb10c749cdc73aaec4c264532132846506d9641464dfd52feb0ec9c0042b25e777d3d0ac152da8abf0910ff9735905b6d76bf01efc1dbd7fbb492b5adc065743f49d59725c0f78df5c2f53844644996a8b9b80b28d5b0d2f80d915af528451c16c39a56b4663007b5d552faf75633aaaad7ca32b8d1229031bb253d93f4de6d5870db5179f34a0fcd13a6ea3e8f8317452e3ac9d9d0e0b6cddcbbae00ff7d84ecc3e03445b43329785409e7898edb3dd9b99bbd567e2732f51823c1d2f944228b439594e786a538d3cdfbdc6b87bcc7f828efd4c798392f08fc8bcdc6a2e3dcb077d8c35bc3d60b6fbc443021b7de088cf0fddd8e4555bcb014b3669f4b61a14a83fab2d9d481b2686ad10c8dc6972ac0339a0dccad4315f6833cc283d5721aab16ed9211017e5d4cd4f87eab622d5583a15266730ac7bb08d71274f05064d988e107c88a3871dcc83612345ffce1366ba146f66cbfc9a2c8d3ac4a973e04e322c6794ebf0f062def450c3778ab9a1c670ea0cce6f98fd46bc54750ba2fae54f6bac1bc2b9f0a091dea46b9aedd0de470c47931528eba5f311400920c4bc2e59e57b7f7a9d82f586457a897740619f51b693b0d8fcf688bdf222515fe2d2b02f0666d2f9cd51a497a18e532b9d7a966808a3c19ca9d87b88742cb52cea75e629e502a915b26ec468e7893fa1fb77673d0bed4f5009b8d1da1815d5e14446e63c0741143ce23e7ab55f510794efca326edbdf2c6ef37a7f1b8c6ee1690fb1e5b36ba5b4152483cb55f5ca18b3315d4bb9d062d3058a15f2029a0d0b9305b5bf98d54e513b97415160711f3154d18a85cea40b9b0826a848eb2adddb252ad98bde87815e2d2e06ab5efee18de5dbf855551b807c09bbc6104dddce10d792a0a1199a518611fc0834fdd7bc4de864b8b1bcbb6bbb17d077706beb0a0f47a13514d2d455c9ef14a1caf21274d44f755e16a9f5763e0cd59ab2765f6b19dbfb92230b8b6c0f073bfd71d61321d1d6c31d7d6daba992501bf654b049f567827984401d65cdbb60d14ac55cb2e2c09e152bfa491d91a04613bdcba23492793f99d3c6337b1f31aa933c40572aa68e6ecf081481d5b3168c2f556dcc379b6e272931e2f698251da4c946f7abeb4a25a9d4dc21683268e22da8b7744b1ea29682e16f1843276ca88f42eaccedd6dd1f1710e63e8e98a3174590e31c62abb789260afb9f2dfe5f39385041cedf984ba6b78e9d859f08285e29016f560392bb19cb4d0d9316c3f4b19c2191aaed9d65b8d6fa6808eb3ec0b8b6ce67c8c26eff0b52eea2513fdd27e46eaefe3403dd0e4fff05b4abdee743cc85ebaece582cd71e483fc39033119a523efd3879b6d712d29495ad58a3e5983a6e9039343e2a882d84d1a86cd909c76c4c50bc883364b590456347db5c6508d2d45c773de6accc13955a3385efc49d1c3dc90934112cbe19b99129358cd73be82e911bea42897c0661318f271ae8a8bce3ddc3ed0f5a9ab70b91bf99fb9a69c1b78d44df7bc89067102fcaf6167aeb7ea48c7d206bd44e44820a489c243076bca24824c4e4f3acce536e072245cfbceff9840b986bb3b34c68f04d5a7afd2ace3cb2cf6d5b3e79a4a6696440f134cc4d72acdcc54bcdbb7e4b1888b7638996fa3ba213a434eaa8f8be8ca9f0ee299ffc50081fc839d19043ecdd7471054b68301b06e7e96ed1a8236ad8919323503570ea8c970dbd39baccfa409518abc39d941df50d865784f7ea754536c6e2f57bba2676c5370bfa7860823d83651844c4ef4cb3c128734d63fd418a782abfa23ee7f7861779506b710b88e370ed8b560299e1c88b8f938c369a154bc434b0e8d633241c12f1fd646b52c98ebefcd2b48b08c8ea328436f4c21d208fe1dd0fc955caa30252a1825e993e8c4c1a0403b82b219252582f54fe4d7dde65c08c174362115fee887bef9b821b8d5b7298f7f8d6391f4ee1d7d00711da659ae333f2901acf8783ba6b4895641379829adc835a26e9e63a2127d3fe643e5faa30dbeed022263d267f018b1209c01994cb28999140e59d33147273f15ac65ed87c926f547490805cd5c771aa786fb2086e20ab5bbe5e8259e29a9078538609f7d3abeca07529b5bfaffb23bd3dcee4dd4e11f5a3be32789e3f87960b05db5f349ec3324039238e4af7c4f5719d6302f6265701f37eb4d3a6546fa63779c94b4c83a40f15b831972a424266a66ecb2fb294682a591344c36d40412c8591e02471fb98069a20c759857265e8ec950770786b3e4208ac3a172a40394e4e622e98cfc1f9d890c458fa9b96794c0307f71f079b4d53432b80b27bc8db056b91f35d1c829d8190b5ca16d33bf1326abe1d7c2534eece6c61d24cdc532633e90c74434478a1577ec8cb76635a8cfc2232f638a846650c558cd46e51fb53f527d05d2e20b710e856713a69a8db8036273dc3c69c32e79f8a12a1434fba20f5eb4f2ec926595f6567a9310b5f2f3e685bf69e9e82af4725839aa0cbc953e4d5ccb5ec5b9ede2c4b95a00e3a98667959365ef2a8c3a5940eaa70443a762456a6ada5084b949959b7477469416aa411a960f47419d0653f779ca9c636a4a099c75e90d4005689876d960349cb88945c4ba4e6242da7e713dcdb797d8b2aade5b35ce9d691f8931ae070f093b02e939094bf59eb1209bd4d5fdb3ab621861b29f5729d1d42d34", 0x1000, 0x101}, {&(0x7f00000014c0)="64f70ce6b720c1955420ca97ea4496762e5f487eead6e0234a8242704d49f7de574cd2788b05d588c5972a06b2dce82af8b49a0115c09245da86e66ecb2f6dddaef77436db8a0b9bf09ce9f90895b80ab874801a36ea9c03587ba59aa24fdbb02c65a0ec8a153f2eca99c419f6b2c76f32ccc8a5648df6e9e2757a9d7d74acadef6df8cdf8126c777bd8c7b4d415f1ada6ab40caddb256614e8834af091003d95f11f0d5700a9c534b56595f6b334054489fce6fe6bfd8c41dfecb65f75d69fd446f52d85a15e788f3b2bc87be7fb103a5741704568bc7b1954060f0", 0xdc, 0x7fffffff}, {&(0x7f00000015c0)="cb85fa51e5f35c43a049e39c81e88a53795bdbc63081cc1d063c881d0543dccdfd74b66a5497e49bcdd168a4be150e2dd7d941fff72d4030416bf404f8b0c086718ac444d445e4e3f24d8cc33e6fbc0588257212d2dcbaaf6b437ceb29340bf28e7468790d3ef29588bc1e346716a908a4b3e3b4fcf98a663c54cb31645657dc893889ea1e98ca6868823eefbc2de420d2a054a6b7267c7f2c5b973256fb2c2fe8f346ae3a43c0829c29ec006d73cbaf03847bfce3ec6e4e61cef40f1a877c34a1e0cf59efb348e405b31238", 0xcc, 0x80000001}, {&(0x7f00000016c0)="e96a145d2626da0709b75811b34b1d56a9d8228d9bb6590fce189148f7ab414db2a03144e747970a63429091e4089c3d44a397decd99640fc490b81661206ec82b8872eee1637aacc8292859cc525490cde4366810d8fd071284e13596ea8fca89339d25129523f32058e9ac48160fb78f06f2da1fc72ad29519df10a239cb53dd81e6cc2b57d7b9dd20dca05dfb70c67d3fd2111ee3d315fb0839265337ca117237beeb652115404dcec9c93a08037f94e3cffdb2832b79e3412ebdad820b2c8fe6136046", 0xc5, 0xc82}, {&(0x7f00000017c0)="d0bdd8586757534ccc5810ecc22ececc95a80ef0f07ad7e474a44f55ba9f7518e5dcf503076c87698f34bd67d0a4384aff8a5598bfb5e078d9008ef3a7056a2c6fdedf1ddbcd59f3a2ac6d454efa95c197f3274cce3a8a2452dcc62bfebf7383080286b622f18ef2d7d541f4e6f23290d0ed4eb49ab82daa54e5359b5569ac76c72797bbb3432a03481cafe8001ee95120f6c4419f65544850df6d99c9bd899c4c5247b34e28b80a3af776e3b05ddd566fa70a8e21d4543b36d162e5650af41fbeb0212130b0c8d9c0433099377b232cf1929a460f993be917f1c806adddbd8c62f60e0590540adf2b4f7b", 0xeb, 0x80000001}], 0x40000, &(0x7f00000002c0)={[{'^+@:*!+}\''}, {'{'}, {'group_id'}, {'allow_other'}, {'user_id'}, {'\xaf'}, {'group_id'}, {'@,'}, {'user_id'}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'allow_other'}}, {@subj_role={'subj_role', 0x3d, '#'}}]}) (async) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000018c0)=0x1) r2 = inotify_init() inotify_rm_watch(r2, 0x0) 03:05:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:40 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:40 executing program 2: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:40 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_READ'}}]}}) syz_mount_image$gfs2meta(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x72b, 0x8, &(0x7f0000000380)=[{&(0x7f0000000140)="e94da41600ecacd7fc0b1b41824fef4e8b3819585ebf44679b3943da9fb6de72328f373c32ff2fd05928df49366b67e3c6fe7822776dd07cd1ed4c57b42be9eaf759f186207f83a695aea2d35ef907288644ea4415b2e0b48d3417be1bd866201f3486c737bcc399a9e706355a13712bf4558c4ea008b6bd44f544284879561fd6b8e0bb71af31619ede30c0693440a6399b284115db77bd4c3d38d98420b78edbd88c07382198086d3c1962071ffe66116d8954a0bbb1e8c7c6c7fa8ea9e32d", 0xc0, 0xffffffff7fffffff}, {&(0x7f0000000200)="267376a14ec80960273c4bbfcf83a6566758be159ca59d8540bc98b5a1e598c99c7bb95846091a6b4e2b362f47663678405f91530eed26f89afa663ebc5661a404f5f205a071bb815b0d6e17f7", 0x4d, 0xa52}, {&(0x7f0000000280)="649d648507485c28d645fea300c231c7a1437801623be333e116a218bb290ae283c3aedae85b1c478b1859", 0x2b, 0x7ff}, {&(0x7f00000004c0)="5b3253ad8ffb9a3f9d5eea4541a00eba484649dd521a90873f82e043e3613437de3f39d29c670147e325e4dcb157f0f75652d021ca0ca2c2f17dac559fafd225a3346507ded792a8c72fd45f5712495e9d3eef0e8ba948272b3a79ee704a8c1fe21c7c680f10b0da0f7fd8ee0d9ae09de963c5795ba785399feb9a4af8f70e89f8a46334ecba0191705ddf8213affa6e2fa556a547e8b8149fc048c6ae743ae4c9c5a779f1cb408c5439423356671515fc36f17053659ac39a6ea90e7a7af7bc054a22d019cf5fe71554569148c91de39ee476402dd51e4324d5053357363652cd9b1e47c2d5e22ab04d9c59b8136706699b2cdfaa033bb2e8a8ca4ce080b98b2fdcc919299dd48d0ca94edda68cda2ee9322f5ec8d07dea2fecea235f9affcefeb0e282202cba4665b2b46f7a20943466af9961b2e59e6caec6ece255d3cf5ec8d223bd6e21c0ceacdb74054725d052a949c914aab1358caff0b6194a9c28fc3f51cb23264ac5218e4b5aae75378249e37cc6636e456bc44c3a732d7a5c3ae853a6a7babd84effe90bec2522ab369bdba5a424164ad2436d116967bab54c5d5e5ecf294de206cd9cb2e9c2053b6ad5b7cd133e39254d2608bba4bafbdab08d0c7e5feb8384df444a7c7fc35f99ddeefba786f70f68c450036de5db6b98414dcb3228acda7859334dfc9738b7314ceebf4b233e8e43e8e3a70b96808a8e34a974ed0d2a41f09958fc1d5cec3e7dbe6f747853d6d1e1f8fd92e7d64d039b3faf22651781e906317eb6f74184fc0c32006165bd8b8c71ed0bb08967956b2f322f66f4ae37b7854fe5a96b9a96fa603aeb8b9e419aed5c7aea8333cddeadf89632b85fcf7580f45f1d3ea9935f8ba58567143882e1e3eb6d104a36e8f3d0faa6e61881c4e62cb708c4eea311725856b53913a23c872c66047e07b3d136102fdd90cf220612019f755ec66a676ee8df5b36213d4fb7e3e26489713451c0d6bdfd58f77f83943f4432ee2df63a8584a9d48f1338c5e5a5fbd87932f4111f42d0826d7931ead5b2af81eb65d15607166b3f244820ac8d1b5609933f527902200adf898b19c2b25b324cae374b3edbe6fbdf947cd3f40250abacd2ffd6be3493ddf97eb416a56573d7d06a52e840fad99569799d69c91a5f3aea73bc174a86f86f716eda135a29b8daa498009a5f0326a1af98c929c298d7fb307e60260068af0608edd9483fd434ba955ba5182198376bab84c5eb45ac0298d3020bfd5bd9593b9275521250b4f4bf9fd37b758dd095ea4ded510227e004869dc3b15d6146cf954c91b635ee13693872ef4bcf0425b87d24f8256bb340cd24e8304dc1dc0c08ab6f1f2b4dff821c80348d7e36ef39144ed28b90b3d5ca8885f087a1d539023b585869c98db471cde4ebb1851f1943ca796c6e131d65f12094f2eefccf3900cc52c88d830759ea6f2223965619148e3d8ad097469e47fbe798685559ebf63ab6a778dc02dccf87873fefe74f7faa1dde71cce5264b1da4ce4827d3c838b3bc831ad334bbb616a392b87e3860434001b8355e20b9fd51d87d91ce5ba3a71ae9816b5b1475c644149971542c9bcd123ee65d657d663d2f11b62db838338b652533771adde9ed6d2ea2440789f95d8247e58b3c03eb1f9ded36e1bb406ce31af90fc809a4d1ff39ef65546c373f4be46ba70a80d83007d0cb6fd422f613099db22e5eafed57f4e144351c3226d9e12157a19e127357be2fd36d79a08eb4573ab033bb34eb1d55aa0271815adf2ac3578168f0916c1c0604d0e7c252f37556553973981a3b80193f678095e3b949642e11e01788e9cac2cf3dccc3bba4daa7e9eb3c2ae3c816da3277302a86864b94718ad49b269c14d8c265735fa922eb608eecee50df36170110c05450238db52e3fca27c24f1b65584332099c5bad8ae945600c97ced93a7cbfbd0aca300596d282f1d560ffc7f879d894c0464444034a01b61cdfdc29941b9292e996980b1084863eba9cf0a847b2f7cc699cb7b3a143d47ab756fa1627354946c7db79cbdabbf6319aaf60c2cea49811ea95d2dc6d3fa48361bff85a106fdc0586052fd81e34a1c51dd9d375c89d90f3dd181e3e2435ca7a8344036485b8632492fd4d1bf44237c0aa719885fd4545be891f550c2c9c0a1726b5925791fa196e195ab19eb2898c0da698904fa74369fc8c78c6318b157036cd4f36b427ca54dbce015129ebb9e0fe3a1eb6748bfc94cb0d20a2386b74a6bcd32d04f019d94a804a6f113e3204a459665acef2538d023155473f205cee2efc2ce04fc222cf42a2642d32a1c6af7782fadd3f156782789755731f99f18d0d39a95e3d0294b7f15fc4b03d93c3ad57d027d9b4f274a1c060db117a6033c44119599dd1ac6e5e668a74d7d52806f1459cb00577a403891db6e886371d72e595879ce5c3e69902b931833ec26e998f6e9ad0d72d5e974f8192333e3d63538369d54c28a7cd5335cc4337d4a2178ba68da005cf47ee7423959a065e3da9ff0f3b3798a4267a752724ab12f55684581107b121a78dc25f62c579423c40c4a8403bba6c5685e8348887af18be9fa022bc7d21c4dfb28e6257adc2456e800581167a14b96f09c3da35ff165c580fccfbb3060fad648910f61eaa2252ad529684974e17e170864f1b82e492c7490088848b001f13b5da1a94e20d1f761fd20d59a09aa3bdde9545efaa09a8b1dc095b3e6307d1c4cffa51eb672d64bf7dd328f4428a4630f71fdc03857214c0feaf2f8e739e68db98b94704a1906026c08550015c6142247edeb220c3362871289bcdfff5e77ae89cbdcc5061a78977d782c5a89b358b6aad00c17a39d26b38cb494de7e9b224723cd0ef805b0225efff98435b501134f6ffd57f23cd7a5d75802a1865e540d5e70976e51f1d490f40e5c1c3c40ca479611a01ae323b685b8e72146f094a1559844fcc5e85d57c54b736fcc3d5ed270065d8444836d58c30bf927a7457b8e7149651e4f7091fe48835a1642c6905da2cb53fbc1b1b0f8cc38d044c152010a4f4b081c02d82758f710b8d7a9bae04c1cd5e4a6a01d4e9cdcb10c749cdc73aaec4c264532132846506d9641464dfd52feb0ec9c0042b25e777d3d0ac152da8abf0910ff9735905b6d76bf01efc1dbd7fbb492b5adc065743f49d59725c0f78df5c2f53844644996a8b9b80b28d5b0d2f80d915af528451c16c39a56b4663007b5d552faf75633aaaad7ca32b8d1229031bb253d93f4de6d5870db5179f34a0fcd13a6ea3e8f8317452e3ac9d9d0e0b6cddcbbae00ff7d84ecc3e03445b43329785409e7898edb3dd9b99bbd567e2732f51823c1d2f944228b439594e786a538d3cdfbdc6b87bcc7f828efd4c798392f08fc8bcdc6a2e3dcb077d8c35bc3d60b6fbc443021b7de088cf0fddd8e4555bcb014b3669f4b61a14a83fab2d9d481b2686ad10c8dc6972ac0339a0dccad4315f6833cc283d5721aab16ed9211017e5d4cd4f87eab622d5583a15266730ac7bb08d71274f05064d988e107c88a3871dcc83612345ffce1366ba146f66cbfc9a2c8d3ac4a973e04e322c6794ebf0f062def450c3778ab9a1c670ea0cce6f98fd46bc54750ba2fae54f6bac1bc2b9f0a091dea46b9aedd0de470c47931528eba5f311400920c4bc2e59e57b7f7a9d82f586457a897740619f51b693b0d8fcf688bdf222515fe2d2b02f0666d2f9cd51a497a18e532b9d7a966808a3c19ca9d87b88742cb52cea75e629e502a915b26ec468e7893fa1fb77673d0bed4f5009b8d1da1815d5e14446e63c0741143ce23e7ab55f510794efca326edbdf2c6ef37a7f1b8c6ee1690fb1e5b36ba5b4152483cb55f5ca18b3315d4bb9d062d3058a15f2029a0d0b9305b5bf98d54e513b97415160711f3154d18a85cea40b9b0826a848eb2adddb252ad98bde87815e2d2e06ab5efee18de5dbf855551b807c09bbc6104dddce10d792a0a1199a518611fc0834fdd7bc4de864b8b1bcbb6bbb17d077706beb0a0f47a13514d2d455c9ef14a1caf21274d44f755e16a9f5763e0cd59ab2765f6b19dbfb92230b8b6c0f073bfd71d61321d1d6c31d7d6daba992501bf654b049f567827984401d65cdbb60d14ac55cb2e2c09e152bfa491d91a04613bdcba23492793f99d3c6337b1f31aa933c40572aa68e6ecf081481d5b3168c2f556dcc379b6e272931e2f698251da4c946f7abeb4a25a9d4dc21683268e22da8b7744b1ea29682e16f1843276ca88f42eaccedd6dd1f1710e63e8e98a3174590e31c62abb789260afb9f2dfe5f39385041cedf984ba6b78e9d859f08285e29016f560392bb19cb4d0d9316c3f4b19c2191aaed9d65b8d6fa6808eb3ec0b8b6ce67c8c26eff0b52eea2513fdd27e46eaefe3403dd0e4fff05b4abdee743cc85ebaece582cd71e483fc39033119a523efd3879b6d712d29495ad58a3e5983a6e9039343e2a882d84d1a86cd909c76c4c50bc883364b590456347db5c6508d2d45c773de6accc13955a3385efc49d1c3dc90934112cbe19b99129358cd73be82e911bea42897c0661318f271ae8a8bce3ddc3ed0f5a9ab70b91bf99fb9a69c1b78d44df7bc89067102fcaf6167aeb7ea48c7d206bd44e44820a489c243076bca24824c4e4f3acce536e072245cfbceff9840b986bb3b34c68f04d5a7afd2ace3cb2cf6d5b3e79a4a6696440f134cc4d72acdcc54bcdbb7e4b1888b7638996fa3ba213a434eaa8f8be8ca9f0ee299ffc50081fc839d19043ecdd7471054b68301b06e7e96ed1a8236ad8919323503570ea8c970dbd39baccfa409518abc39d941df50d865784f7ea754536c6e2f57bba2676c5370bfa7860823d83651844c4ef4cb3c128734d63fd418a782abfa23ee7f7861779506b710b88e370ed8b560299e1c88b8f938c369a154bc434b0e8d633241c12f1fd646b52c98ebefcd2b48b08c8ea328436f4c21d208fe1dd0fc955caa30252a1825e993e8c4c1a0403b82b219252582f54fe4d7dde65c08c174362115fee887bef9b821b8d5b7298f7f8d6391f4ee1d7d00711da659ae333f2901acf8783ba6b4895641379829adc835a26e9e63a2127d3fe643e5faa30dbeed022263d267f018b1209c01994cb28999140e59d33147273f15ac65ed87c926f547490805cd5c771aa786fb2086e20ab5bbe5e8259e29a9078538609f7d3abeca07529b5bfaffb23bd3dcee4dd4e11f5a3be32789e3f87960b05db5f349ec3324039238e4af7c4f5719d6302f6265701f37eb4d3a6546fa63779c94b4c83a40f15b831972a424266a66ecb2fb294682a591344c36d40412c8591e02471fb98069a20c759857265e8ec950770786b3e4208ac3a172a40394e4e622e98cfc1f9d890c458fa9b96794c0307f71f079b4d53432b80b27bc8db056b91f35d1c829d8190b5ca16d33bf1326abe1d7c2534eece6c61d24cdc532633e90c74434478a1577ec8cb76635a8cfc2232f638a846650c558cd46e51fb53f527d05d2e20b710e856713a69a8db8036273dc3c69c32e79f8a12a1434fba20f5eb4f2ec926595f6567a9310b5f2f3e685bf69e9e82af4725839aa0cbc953e4d5ccb5ec5b9ede2c4b95a00e3a98667959365ef2a8c3a5940eaa70443a762456a6ada5084b949959b7477469416aa411a960f47419d0653f779ca9c636a4a099c75e90d4005689876d960349cb88945c4ba4e6242da7e713dcdb797d8b2aade5b35ce9d691f8931ae070f093b02e939094bf59eb1209bd4d5fdb3ab621861b29f5729d1d42d34", 0x1000, 0x101}, {&(0x7f00000014c0)="64f70ce6b720c1955420ca97ea4496762e5f487eead6e0234a8242704d49f7de574cd2788b05d588c5972a06b2dce82af8b49a0115c09245da86e66ecb2f6dddaef77436db8a0b9bf09ce9f90895b80ab874801a36ea9c03587ba59aa24fdbb02c65a0ec8a153f2eca99c419f6b2c76f32ccc8a5648df6e9e2757a9d7d74acadef6df8cdf8126c777bd8c7b4d415f1ada6ab40caddb256614e8834af091003d95f11f0d5700a9c534b56595f6b334054489fce6fe6bfd8c41dfecb65f75d69fd446f52d85a15e788f3b2bc87be7fb103a5741704568bc7b1954060f0", 0xdc, 0x7fffffff}, {&(0x7f00000015c0)="cb85fa51e5f35c43a049e39c81e88a53795bdbc63081cc1d063c881d0543dccdfd74b66a5497e49bcdd168a4be150e2dd7d941fff72d4030416bf404f8b0c086718ac444d445e4e3f24d8cc33e6fbc0588257212d2dcbaaf6b437ceb29340bf28e7468790d3ef29588bc1e346716a908a4b3e3b4fcf98a663c54cb31645657dc893889ea1e98ca6868823eefbc2de420d2a054a6b7267c7f2c5b973256fb2c2fe8f346ae3a43c0829c29ec006d73cbaf03847bfce3ec6e4e61cef40f1a877c34a1e0cf59efb348e405b31238", 0xcc, 0x80000001}, {&(0x7f00000016c0)="e96a145d2626da0709b75811b34b1d56a9d8228d9bb6590fce189148f7ab414db2a03144e747970a63429091e4089c3d44a397decd99640fc490b81661206ec82b8872eee1637aacc8292859cc525490cde4366810d8fd071284e13596ea8fca89339d25129523f32058e9ac48160fb78f06f2da1fc72ad29519df10a239cb53dd81e6cc2b57d7b9dd20dca05dfb70c67d3fd2111ee3d315fb0839265337ca117237beeb652115404dcec9c93a08037f94e3cffdb2832b79e3412ebdad820b2c8fe6136046", 0xc5, 0xc82}, {&(0x7f00000017c0)="d0bdd8586757534ccc5810ecc22ececc95a80ef0f07ad7e474a44f55ba9f7518e5dcf503076c87698f34bd67d0a4384aff8a5598bfb5e078d9008ef3a7056a2c6fdedf1ddbcd59f3a2ac6d454efa95c197f3274cce3a8a2452dcc62bfebf7383080286b622f18ef2d7d541f4e6f23290d0ed4eb49ab82daa54e5359b5569ac76c72797bbb3432a03481cafe8001ee95120f6c4419f65544850df6d99c9bd899c4c5247b34e28b80a3af776e3b05ddd566fa70a8e21d4543b36d162e5650af41fbeb0212130b0c8d9c0433099377b232cf1929a460f993be917f1c806adddbd8c62f60e0590540adf2b4f7b", 0xeb, 0x80000001}], 0x40000, &(0x7f00000002c0)={[{'^+@:*!+}\''}, {'{'}, {'group_id'}, {'allow_other'}, {'user_id'}, {'\xaf'}, {'group_id'}, {'@,'}, {'user_id'}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'allow_other'}}, {@subj_role={'subj_role', 0x3d, '#'}}]}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000018c0)=0x1) r2 = inotify_init() inotify_rm_watch(r2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@mask={'mask', 0x3d, '^MAY_READ'}}]}}) (async) syz_mount_image$gfs2meta(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x72b, 0x8, &(0x7f0000000380)=[{&(0x7f0000000140)="e94da41600ecacd7fc0b1b41824fef4e8b3819585ebf44679b3943da9fb6de72328f373c32ff2fd05928df49366b67e3c6fe7822776dd07cd1ed4c57b42be9eaf759f186207f83a695aea2d35ef907288644ea4415b2e0b48d3417be1bd866201f3486c737bcc399a9e706355a13712bf4558c4ea008b6bd44f544284879561fd6b8e0bb71af31619ede30c0693440a6399b284115db77bd4c3d38d98420b78edbd88c07382198086d3c1962071ffe66116d8954a0bbb1e8c7c6c7fa8ea9e32d", 0xc0, 0xffffffff7fffffff}, {&(0x7f0000000200)="267376a14ec80960273c4bbfcf83a6566758be159ca59d8540bc98b5a1e598c99c7bb95846091a6b4e2b362f47663678405f91530eed26f89afa663ebc5661a404f5f205a071bb815b0d6e17f7", 0x4d, 0xa52}, {&(0x7f0000000280)="649d648507485c28d645fea300c231c7a1437801623be333e116a218bb290ae283c3aedae85b1c478b1859", 0x2b, 0x7ff}, {&(0x7f00000004c0)="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", 0x1000, 0x101}, {&(0x7f00000014c0)="64f70ce6b720c1955420ca97ea4496762e5f487eead6e0234a8242704d49f7de574cd2788b05d588c5972a06b2dce82af8b49a0115c09245da86e66ecb2f6dddaef77436db8a0b9bf09ce9f90895b80ab874801a36ea9c03587ba59aa24fdbb02c65a0ec8a153f2eca99c419f6b2c76f32ccc8a5648df6e9e2757a9d7d74acadef6df8cdf8126c777bd8c7b4d415f1ada6ab40caddb256614e8834af091003d95f11f0d5700a9c534b56595f6b334054489fce6fe6bfd8c41dfecb65f75d69fd446f52d85a15e788f3b2bc87be7fb103a5741704568bc7b1954060f0", 0xdc, 0x7fffffff}, {&(0x7f00000015c0)="cb85fa51e5f35c43a049e39c81e88a53795bdbc63081cc1d063c881d0543dccdfd74b66a5497e49bcdd168a4be150e2dd7d941fff72d4030416bf404f8b0c086718ac444d445e4e3f24d8cc33e6fbc0588257212d2dcbaaf6b437ceb29340bf28e7468790d3ef29588bc1e346716a908a4b3e3b4fcf98a663c54cb31645657dc893889ea1e98ca6868823eefbc2de420d2a054a6b7267c7f2c5b973256fb2c2fe8f346ae3a43c0829c29ec006d73cbaf03847bfce3ec6e4e61cef40f1a877c34a1e0cf59efb348e405b31238", 0xcc, 0x80000001}, {&(0x7f00000016c0)="e96a145d2626da0709b75811b34b1d56a9d8228d9bb6590fce189148f7ab414db2a03144e747970a63429091e4089c3d44a397decd99640fc490b81661206ec82b8872eee1637aacc8292859cc525490cde4366810d8fd071284e13596ea8fca89339d25129523f32058e9ac48160fb78f06f2da1fc72ad29519df10a239cb53dd81e6cc2b57d7b9dd20dca05dfb70c67d3fd2111ee3d315fb0839265337ca117237beeb652115404dcec9c93a08037f94e3cffdb2832b79e3412ebdad820b2c8fe6136046", 0xc5, 0xc82}, {&(0x7f00000017c0)="d0bdd8586757534ccc5810ecc22ececc95a80ef0f07ad7e474a44f55ba9f7518e5dcf503076c87698f34bd67d0a4384aff8a5598bfb5e078d9008ef3a7056a2c6fdedf1ddbcd59f3a2ac6d454efa95c197f3274cce3a8a2452dcc62bfebf7383080286b622f18ef2d7d541f4e6f23290d0ed4eb49ab82daa54e5359b5569ac76c72797bbb3432a03481cafe8001ee95120f6c4419f65544850df6d99c9bd899c4c5247b34e28b80a3af776e3b05ddd566fa70a8e21d4543b36d162e5650af41fbeb0212130b0c8d9c0433099377b232cf1929a460f993be917f1c806adddbd8c62f60e0590540adf2b4f7b", 0xeb, 0x80000001}], 0x40000, &(0x7f00000002c0)={[{'^+@:*!+}\''}, {'{'}, {'group_id'}, {'allow_other'}, {'user_id'}, {'\xaf'}, {'group_id'}, {'@,'}, {'user_id'}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'allow_other'}}, {@subj_role={'subj_role', 0x3d, '#'}}]}) (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000018c0)=0x1) (async) inotify_init() (async) inotify_rm_watch(r2, 0x0) (async) 03:05:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 0: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0), 0x0, 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000014c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000004c0)={r2, 0x0, "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", "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"}) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030302a53d440fffd2223303030303030303030090000000000dcf9bca37fdaabe7c930460359743a54d2a92203657229535f69643d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 03:05:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = syz_open_dev$ndb(&(0x7f00000000c0), 0x0, 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000014c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000004c0)={r2, 0x0, "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", "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"}) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030302a53d440fffd2223303030303030303030090000000000dcf9bca37fdaabe7c930460359743a54d2a92203657229535f69643d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (rerun: 64) 03:05:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:41 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 0: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 0: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:41 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f00000000c0), 0x0, 0x200) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000014c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000004c0)={r2, 0x0, "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", "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"}) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030302a53d440fffd2223303030303030303030090000000000dcf9bca37fdaabe7c930460359743a54d2a92203657229535f69643d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_open_dev$ndb(&(0x7f00000000c0), 0x0, 0x200) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000014c0)) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000004c0)={r2, 0x0, "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", "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"}) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030302a53d440fffd2223303030303030303030090000000000dcf9bca37fdaabe7c930460359743a54d2a92203657229535f69643d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 03:05:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:41 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@obj_user={'obj_user', 0x3d, 'user_id'}}]}}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) read$FUSE(r4, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r5, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r5, {0x5}}, 0x18) 03:05:42 executing program 3: r0 = socket(0x22, 0x800, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x6, 0x7, 0x30, @dev={0xfe, 0x80, '\x00', 0x2a}, @empty, 0x8, 0x7, 0x3f, 0x8}}) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, &(0x7f0000000040)=0xff, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='f@\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:42 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@obj_user={'obj_user', 0x3d, 'user_id'}}]}}) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) read$FUSE(r4, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r5, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r5, {0x5}}, 0x18) 03:05:42 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 3: r0 = socket(0x22, 0x800, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x6, 0x7, 0x30, @dev={0xfe, 0x80, '\x00', 0x2a}, @empty, 0x8, 0x7, 0x3f, 0x8}}) (async) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, &(0x7f0000000040)=0xff, 0x4) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='f@\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:42 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@obj_user={'obj_user', 0x3d, 'user_id'}}]}}) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) read$FUSE(r4, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r5, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r5, {0x5}}, 0x18) 03:05:42 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 3: r0 = socket(0x22, 0x800, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x6, 0x7, 0x30, @dev={0xfe, 0x80, '\x00', 0x2a}, @empty, 0x8, 0x7, 0x3f, 0x8}}) setsockopt$MRT_TABLE(r0, 0x0, 0xcf, &(0x7f0000000040)=0xff, 0x4) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='f@\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:42 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_POLL(r2, &(0x7f0000000180)={0x18, 0xffffffffffffffda, r4, {0x1}}, 0x18) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r5, 0x0, 0x0) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000040)=""/240) 03:05:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:42 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3c0e3af0abd61479ad10ff713c06a4ed32c0c42f430c16e7d979842a24ed7436dcf99512a2cb506d29e40d20824c3386ece69aa3fb1fb5ca9d615cf5409caf91dd6b2fd4bd31aeb3178f6de1bd81f16c508a500bca1623f7", @ANYRESDEC=0x0, @ANYBLOB=',dont_measure,audit,dont_appraise,seclabel,\x00']) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getegid() read$FUSE(r1, &(0x7f00000061c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r5 = getuid() read$FUSE(r1, &(0x7f0000008200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)=0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x8000000}}, 0x18) write$FUSE_DIRENTPLUS(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="f003000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000020000000000000007000000000000000000000000000080f8ffffff000000000400000000000000ff000000000000000300000000000000cb0e0000000000005bac000000000000ec0000000000000000040000dd000000010000000060000040307400", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="030000000100000000000000000000000000000000020000000000000a000000070000002f6465762f6675736500000000000000020000000000000001000000000000000000000000000000001000000000000004000000ff030000040000000000000002000000000000000700000000000000060000000000000001000000000000000900000000000000e0ffffff010000806509fa040060000004000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="070000008100000000000000030000000000000008000000000000000a000000070000002f6465762f6375736500000000000000060000000000000000000000000000000100000000000000ffffffffffffff7f020000000001000006000000000000000500000000000000000000000000000000000080000000008dffffffffffffff04000000000000000900000001800000f8ffffff0040000007000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="050000000500000000000000020000000000000059000000000000000a000000000000802f6465762f66757365000000000000000100000000000000020000000000000005000000000000000200000000000000ff01000001000000030000000000000000000000000000000800000000000000ff0f000000000000ffffff7f0000000009000000000000000100000002000000050000000030000003000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="070000000100000000000000040000000000000000800000000000000800000000004800285e295d412b2c25020000000000000002000000000000002700000000000000070000000000000006000000070000000200000000000000060000000000000006000000000000000300000000000000ffffffffffffff7f060000000000000003000000a4b20000810000000080000000000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="400000000700000000000000030000000000000005000000000000000b000000000000002f6465762f6e7672616d00000000000004000000000000000100000000000000070000000000000009000000000000000100000006000000060000000000000000000000000000000010000000000000030000000000000002000000000000009a0700000000000001800000ff0100000900000000c0000000000000", @ANYRES32, @ANYRES32=r7, @ANYBLOB="02000000a70a0000000000000300000000000000090000000000000005000000800000006675736500000000"], 0x3f0) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r8, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r8, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r9, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r10, 0x0, 0x0) write$FUSE_GETXATTR(r10, &(0x7f00000002c0)={0x18, 0x0, 0x0, {0x66e8}}, 0x18) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0xfffffffffffffff5, r9, {0x205, 0x0, 0x1ff, 0x6}}, 0x20) 03:05:43 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:43 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async, rerun: 32) write$FUSE_POLL(r2, &(0x7f0000000180)={0x18, 0xffffffffffffffda, r4, {0x1}}, 0x18) (async, rerun: 32) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async, rerun: 32) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r5, 0x0, 0x0) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000040)=""/240) 03:05:43 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3c0e3af0abd61479ad10ff713c06a4ed32c0c42f430c16e7d979842a24ed7436dcf99512a2cb506d29e40d20824c3386ece69aa3fb1fb5ca9d615cf5409caf91dd6b2fd4bd31aeb3178f6de1bd81f16c508a500bca1623f7", @ANYRESDEC=0x0, @ANYBLOB=',dont_measure,audit,dont_appraise,seclabel,\x00']) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getegid() (async, rerun: 32) read$FUSE(r1, &(0x7f00000061c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) r5 = getuid() read$FUSE(r1, &(0x7f0000008200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async, rerun: 32) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)=0x0) (rerun: 32) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x8000000}}, 0x18) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="f003000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000020000000000000007000000000000000000000000000080f8ffffff000000000400000000000000ff000000000000000300000000000000cb0e0000000000005bac000000000000ec0000000000000000040000dd000000010000000060000040307400", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="030000000100000000000000000000000000000000020000000000000a000000070000002f6465762f6675736500000000000000020000000000000001000000000000000000000000000000001000000000000004000000ff030000040000000000000002000000000000000700000000000000060000000000000001000000000000000900000000000000e0ffffff010000806509fa040060000004000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="070000008100000000000000030000000000000008000000000000000a000000070000002f6465762f6375736500000000000000060000000000000000000000000000000100000000000000ffffffffffffff7f020000000001000006000000000000000500000000000000000000000000000000000080000000008dffffffffffffff04000000000000000900000001800000f8ffffff0040000007000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="050000000500000000000000020000000000000059000000000000000a000000000000802f6465762f66757365000000000000000100000000000000020000000000000005000000000000000200000000000000ff01000001000000030000000000000000000000000000000800000000000000ff0f000000000000ffffff7f0000000009000000000000000100000002000000050000000030000003000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="070000000100000000000000040000000000000000800000000000000800000000004800285e295d412b2c25020000000000000002000000000000002700000000000000070000000000000006000000070000000200000000000000060000000000000006000000000000000300000000000000ffffffffffffff7f060000000000000003000000a4b20000810000000080000000000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="400000000700000000000000030000000000000005000000000000000b000000000000002f6465762f6e7672616d00000000000004000000000000000100000000000000070000000000000009000000000000000100000006000000060000000000000000000000000000000010000000000000030000000000000002000000000000009a0700000000000001800000ff0100000900000000c0000000000000", @ANYRES32, @ANYRES32=r7, @ANYBLOB="02000000a70a0000000000000300000000000000090000000000000005000000800000006675736500000000"], 0x3f0) (async) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r8, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r8, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r9, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r10, 0x0, 0x0) (async) write$FUSE_GETXATTR(r10, &(0x7f00000002c0)={0x18, 0x0, 0x0, {0x66e8}}, 0x18) (async) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0xfffffffffffffff5, r9, {0x205, 0x0, 0x1ff, 0x6}}, 0x20) 03:05:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:43 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3c0e3af0abd61479ad10ff713c06a4ed32c0c42f430c16e7d979842a24ed7436dcf99512a2cb506d29e40d20824c3386ece69aa3fb1fb5ca9d615cf5409caf91dd6b2fd4bd31aeb3178f6de1bd81f16c508a500bca1623f7", @ANYRESDEC=0x0, @ANYBLOB=',dont_measure,audit,dont_appraise,seclabel,\x00']) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r3 = getegid() read$FUSE(r1, &(0x7f00000061c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r5 = getuid() read$FUSE(r1, &(0x7f0000008200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000240)=0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x8000000}}, 0x18) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="f003000000000000", @ANYRES64=0x0, @ANYBLOB="0100000000000000020000000000000007000000000000000000000000000080f8ffffff000000000400000000000000ff000000000000000300000000000000cb0e0000000000005bac000000000000ec0000000000000000040000dd000000010000000060000040307400", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="030000000100000000000000000000000000000000020000000000000a000000070000002f6465762f6675736500000000000000020000000000000001000000000000000000000000000000001000000000000004000000ff030000040000000000000002000000000000000700000000000000060000000000000001000000000000000900000000000000e0ffffff010000806509fa040060000004000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="070000008100000000000000030000000000000008000000000000000a000000070000002f6465762f6375736500000000000000060000000000000000000000000000000100000000000000ffffffffffffff7f020000000001000006000000000000000500000000000000000000000000000000000080000000008dffffffffffffff04000000000000000900000001800000f8ffffff0040000007000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="050000000500000000000000020000000000000059000000000000000a000000000000802f6465762f66757365000000000000000100000000000000020000000000000005000000000000000200000000000000ff01000001000000030000000000000000000000000000000800000000000000ff0f000000000000ffffff7f0000000009000000000000000100000002000000050000000030000003000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="070000000100000000000000040000000000000000800000000000000800000000004800285e295d412b2c25020000000000000002000000000000002700000000000000070000000000000006000000070000000200000000000000060000000000000006000000000000000300000000000000ffffffffffffff7f060000000000000003000000a4b20000810000000080000000000000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="400000000700000000000000030000000000000005000000000000000b000000000000002f6465762f6e7672616d00000000000004000000000000000100000000000000070000000000000009000000000000000100000006000000060000000000000000000000000000000010000000000000030000000000000002000000000000009a0700000000000001800000ff0100000900000000c0000000000000", @ANYRES32, @ANYRES32=r7, @ANYBLOB="02000000a70a0000000000000300000000000000090000000000000005000000800000006675736500000000"], 0x3f0) (async) r8 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r8, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r8, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r9, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r10, 0x0, 0x0) (async) write$FUSE_GETXATTR(r10, &(0x7f00000002c0)={0x18, 0x0, 0x0, {0x66e8}}, 0x18) (async) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0xfffffffffffffff5, r9, {0x205, 0x0, 0x1ff, 0x6}}, 0x20) 03:05:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async, rerun: 64) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 64) read$FUSE(r1, 0x0, 0x0) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) (async, rerun: 32) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 32) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_POLL(r2, &(0x7f0000000180)={0x18, 0xffffffffffffffda, r4, {0x1}}, 0x18) (async, rerun: 32) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async, rerun: 32) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async, rerun: 64) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 64) read$FUSE(r5, 0x0, 0x0) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000040)=""/240) 03:05:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:44 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:44 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:05:44 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 3: r0 = getegid() getgroups(0x4, &(0x7f0000000280)=[0xee00, 0xffffffffffffffff, r0, 0xffffffffffffffff]) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="22000000030000000000000000000000005d00"], 0x22) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)={0x1f0, 0x0, r3, [{{0x3, 0x0, 0x400, 0x0, 0x7fffffff, 0x3f, {0x3, 0x2000004, 0x6, 0xffffffff, 0xfffffffffffffff9, 0xdf5, 0xff, 0x4, 0x6, 0x4000, 0x100, 0xee00, 0xffffffffffffffff, 0x50, 0x3}}, {0x5, 0x5, 0x2, 0x4, '{-'}}, {{0x3, 0x0, 0x2, 0x6, 0x7, 0x80000000, {0x2, 0xf827, 0xfffffffffffffff9, 0x2, 0x800, 0x7fff, 0x4, 0x5, 0xa91c, 0x8000, 0x7, 0xee00, 0xffffffffffffffff, 0x80000001, 0x4}}, {0x3, 0x4362c2a6, 0x2, 0x40, 'fd'}}, {{0x0, 0x2, 0x6, 0xffff, 0x80000001, 0x7, {0x1, 0x0, 0x10001, 0x143, 0x8, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x6000, 0x1, 0xee01, 0xee00, 0xa5, 0x7}}, {0x1, 0x400, 0x4, 0x948, '}/!/'}}]}, 0x1f0) write$FUSE_LSEEK(r1, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, r3, {0x7}}, 0x18) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 03:05:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) (async) 03:05:44 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:44 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) (async) 03:05:45 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:45 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:45 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="aa029d39842c67726f75", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 03:05:45 executing program 3: r0 = getegid() getgroups(0x4, &(0x7f0000000280)=[0xee00, 0xffffffffffffffff, r0, 0xffffffffffffffff]) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="22000000030000000000000000000000005d00"], 0x22) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)={0x1f0, 0x0, r3, [{{0x3, 0x0, 0x400, 0x0, 0x7fffffff, 0x3f, {0x3, 0x2000004, 0x6, 0xffffffff, 0xfffffffffffffff9, 0xdf5, 0xff, 0x4, 0x6, 0x4000, 0x100, 0xee00, 0xffffffffffffffff, 0x50, 0x3}}, {0x5, 0x5, 0x2, 0x4, '{-'}}, {{0x3, 0x0, 0x2, 0x6, 0x7, 0x80000000, {0x2, 0xf827, 0xfffffffffffffff9, 0x2, 0x800, 0x7fff, 0x4, 0x5, 0xa91c, 0x8000, 0x7, 0xee00, 0xffffffffffffffff, 0x80000001, 0x4}}, {0x3, 0x4362c2a6, 0x2, 0x40, 'fd'}}, {{0x0, 0x2, 0x6, 0xffff, 0x80000001, 0x7, {0x1, 0x0, 0x10001, 0x143, 0x8, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x6000, 0x1, 0xee01, 0xee00, 0xa5, 0x7}}, {0x1, 0x400, 0x4, 0x948, '}/!/'}}]}, 0x1f0) write$FUSE_LSEEK(r1, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, r3, {0x7}}, 0x18) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getegid() (async) getgroups(0x4, &(0x7f0000000280)=[0xee00, 0xffffffffffffffff, r0, 0xffffffffffffffff]) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="22000000030000000000000000000000005d00"], 0x22) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)={0x1f0, 0x0, r3, [{{0x3, 0x0, 0x400, 0x0, 0x7fffffff, 0x3f, {0x3, 0x2000004, 0x6, 0xffffffff, 0xfffffffffffffff9, 0xdf5, 0xff, 0x4, 0x6, 0x4000, 0x100, 0xee00, 0xffffffffffffffff, 0x50, 0x3}}, {0x5, 0x5, 0x2, 0x4, '{-'}}, {{0x3, 0x0, 0x2, 0x6, 0x7, 0x80000000, {0x2, 0xf827, 0xfffffffffffffff9, 0x2, 0x800, 0x7fff, 0x4, 0x5, 0xa91c, 0x8000, 0x7, 0xee00, 0xffffffffffffffff, 0x80000001, 0x4}}, {0x3, 0x4362c2a6, 0x2, 0x40, 'fd'}}, {{0x0, 0x2, 0x6, 0xffff, 0x80000001, 0x7, {0x1, 0x0, 0x10001, 0x143, 0x8, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x6000, 0x1, 0xee01, 0xee00, 0xa5, 0x7}}, {0x1, 0x400, 0x4, 0x948, '}/!/'}}]}, 0x1f0) (async) write$FUSE_LSEEK(r1, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, r3, {0x7}}, 0x18) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) (async) 03:05:45 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:45 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="aa029d39842c67726f75", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="aa029d39842c67726f75", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) 03:05:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:45 executing program 3: r0 = getegid() getgroups(0x4, &(0x7f0000000280)=[0xee00, 0xffffffffffffffff, r0, 0xffffffffffffffff]) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="22000000030000000000000000000000005d00"], 0x22) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000040)={0x1f0, 0x0, r3, [{{0x3, 0x0, 0x400, 0x0, 0x7fffffff, 0x3f, {0x3, 0x2000004, 0x6, 0xffffffff, 0xfffffffffffffff9, 0xdf5, 0xff, 0x4, 0x6, 0x4000, 0x100, 0xee00, 0xffffffffffffffff, 0x50, 0x3}}, {0x5, 0x5, 0x2, 0x4, '{-'}}, {{0x3, 0x0, 0x2, 0x6, 0x7, 0x80000000, {0x2, 0xf827, 0xfffffffffffffff9, 0x2, 0x800, 0x7fff, 0x4, 0x5, 0xa91c, 0x8000, 0x7, 0xee00, 0xffffffffffffffff, 0x80000001, 0x4}}, {0x3, 0x4362c2a6, 0x2, 0x40, 'fd'}}, {{0x0, 0x2, 0x6, 0xffff, 0x80000001, 0x7, {0x1, 0x0, 0x10001, 0x143, 0x8, 0xffffffffffffffff, 0x1, 0x7, 0x0, 0x6000, 0x1, 0xee01, 0xee00, 0xa5, 0x7}}, {0x1, 0x400, 0x4, 0x948, '}/!/'}}]}, 0x1f0) write$FUSE_LSEEK(r1, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, r3, {0x7}}, 0x18) (async, rerun: 32) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) (rerun: 32) 03:05:45 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:45 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="aa029d39842c67726f75", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 03:05:45 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:46 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:46 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, r1}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:05:46 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, r1}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:05:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:46 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, r1}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:05:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:46 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:47 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:47 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) read$FUSE(r2, 0x0, 0x0) setsockopt$MRT_TABLE(r2, 0x0, 0xcf, &(0x7f0000000180)=0xffffff00, 0x4) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r1, &(0x7f00000001c0)={0x18, 0xffffffffffffffda, r3, {0x3}}, 0x18) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0xfffffffffffffff5, r3, {0x20000000000, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x627e18f3, 0x10000, 0x4000, 0x0, 0xee01, 0xee00, 0x0, 0x7}}}, 0x78) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r3, {{0x5, 0x10000, 0x80000000, 0x8001, 0xb7a, 0x0, 0x40, 0x8}}}, 0x60) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000240)=@gcm_256={{0x304}, "2e2e3302aeae0bcc", "9cd09bab26c435ccc8442f469dfedbdf61d684c35da107417b40386ad4597b85", "5aaf8c8b", "d812b26dae556687"}, 0x38) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES64, @ANYRES16, @ANYRESDEC]) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r4, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000140), 0x4) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r6, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="2f0000000400000000000000000000000400000000000000b1ffffffffffffff070000000000000000000000000000c64495df2621dfac691e3a8f2374f55aee438ba7540c30665537b7a47ae709fe9107c4743aafbd118dbead29b9a477be868fbfe64251e39b819867767b59c9e38c405e552cceedd2609798bbd694f100d81824a55d45df62132ef28e0f240ddd9c96543bb73b9f70d1ccfa24812f96be0f9d5c5c7ec5cc0697ca115411a27612c85b7e9219af261c001ed8b8b346c50a7835f2fc64d9f027aba3ed4600e7fb19757825efb6d881fd0c99a792af628291ce299520fbb65836b5d6c3e47f081a3232e897dee37781840e927a9f827ec4f893210493b7edacecfb101be61014ad038d2f5a8d84894bf679"], 0x2f) write$FUSE_ATTR(r4, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r5, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, r5, {0x9}}, 0x18) 03:05:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:47 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) read$FUSE(r2, 0x0, 0x0) (async) setsockopt$MRT_TABLE(r2, 0x0, 0xcf, &(0x7f0000000180)=0xffffff00, 0x4) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r1, &(0x7f00000001c0)={0x18, 0xffffffffffffffda, r3, {0x3}}, 0x18) (async) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0xfffffffffffffff5, r3, {0x20000000000, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x627e18f3, 0x10000, 0x4000, 0x0, 0xee01, 0xee00, 0x0, 0x7}}}, 0x78) (async) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r3, {{0x5, 0x10000, 0x80000000, 0x8001, 0xb7a, 0x0, 0x40, 0x8}}}, 0x60) (async) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000240)=@gcm_256={{0x304}, "2e2e3302aeae0bcc", "9cd09bab26c435ccc8442f469dfedbdf61d684c35da107417b40386ad4597b85", "5aaf8c8b", "d812b26dae556687"}, 0x38) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES64, @ANYRES16, @ANYRESDEC]) (async, rerun: 64) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (rerun: 64) read$FUSE(r4, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) (async) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000140), 0x4) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r6, 0x0, 0x0) (async) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x2f) (async, rerun: 64) write$FUSE_ATTR(r4, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r5, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async, rerun: 64) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, r5, {0x9}}, 0x18) 03:05:47 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:47 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) read$FUSE(r2, 0x0, 0x0) (async) setsockopt$MRT_TABLE(r2, 0x0, 0xcf, &(0x7f0000000180)=0xffffff00, 0x4) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r1, &(0x7f00000001c0)={0x18, 0xffffffffffffffda, r3, {0x3}}, 0x18) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000003c0)={0x78, 0xfffffffffffffff5, r3, {0x20000000000, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x627e18f3, 0x10000, 0x4000, 0x0, 0xee01, 0xee00, 0x0, 0x7}}}, 0x78) (async) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, r3, {{0x5, 0x10000, 0x80000000, 0x8001, 0xb7a, 0x0, 0x40, 0x8}}}, 0x60) (async) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000240)=@gcm_256={{0x304}, "2e2e3302aeae0bcc", "9cd09bab26c435ccc8442f469dfedbdf61d684c35da107417b40386ad4597b85", "5aaf8c8b", "d812b26dae556687"}, 0x38) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES64, @ANYRES16, @ANYRESDEC]) (async) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r4, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) (async) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000140), 0x4) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r6, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r6, &(0x7f0000000280)=ANY=[@ANYBLOB="2f0000000400000000000000000000000400000000000000b1ffffffffffffff070000000000000000000000000000c64495df2621dfac691e3a8f2374f55aee438ba7540c30665537b7a47ae709fe9107c4743aafbd118dbead29b9a477be868fbfe64251e39b819867767b59c9e38c405e552cceedd2609798bbd694f100d81824a55d45df62132ef28e0f240ddd9c96543bb73b9f70d1ccfa24812f96be0f9d5c5c7ec5cc0697ca115411a27612c85b7e9219af261c001ed8b8b346c50a7835f2fc64d9f027aba3ed4600e7fb19757825efb6d881fd0c99a792af628291ce299520fbb65836b5d6c3e47f081a3232e897dee37781840e927a9f827ec4f893210493b7edacecfb101be61014ad038d2f5a8d84894bf679"], 0x2f) (async) write$FUSE_ATTR(r4, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r5, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, r5, {0x9}}, 0x18) 03:05:47 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:47 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:47 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:48 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) 03:05:48 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:48 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:48 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:48 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, '\'${$*'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000002500)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\xea\x1b0\f\x9bn\x97\x81\xb0{\xea\xe0C0\x1b\x9a\x93T\x12\xd8\xe0r\x0ej\xa0a\x11\xc7\xe7\x1a\xc3M\r4&\x91\"jgA \x06\x9b~\xb9U\xee0\xb9\x13\x8d\xbb\x95\xc2n\x86\xfcJS?{/\x8c\xd1\x16s2\xfa\x98\xa4\xe0\xdcb\xe0\xd2R\xd1\x00\x00\x04\xd3\x14\xf0\xf8\x18 =\f\x0f\x1a\t\x00\xecQ\xf5@d\xe1#\xd5@\x88\bC{p\xb1\x98H\\\xa2\f\xa7x\xd8\x12\x06\xa4\x112\xf0\xb5\xe6T\x97\xa6\x8f\xe5*\xb5:\x93\x95\x8f\xd5\xaa\xe3Z\x92\xc2\xf5\x83n\xeeoN.Q\xef\xf7\xa5ro-#UETiL\xc4\x1c\xfa~}xA\xc6\xf1H\xc5D\"\x0e;\xd7\x94 JG&G\xb9\xe7d\xe0v\xabk\x98\xbd5\xf1s_c\x04\xc88\x14\'\x06ATtIv\x1c)A\xc64NB\xca\x95\xc5\xd4\xfb\x141X\xbe4u\xeb\x1d\xf8\xf3h\x9bD\xa5\x1a\xc8\xbdH\x1c\f\xaa\xed\xcaV\x82\xc5N\x7fQ\r\xf1\x858\xbe\xae\x90gh\xff\t+w\xc7\x827@\xf5\x8fc\x12lp\xc2xY\x13\x9c{\xe26\x9f\x92UU\xdb\f\xfe7\x85\'Hh\"\x1e 8\x02\b\xb5\xca\xf1\xccs\xa6r\x19\x19'}}, 0x14) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000140)={0x30, 0x4, 0x0, {0x2, 0x4, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) 03:05:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, '\'${$*'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000002500)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\xea\x1b0\f\x9bn\x97\x81\xb0{\xea\xe0C0\x1b\x9a\x93T\x12\xd8\xe0r\x0ej\xa0a\x11\xc7\xe7\x1a\xc3M\r4&\x91\"jgA \x06\x9b~\xb9U\xee0\xb9\x13\x8d\xbb\x95\xc2n\x86\xfcJS?{/\x8c\xd1\x16s2\xfa\x98\xa4\xe0\xdcb\xe0\xd2R\xd1\x00\x00\x04\xd3\x14\xf0\xf8\x18 =\f\x0f\x1a\t\x00\xecQ\xf5@d\xe1#\xd5@\x88\bC{p\xb1\x98H\\\xa2\f\xa7x\xd8\x12\x06\xa4\x112\xf0\xb5\xe6T\x97\xa6\x8f\xe5*\xb5:\x93\x95\x8f\xd5\xaa\xe3Z\x92\xc2\xf5\x83n\xeeoN.Q\xef\xf7\xa5ro-#UETiL\xc4\x1c\xfa~}xA\xc6\xf1H\xc5D\"\x0e;\xd7\x94 JG&G\xb9\xe7d\xe0v\xabk\x98\xbd5\xf1s_c\x04\xc88\x14\'\x06ATtIv\x1c)A\xc64NB\xca\x95\xc5\xd4\xfb\x141X\xbe4u\xeb\x1d\xf8\xf3h\x9bD\xa5\x1a\xc8\xbdH\x1c\f\xaa\xed\xcaV\x82\xc5N\x7fQ\r\xf1\x858\xbe\xae\x90gh\xff\t+w\xc7\x827@\xf5\x8fc\x12lp\xc2xY\x13\x9c{\xe26\x9f\x92UU\xdb\f\xfe7\x85\'Hh\"\x1e 8\x02\b\xb5\xca\xf1\xccs\xa6r\x19\x19'}}, 0x14) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000140)={0x30, 0x4, 0x0, {0x2, 0x4, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, '\'${$*'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000002500)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\xea\x1b0\f\x9bn\x97\x81\xb0{\xea\xe0C0\x1b\x9a\x93T\x12\xd8\xe0r\x0ej\xa0a\x11\xc7\xe7\x1a\xc3M\r4&\x91\"jgA \x06\x9b~\xb9U\xee0\xb9\x13\x8d\xbb\x95\xc2n\x86\xfcJS?{/\x8c\xd1\x16s2\xfa\x98\xa4\xe0\xdcb\xe0\xd2R\xd1\x00\x00\x04\xd3\x14\xf0\xf8\x18 =\f\x0f\x1a\t\x00\xecQ\xf5@d\xe1#\xd5@\x88\bC{p\xb1\x98H\\\xa2\f\xa7x\xd8\x12\x06\xa4\x112\xf0\xb5\xe6T\x97\xa6\x8f\xe5*\xb5:\x93\x95\x8f\xd5\xaa\xe3Z\x92\xc2\xf5\x83n\xeeoN.Q\xef\xf7\xa5ro-#UETiL\xc4\x1c\xfa~}xA\xc6\xf1H\xc5D\"\x0e;\xd7\x94 JG&G\xb9\xe7d\xe0v\xabk\x98\xbd5\xf1s_c\x04\xc88\x14\'\x06ATtIv\x1c)A\xc64NB\xca\x95\xc5\xd4\xfb\x141X\xbe4u\xeb\x1d\xf8\xf3h\x9bD\xa5\x1a\xc8\xbdH\x1c\f\xaa\xed\xcaV\x82\xc5N\x7fQ\r\xf1\x858\xbe\xae\x90gh\xff\t+w\xc7\x827@\xf5\x8fc\x12lp\xc2xY\x13\x9c{\xe26\x9f\x92UU\xdb\f\xfe7\x85\'Hh\"\x1e 8\x02\b\xb5\xca\xf1\xccs\xa6r\x19\x19'}}, 0x14) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000140)={0x30, 0x4, 0x0, {0x2, 0x4, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, '\'${$*'}}, {@appraise}, {@subj_role={'subj_role', 0x3d, 'group_id'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000002500)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '\xea\x1b0\f\x9bn\x97\x81\xb0{\xea\xe0C0\x1b\x9a\x93T\x12\xd8\xe0r\x0ej\xa0a\x11\xc7\xe7\x1a\xc3M\r4&\x91\"jgA \x06\x9b~\xb9U\xee0\xb9\x13\x8d\xbb\x95\xc2n\x86\xfcJS?{/\x8c\xd1\x16s2\xfa\x98\xa4\xe0\xdcb\xe0\xd2R\xd1\x00\x00\x04\xd3\x14\xf0\xf8\x18 =\f\x0f\x1a\t\x00\xecQ\xf5@d\xe1#\xd5@\x88\bC{p\xb1\x98H\\\xa2\f\xa7x\xd8\x12\x06\xa4\x112\xf0\xb5\xe6T\x97\xa6\x8f\xe5*\xb5:\x93\x95\x8f\xd5\xaa\xe3Z\x92\xc2\xf5\x83n\xeeoN.Q\xef\xf7\xa5ro-#UETiL\xc4\x1c\xfa~}xA\xc6\xf1H\xc5D\"\x0e;\xd7\x94 JG&G\xb9\xe7d\xe0v\xabk\x98\xbd5\xf1s_c\x04\xc88\x14\'\x06ATtIv\x1c)A\xc64NB\xca\x95\xc5\xd4\xfb\x141X\xbe4u\xeb\x1d\xf8\xf3h\x9bD\xa5\x1a\xc8\xbdH\x1c\f\xaa\xed\xcaV\x82\xc5N\x7fQ\r\xf1\x858\xbe\xae\x90gh\xff\t+w\xc7\x827@\xf5\x8fc\x12lp\xc2xY\x13\x9c{\xe26\x9f\x92UU\xdb\f\xfe7\x85\'Hh\"\x1e 8\x02\b\xb5\xca\xf1\xccs\xa6r\x19\x19'}}, 0x14) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000140)={0x30, 0x4, 0x0, {0x2, 0x4, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) (async) 03:05:49 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303011303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22000225d635757647640a0080ba158c00000000005967bc10171d8c000000000000"], 0x22) getegid() 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303011303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22000225d635757647640a0080ba158c00000000005967bc10171d8c000000000000"], 0x22) (async) getegid() 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303011303030303030303030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22000225d635757647640a0080ba158c00000000005967bc10171d8c000000000000"], 0x22) (async) getegid() 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x88040, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf9}}, {@default_permissions}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:49 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:49 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:49 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x88040, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf9}}, {@default_permissions}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x88040, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xf9}}, {@default_permissions}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="220000000300000000ff74f0ab468b3bb1460f431375604d0800000000000000000000000000000001000000000000005d00"], 0x22) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) 03:05:49 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="220000000300000000ff74f0ab468b3bb1460f431375604d0800000000000000000000000000000001000000000000005d00"], 0x22) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) 03:05:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="220000000300000000ff74f0ab468b3bb1460f431375604d0800000000000000000000000000000001000000000000005d00"], 0x22) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="220000000300000000ff74f0ab468b3bb1460f431375604d0800000000000000000000000000000001000000000000005d00"], 0x22) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) (async) 03:05:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:50 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:50 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:50 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:50 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) 03:05:50 executing program 3: ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000040)={0x4002, 0xfffffffe, 0x7, 0x3}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x101400, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r2 = getegid() syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x8b8000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, ')'}}, {@subj_type={'subj_type', 0x3d, '&@/({$%\'.&'}}, {@fowner_gt={'fowner>', 0xee01}}]}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="22000800000000000000000000005d001700000000000000000000000004ea870fa1af2743a291969aabdc4c9dd0163f70828c51184bb0bf53b68eb31800337554be53bce86eca00fd8209000ff3a6ae558b70002611d6ed123f2a79d8bae021376af04a62cf1552c0fbe53c4bcace0624dc95c30d78408d63c136b76e84bbd0307b520d74b79f98c66e686944c111052705d3ccebfaebe270d94c1860a8cf972fdcefd9f58273dde2be0d7841571a822834db526bf63baae53c5514f0a08de883bcf228da954c2e0496a3db625572d93099491fcb1072ca2cbfbc19643a3265af5a0d6874e771"], 0x22) 03:05:50 executing program 3: ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000040)={0x4002, 0xfffffffe, 0x7, 0x3}) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x101400, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r2 = getegid() syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x8b8000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, ')'}}, {@subj_type={'subj_type', 0x3d, '&@/({$%\'.&'}}, {@fowner_gt={'fowner>', 0xee01}}]}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="22000800000000000000000000005d001700000000000000000000000004ea870fa1af2743a291969aabdc4c9dd0163f70828c51184bb0bf53b68eb31800337554be53bce86eca00fd8209000ff3a6ae558b70002611d6ed123f2a79d8bae021376af04a62cf1552c0fbe53c4bcace0624dc95c30d78408d63c136b76e84bbd0307b520d74b79f98c66e686944c111052705d3ccebfaebe270d94c1860a8cf972fdcefd9f58273dde2be0d7841571a822834db526bf63baae53c5514f0a08de883bcf228da954c2e0496a3db625572d93099491fcb1072ca2cbfbc19643a3265af5a0d6874e771"], 0x22) 03:05:50 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:50 executing program 3: ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000040)={0x4002, 0xfffffffe, 0x7, 0x3}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x101400, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r2 = getegid() syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x8b8000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[], [{@subj_role={'subj_role', 0x3d, ')'}}, {@subj_type={'subj_type', 0x3d, '&@/({$%\'.&'}}, {@fowner_gt={'fowner>', 0xee01}}]}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="22000800000000000000000000005d001700000000000000000000000004ea870fa1af2743a291969aabdc4c9dd0163f70828c51184bb0bf53b68eb31800337554be53bce86eca00fd8209000ff3a6ae558b70002611d6ed123f2a79d8bae021376af04a62cf1552c0fbe53c4bcace0624dc95c30d78408d63c136b76e84bbd0307b520d74b79f98c66e686944c111052705d3ccebfaebe270d94c1860a8cf972fdcefd9f58273dde2be0d7841571a822834db526bf63baae53c5514f0a08de883bcf228da954c2e0496a3db625572d93099491fcb1072ca2cbfbc19643a3265af5a0d6874e771"], 0x22) 03:05:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0xe0, 0x0, 0x0, [{0x2, 0x8000, 0x1, 0x0, '\xe7\xec?.\x84\xfb\xb5\xa6/\xc7\xa3\f\xc5.\xa4\x90~\xfa\xd0\xe7\xa8\xbd&\xb0)\xdfu0]\xb5\xef&\xca!\xf0\xb1\x88\f\x85R\xb8}\xd3\xe5-\x95\xdf\xbbF\xdcg5_\xed\xbcR6\xae=\xcd\x93\x95\xdc\xd7\xdc\xd1\xc1J\x82\r\xe3m?'}, {0x5, 0x8, 0x2, 0x9, 'fd'}, {0x6, 0x0, 0x4, 0x0, '/\t\x00v/fuse\x00'}, {0x3, 0xfffffffffffffffc, 0x3, 0x4, 'user_id@\xd5\a\xda\v\x17#\xa0{\x9d\xa0> \xd1a\x1fj~WAM\x02\xd7p\xdc\xe8\xe6@T\xae,:\vn\xbd\x05P\a\xad\xf6\x8b\xdb\xed\x9b\x1e4\vD\xf0\xbdO/\x0e\xd92\xd2\xf1\x05\xfd)?e\x1a\xc1<\xd9\x9a\xeaYI\x87\x8e\x83\x03\x97dj]\x879\xcc\xd75\xdc\xa0\xd1`9c\xb4(\x81\xcc~\x0fT\x1d4\xe1\n\xfe\\\xf8\xff\xff\xff\x8e\xd7\x9a&\x00\x00F\xc3\xc4\xb7\x18\xe7\xb27\xcd\xed1\xae\xe1N\x9aH\xe3rD\xd4}\xae\x96\xd3\aH\"\xe8\xeb>\x1a0N\xb0\xe3n\\\xc1\r\xc9\xce\xe3\x00\xa1\xb1\xc2xA\xe0\xfb0H\xa1\xc6\xfa\xd8\xfb\x9d?LNa8\v\xe5\xfe\xf8\xf5M\x99\xd7E[\x9e\xe3\xa4\xd0\x9fl\"3c\xf3J\xd8\xc2\"!\xf6Z\x83\x86\x89\'\xa1)\x84O8^\x8d\x10F\x1b\x9c\xa0,\x8cX\xc0#5\x92\xb5EcCq\x18\x05\xc9#\xcb\x18\xb2\xeb\xd1B]\xb3'}, {0x1, 0x6, 0x49, 0x2, '/dev/fuse\x00'}, {0x20000000004, 0x5, 0x7, 0x4, '&)!!{!:'}]}, 0xe0) 03:05:51 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:51 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:51 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:05:51 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:51 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0xe0, 0x0, 0x0, [{0x2, 0x8000, 0x1, 0x0, '\xe7\xec?.\x84\xfb\xb5\xa6/\xc7\xa3\f\xc5.\xa4\x90~\xfa\xd0\xe7\xa8\xbd&\xb0)\xdfu0]\xb5\xef&\xca!\xf0\xb1\x88\f\x85R\xb8}\xd3\xe5-\x95\xdf\xbbF\xdcg5_\xed\xbcR6\xae=\xcd\x93\x95\xdc\xd7\xdc\xd1\xc1J\x82\r\xe3m?'}, {0x5, 0x8, 0x2, 0x9, 'fd'}, {0x6, 0x0, 0x4, 0x0, '/\t\x00v/fuse\x00'}, {0x3, 0xfffffffffffffffc, 0x3, 0x4, 'user_id@\xd5\a\xda\v\x17#\xa0{\x9d\xa0> \xd1a\x1fj~WAM\x02\xd7p\xdc\xe8\xe6@T\xae,:\vn\xbd\x05P\a\xad\xf6\x8b\xdb\xed\x9b\x1e4\vD\xf0\xbdO/\x0e\xd92\xd2\xf1\x05\xfd)?e\x1a\xc1<\xd9\x9a\xeaYI\x87\x8e\x83\x03\x97dj]\x879\xcc\xd75\xdc\xa0\xd1`9c\xb4(\x81\xcc~\x0fT\x1d4\xe1\n\xfe\\\xf8\xff\xff\xff\x8e\xd7\x9a&\x00\x00F\xc3\xc4\xb7\x18\xe7\xb27\xcd\xed1\xae\xe1N\x9aH\xe3rD\xd4}\xae\x96\xd3\aH\"\xe8\xeb>\x1a0N\xb0\xe3n\\\xc1\r\xc9\xce\xe3\x00\xa1\xb1\xc2xA\xe0\xfb0H\xa1\xc6\xfa\xd8\xfb\x9d?LNa8\v\xe5\xfe\xf8\xf5M\x99\xd7E[\x9e\xe3\xa4\xd0\x9fl\"3c\xf3J\xd8\xc2\"!\xf6Z\x83\x86\x89\'\xa1)\x84O8^\x8d\x10F\x1b\x9c\xa0,\x8cX\xc0#5\x92\xb5EcCq\x18\x05\xc9#\xcb\x18\xb2\xeb\xd1B]\xb3'}, {0x1, 0x6, 0x49, 0x2, '/dev/fuse\x00'}, {0x20000000004, 0x5, 0x7, 0x4, '&)!!{!:'}]}, 0xe0) 03:05:51 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:52 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:52 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:52 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:52 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)={0xe0, 0x0, 0x0, [{0x2, 0x8000, 0x1, 0x0, '\xe7\xec?.\x84\xfb\xb5\xa6/\xc7\xa3\f\xc5.\xa4\x90~\xfa\xd0\xe7\xa8\xbd&\xb0)\xdfu0]\xb5\xef&\xca!\xf0\xb1\x88\f\x85R\xb8}\xd3\xe5-\x95\xdf\xbbF\xdcg5_\xed\xbcR6\xae=\xcd\x93\x95\xdc\xd7\xdc\xd1\xc1J\x82\r\xe3m?'}, {0x5, 0x8, 0x2, 0x9, 'fd'}, {0x6, 0x0, 0x4, 0x0, '/\t\x00v/fuse\x00'}, {0x3, 0xfffffffffffffffc, 0x3, 0x4, 'user_id@\xd5\a\xda\v\x17#\xa0{\x9d\xa0> \xd1a\x1fj~WAM\x02\xd7p\xdc\xe8\xe6@T\xae,:\vn\xbd\x05P\a\xad\xf6\x8b\xdb\xed\x9b\x1e4\vD\xf0\xbdO/\x0e\xd92\xd2\xf1\x05\xfd)?e\x1a\xc1<\xd9\x9a\xeaYI\x87\x8e\x83\x03\x97dj]\x879\xcc\xd75\xdc\xa0\xd1`9c\xb4(\x81\xcc~\x0fT\x1d4\xe1\n\xfe\\\xf8\xff\xff\xff\x8e\xd7\x9a&\x00\x00F\xc3\xc4\xb7\x18\xe7\xb27\xcd\xed1\xae\xe1N\x9aH\xe3rD\xd4}\xae\x96\xd3\aH\"\xe8\xeb>\x1a0N\xb0\xe3n\\\xc1\r\xc9\xce\xe3\x00\xa1\xb1\xc2xA\xe0\xfb0H\xa1\xc6\xfa\xd8\xfb\x9d?LNa8\v\xe5\xfe\xf8\xf5M\x99\xd7E[\x9e\xe3\xa4\xd0\x9fl\"3c\xf3J\xd8\xc2\"!\xf6Z\x83\x86\x89\'\xa1)\x84O8^\x8d\x10F\x1b\x9c\xa0,\x8cX\xc0#5\x92\xb5EcCq\x18\x05\xc9#\xcb\x18\xb2\xeb\xd1B]\xb3'}, {0x1, 0x6, 0x49, 0x2, '/dev/fuse\x00'}, {0x20000000004, 0x5, 0x7, 0x4, '&)!!{!:'}]}, 0xe0) 03:05:52 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:53 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:53 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:53 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:53 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x68, 0xffffffffffffffda, r1, [{0x4, 0x7e0, 0x0, 0xfffff6a4}, {0x6, 0x7127, 0x4, 0x8000, '-!^}'}, {0x5, 0x0, 0x8, 0x9, 'group_id'}]}, 0x68) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x68, 0xffffffffffffffda, r1, [{0x4, 0x7e0, 0x0, 0xfffff6a4}, {0x6, 0x7127, 0x4, 0x8000, '-!^}'}, {0x5, 0x0, 0x8, 0x9, 'group_id'}]}, 0x68) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:53 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:53 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:54 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:54 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:54 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x68, 0xffffffffffffffda, r1, [{0x4, 0x7e0, 0x0, 0xfffff6a4}, {0x6, 0x7127, 0x4, 0x8000, '-!^}'}, {0x5, 0x0, 0x8, 0x9, 'group_id'}]}, 0x68) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:54 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:54 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:54 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:55 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x18000, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x18000, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) (async, rerun: 64) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (rerun: 64) 03:05:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x18000, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@hash}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:55 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 03:05:55 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:55 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:55 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:56 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 03:05:56 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 03:05:56 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:56 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:57 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 03:05:57 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 03:05:57 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:57 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6703612e592f18f8f1", @ANYRESDEC=r1, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22c55867ad917c968200000000000000000000000000000001000000000000005de2"], 0x22) 03:05:57 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 03:05:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6703612e592f18f8f1", @ANYRESDEC=r1, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22c55867ad917c968200000000000000000000000000000001000000000000005de2"], 0x22) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6703612e592f18f8f1", @ANYRESDEC=r1, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22c55867ad917c968200000000000000000000000000000001000000000000005de2"], 0x22) (async) 03:05:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6703612e592f18f8f1", @ANYRESDEC=r1, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="22c55867ad917c968200000000000000000000000000000001000000000000005de2"], 0x22) 03:05:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x1}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='1?=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) inotify_rm_watch(r1, 0x0) 03:05:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x1}}, 0x18) (async, rerun: 64) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='1?=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async, rerun: 64) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) inotify_rm_watch(r1, 0x0) 03:05:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x1}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='1?=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) inotify_rm_watch(r1, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x1}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='1?=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) inotify_rm_watch(r1, 0x0) (async) 03:05:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000040)={0x90, 0x0, 0x0, {0x6, 0x0, 0xfff, 0x1fc00000, 0x7, 0x1ff, {0x6, 0x100000001, 0x1b7, 0x7a, 0x81, 0xcb, 0x3, 0x80000001, 0x3, 0x1000, 0x3, 0xee01, 0xffffffffffffffff, 0x0, 0x8000}}}, 0x90) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:58 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:58 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:58 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 03:05:58 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:58 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000040)={0x90, 0x0, 0x0, {0x6, 0x0, 0xfff, 0x1fc00000, 0x7, 0x1ff, {0x6, 0x100000001, 0x1b7, 0x7a, 0x81, 0xcb, 0x3, 0x80000001, 0x3, 0x1000, 0x3, 0xee01, 0xffffffffffffffff, 0x0, 0x8000}}}, 0x90) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_ENTRY(r1, &(0x7f0000000040)={0x90, 0x0, 0x0, {0x6, 0x0, 0xfff, 0x1fc00000, 0x7, 0x1ff, {0x6, 0x100000001, 0x1b7, 0x7a, 0x81, 0xcb, 0x3, 0x80000001, 0x3, 0x1000, 0x3, 0xee01, 0xffffffffffffffff, 0x0, 0x8000}}}, 0x90) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) 03:05:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) 03:05:59 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:59 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:05:59 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:59 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000040)={0x90, 0x0, 0x0, {0x6, 0x0, 0xfff, 0x1fc00000, 0x7, 0x1ff, {0x6, 0x100000001, 0x1b7, 0x7a, 0x81, 0xcb, 0x3, 0x80000001, 0x3, 0x1000, 0x3, 0xee01, 0xffffffffffffffff, 0x0, 0x8000}}}, 0x90) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:05:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:05:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:00 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:00 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 03:06:00 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 03:06:00 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:00 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:00 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:01 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) 03:06:01 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:01 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:01 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:01 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:01 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 03:06:01 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:01 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:01 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 03:06:01 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) 03:06:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) write$FUSE_OPEN(r0, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x20) 03:06:02 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) 03:06:02 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:02 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:02 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, r1}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:06:02 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:02 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) 03:06:03 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="220400001000000000000000005d00"], 0x22) r1 = socket(0x2c, 0x5, 0xa3) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f0000000080)={@multicast2, @empty, 0xffffffffffffffff, "0877ba2abef8887ed7c026b9bf4b66af2d3aa4a15c463ed275c0659df3399849", 0xdcc, 0x13fa2b4e, 0x1ff, 0xdb54}, 0x3c) 03:06:03 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) 03:06:03 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2}, 0x18) 03:06:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:06:03 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:03 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 03:06:04 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="220400001000000000000000005d00"], 0x22) (async) r1 = socket(0x2c, 0x5, 0xa3) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f0000000080)={@multicast2, @empty, 0xffffffffffffffff, "0877ba2abef8887ed7c026b9bf4b66af2d3aa4a15c463ed275c0659df3399849", 0xdcc, 0x13fa2b4e, 0x1ff, 0xdb54}, 0x3c) 03:06:04 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) 03:06:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:04 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:04 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:04 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:04 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="220400001000000000000000005d00"], 0x22) r1 = socket(0x2c, 0x5, 0xa3) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f0000000080)={@multicast2, @empty, 0xffffffffffffffff, "0877ba2abef8887ed7c026b9bf4b66af2d3aa4a15c463ed275c0659df3399849", 0xdcc, 0x13fa2b4e, 0x1ff, 0xdb54}, 0x3c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="220400001000000000000000005d00"], 0x22) (async) socket(0x2c, 0x5, 0xa3) (async) setsockopt$MRT_ADD_MFC_PROXY(r1, 0x0, 0xd2, &(0x7f0000000080)={@multicast2, @empty, 0xffffffffffffffff, "0877ba2abef8887ed7c026b9bf4b66af2d3aa4a15c463ed275c0659df3399849", 0xdcc, 0x13fa2b4e, 0x1ff, 0xdb54}, 0x3c) (async) 03:06:04 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000140)={0x78, 0x0, r2, {0x9, 0xfffffe00, 0x0, {0x2, 0x6, 0x1, 0x7, 0xffffffffffffffff, 0x5, 0x8001, 0x3, 0xffffff52, 0x6000, 0x9, r3, 0xffffffffffffffff, 0x7, 0x6}}}, 0x78) r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x40060, &(0x7f00000000c0)=ANY=[@ANYBLOB="666b3d195697996128ec447f2a51548169dfc2ce", @ANYRESOCT=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES8=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000140)={0x78, 0x0, r2, {0x9, 0xfffffe00, 0x0, {0x2, 0x6, 0x1, 0x7, 0xffffffffffffffff, 0x5, 0x8001, 0x3, 0xffffff52, 0x6000, 0x9, r3, 0xffffffffffffffff, 0x7, 0x6}}}, 0x78) (async) r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) (async) r5 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x40060, &(0x7f00000000c0)=ANY=[@ANYBLOB="666b3d195697996128ec447f2a51548169dfc2ce", @ANYRESOCT=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES8=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000140)={0x78, 0x0, r2, {0x9, 0xfffffe00, 0x0, {0x2, 0x6, 0x1, 0x7, 0xffffffffffffffff, 0x5, 0x8001, 0x3, 0xffffff52, 0x6000, 0x9, r3, 0xffffffffffffffff, 0x7, 0x6}}}, 0x78) (async) r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) (async) r5 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x40060, &(0x7f00000000c0)=ANY=[@ANYBLOB="666b3d195697996128ec447f2a51548169dfc2ce", @ANYRESOCT=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES8=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570ac739eacfa331d3bc023501e5f01643d", @ANYRESDEC=0x0, @ANYBLOB="2c0f"]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0xffffffffffffffff, 0x1, 0x0, ']'}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000380)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f0000000300)={0x18, 0xffffffffffffffda, 0x0, {0x7ff}}, 0x18) read$FUSE(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x20, &(0x7f0000000200)={&(0x7f0000000040)=""/146, 0x92, 0x0, &(0x7f0000000100)=""/193, 0xc1}}, 0x10) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570ac739eacfa331d3bc023501e5f01643d", @ANYRESDEC=0x0, @ANYBLOB="2c0f"]) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0xffffffffffffffff, 0x1, 0x0, ']'}}, 0x20) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000380)) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) (async) write$FUSE_POLL(r2, &(0x7f0000000300)={0x18, 0xffffffffffffffda, 0x0, {0x7ff}}, 0x18) (async, rerun: 32) read$FUSE(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x20, &(0x7f0000000200)={&(0x7f0000000040)=""/146, 0x92, 0x0, &(0x7f0000000100)=""/193, 0xc1}}, 0x10) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570ac739eacfa331d3bc023501e5f01643d", @ANYRESDEC=0x0, @ANYBLOB="2c0f"]) (async, rerun: 32) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0xffffffffffffffff, 0x1, 0x0, ']'}}, 0x20) (async, rerun: 32) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000380)) (async, rerun: 32) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 32) read$FUSE(r2, 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f0000000300)={0x18, 0xffffffffffffffda, 0x0, {0x7ff}}, 0x18) read$FUSE(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x20, &(0x7f0000000200)={&(0x7f0000000040)=""/146, 0x92, 0x0, &(0x7f0000000100)=""/193, 0xc1}}, 0x10) 03:06:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000140)={0x78, 0x0, r2, {0x9, 0xfffffe00, 0x0, {0x2, 0x6, 0x1, 0x7, 0xffffffffffffffff, 0x5, 0x8001, 0x3, 0xffffff52, 0x6000, 0x9, r3, 0xffffffffffffffff, 0x7, 0x6}}}, 0x78) r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x40060, &(0x7f00000000c0)=ANY=[@ANYBLOB="666b3d195697996128ec447f2a51548169dfc2ce", @ANYRESOCT=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES8=r5, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:05 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:05 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:05 executing program 1: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:06:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:05 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000ec3da0563aa1a5588603d151e3a8"], 0x22) 03:06:05 executing program 1: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:06:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:05 executing program 1: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:06:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:05 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:06 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:06 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:06 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000ec3da0563aa1a5588603d151e3a8"], 0x22) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000ec3da0563aa1a5588603d151e3a8"], 0x22) (async) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) 03:06:06 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000ec3da0563aa1a5588603d151e3a8"], 0x22) 03:06:06 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:06 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2200000003000000000000000000000000000000ec3da0563aa1a5588603d151e3a8"], 0x22) 03:06:07 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 03:06:07 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 03:06:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 03:06:07 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:07 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:07 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) 03:06:07 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:08 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) read$FUSE(r0, 0x0, 0x0) 03:06:08 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) 03:06:08 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1, @mcast2, 0x200}, {0xa, 0x4e23, 0xffffffff, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, 0xffffffffffffffff, 0x8}}, 0x48) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x0, 0x0, 0x58, 0x2, 0x80, 0x3f, {0x1, 0x800, 0x4cdbd49b, 0x8, 0x1, 0x0, 0x5, 0x7, 0x4, 0x2000, 0x6, 0xffffffffffffffff, 0xee00, 0xf545, 0x1}}, {0x0, 0x2}}}, 0xcc) ioctl$SIOCGETMIFCNT_IN6(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) 03:06:08 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) read$FUSE(r0, 0x0, 0x0) 03:06:08 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) read$FUSE(r0, 0x0, 0x0) 03:06:08 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:06:08 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:08 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:08 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:09 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) 03:06:09 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1, @mcast2, 0x200}, {0xa, 0x4e23, 0xffffffff, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, 0xffffffffffffffff, 0x8}}, 0x48) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x0, 0x0, 0x58, 0x2, 0x80, 0x3f, {0x1, 0x800, 0x4cdbd49b, 0x8, 0x1, 0x0, 0x5, 0x7, 0x4, 0x2000, 0x6, 0xffffffffffffffff, 0xee00, 0xf545, 0x1}}, {0x0, 0x2}}}, 0xcc) (async) ioctl$SIOCGETMIFCNT_IN6(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) 03:06:09 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:06:09 executing program 4: connect$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none}, 0x8) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:06:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:09 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c005c7cb3b00f65c05d1ae691a62ba79aa3c4061ca6ef57d0283efb0400000000000000ca574a1b05000000000000000000e9be19090d330f5e030000000000000058d349af07d6de6d092a7e97e02c135bfa2c34359fdf0b6ba1989b4633498d3386b090df99063fbd53694d1c8b7cad284a5ae65cfa68854f2cd13e41a187a5b01144a48f17c103c7a0c1dbdb474ed365fa3b7280066bb09b512c256a8a121800"/172]) 03:06:09 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) 03:06:10 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq={'uid', 0x3d, r3}}, {@dont_hash}]}}) 03:06:10 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1, @mcast2, 0x200}, {0xa, 0x4e23, 0xffffffff, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, 0xffffffffffffffff, 0x8}}, 0x48) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x0, 0x0, 0x58, 0x2, 0x80, 0x3f, {0x1, 0x800, 0x4cdbd49b, 0x8, 0x1, 0x0, 0x5, 0x7, 0x4, 0x2000, 0x6, 0xffffffffffffffff, 0xee00, 0xf545, 0x1}}, {0x0, 0x2}}}, 0xcc) ioctl$SIOCGETMIFCNT_IN6(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r0, 0x0, 0x0) (async) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x1, @mcast2, 0x200}, {0xa, 0x4e23, 0xffffffff, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}, 0xffffffffffffffff, 0x8}}, 0x48) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x0, 0x0, 0x58, 0x2, 0x80, 0x3f, {0x1, 0x800, 0x4cdbd49b, 0x8, 0x1, 0x0, 0x5, 0x7, 0x4, 0x2000, 0x6, 0xffffffffffffffff, 0xee00, 0xf545, 0x1}}, {0x0, 0x2}}}, 0xcc) (async) ioctl$SIOCGETMIFCNT_IN6(r0, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) (async) 03:06:10 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 03:06:10 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x4, 0x2, 0x84, 0x6, 0x40, @empty, @private1, 0x80, 0x1, 0xe55e6a3c, 0x2}}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80542, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, 0x0, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r5, 0x113, 0x2, &(0x7f0000000900)=0x0, &(0x7f0000000940)=0x4) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r7, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x11, 0xcd5, 0x81, 0x3f, 0x1, 0xffffffffffffffff, 0x81, '\x00', 0x0, r4, 0x3, 0x1}, 0x48) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x180, 0x0) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000b00), 0x200000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffeff}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffee}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}]}, &(0x7f0000000840)='GPL\x00', 0x40, 0x6b, &(0x7f0000000880)=""/107, 0x1e00, 0x2, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x7, 0x1, 0xffff0000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r7, r4, r8, r9, r10, r11]}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x25}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x84}}, 0x1) 03:06:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) 03:06:10 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000000)={0x7, 0x6, 0x5, 0x6, 0x3, 0x1}) 03:06:10 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:10 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000180)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x5}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}], [{@smackfsroot={'smackfsroot', 0x3d, 'fuse\x00'}}, {@fowner_gt}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}}) 03:06:10 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq={'euid', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) 03:06:11 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:11 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x4, 0x2, 0x84, 0x6, 0x40, @empty, @private1, 0x80, 0x1, 0xe55e6a3c, 0x2}}) (async, rerun: 64) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80542, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r4, 0x0, 0x0) (async, rerun: 64) r5 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) (rerun: 64) getsockopt$PNPIPE_IFINDEX(r5, 0x113, 0x2, &(0x7f0000000900)=0x0, &(0x7f0000000940)=0x4) (async) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r7, 0x0, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x11, 0xcd5, 0x81, 0x3f, 0x1, 0xffffffffffffffff, 0x81, '\x00', 0x0, r4, 0x3, 0x1}, 0x48) (async, rerun: 32) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async, rerun: 32) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x180, 0x0) (async, rerun: 32) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000b00), 0x200000, 0x0) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffeff}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffee}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}]}, &(0x7f0000000840)='GPL\x00', 0x40, 0x6b, &(0x7f0000000880)=""/107, 0x1e00, 0x2, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x7, 0x1, 0xffff0000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r7, r4, r8, r9, r10, r11]}, 0x80) (async, rerun: 64) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x25}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x84}}, 0x1) (rerun: 64) 03:06:11 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x4, 0x2, 0x84, 0x6, 0x40, @empty, @private1, 0x80, 0x1, 0xe55e6a3c, 0x2}}) (async, rerun: 64) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80542, 0x0) (rerun: 64) write$RDMA_USER_CM_CMD_ACCEPT(r4, 0x0, 0x0) r5 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r5, 0x113, 0x2, &(0x7f0000000900)=0x0, &(0x7f0000000940)=0x4) (async) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r7, 0x0, 0x0) (async, rerun: 64) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x11, 0xcd5, 0x81, 0x3f, 0x1, 0xffffffffffffffff, 0x81, '\x00', 0x0, r4, 0x3, 0x1}, 0x48) (async, rerun: 64) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) r10 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x180, 0x0) (async) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000b00), 0x200000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffeff}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffee}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}]}, &(0x7f0000000840)='GPL\x00', 0x40, 0x6b, &(0x7f0000000880)=""/107, 0x1e00, 0x2, '\x00', r6, 0x0, r5, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x7, 0x1, 0xffff0000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r7, r4, r8, r9, r10, r11]}, 0x80) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x25}}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x84}}, 0x1) 03:06:11 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 2: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) socket$igmp(0x2, 0x3, 0x2) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:11 executing program 2: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:11 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f00000003c0)={@loopback, @local, 0xffffffffffffffff, "ea2ab9b931b137df276a60a5f35e9dc6ed2076fd08cabbc25e7c81128bce4bf0"}, 0x3c) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4001}}) 03:06:11 executing program 2: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:11 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) r2 = getuid() write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, r2, 0x0, 0x8000, 0xffff}}}, 0x90) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, r3, {0x66d, 0x0, 0xfffffffa, 0x8}}, 0x20) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r4, 0x0, 0x0) write$FUSE_DIRENT(r4, &(0x7f0000000140)={0x90, 0x0, r3, [{0x2, 0x0, 0x1, 0xfffff6c1, '-'}, {0x0, 0x1, 0x3, 0x1, '\xd7-,'}, {0x2, 0x33a8, 0x1, 0x1dc6, '{'}, {0x1, 0xab, 0x5, 0x6, '#!(:^'}]}, 0x90) 03:06:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:12 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) r2 = getuid() write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, r2, 0x0, 0x8000, 0xffff}}}, 0x90) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) r2 = getuid() write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, r2, 0x0, 0x8000, 0xffff}}}, 0x90) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:12 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:12 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:13 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000020, 0x0) 03:06:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000000080)={0x10, 0xffffffffffffffda, r4}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:13 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:13 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) r2 = getuid() write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, r2, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:13 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:13 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:13 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:13 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:13 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:14 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:14 executing program 0: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:14 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:14 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:14 executing program 0: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:14 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 0: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:14 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:14 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:14 executing program 5: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:14 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:15 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:15 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:15 executing program 5: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000080)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000000000000000}}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@obj_role}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@measure}]}}) 03:06:15 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000000)) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 03:06:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:15 executing program 5: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:15 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:15 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:15 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:16 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:16 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:16 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:16 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:16 executing program 4: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:16 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:16 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:17 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, 0x0, &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:17 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:17 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:17 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:17 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, 0x0, &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:17 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:17 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x90, 0x0, r0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:17 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:18 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:18 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x90, 0x0, r0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:18 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:18 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, 0x0, &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:18 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:18 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:18 executing program 3: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x90, 0x0, r0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:18 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:18 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:18 executing program 4: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000002700)={0x2b8, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x29c, 0x8, 0x0, 0x1, [{0xbc, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d27f886bab433d3fe05860cdae47038f861a3c9031894d5e97274cf85f4df716"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "dec904e10dbe48a695566f82b4ebbede77ce801e77d5d246d4bfb117425b0a01"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0xfffffff7, @loopback, 0x9}}]}, {0x9c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @local}, 0x7f}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x401}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @private=0xa010102}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffffff93, @private2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0xc4, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x42}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8cee}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x3, @mcast1, 0x6}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "313f6d885f9c2b8002c3b2e3a1534927899c5ed1e59582a96f11468495acc77e"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @private1, 0xf0e0}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xffff5e5b}]}, 0x2b8}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 03:06:18 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 03:06:19 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:19 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:19 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) 03:06:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:19 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:06:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:19 executing program 5: openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:19 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:20 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:20 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80542, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000900)=0x0, &(0x7f0000000940)=0x4) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x11, 0xcd5, 0x81, 0x3f, 0x1, 0xffffffffffffffff, 0x81, '\x00', 0x0, r2, 0x3, 0x1}, 0x48) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x180, 0x0) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000b00), 0x200000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffeff}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffee}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}]}, &(0x7f0000000840)='GPL\x00', 0x40, 0x6b, &(0x7f0000000880)=""/107, 0x1e00, 0x2, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x7, 0x1, 0xffff0000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r5, r2, r6, r7, r8, r9]}, 0x80) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xc0, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000001}, 0x4) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:06:20 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:20 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:20 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x80542, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r2, 0x0, 0x0) r3 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000900)=0x0, &(0x7f0000000940)=0x4) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x11, 0xcd5, 0x81, 0x3f, 0x1, 0xffffffffffffffff, 0x81, '\x00', 0x0, r2, 0x3, 0x1}, 0x48) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000a80)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000ac0), 0x180, 0x0) r9 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000b00), 0x200000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x18, 0x6, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffeff}, [@jmp={0x5, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffc0, 0xffffffffffffffee}, @cb_func={0x18, 0x5, 0x4, 0x0, 0x6}]}, &(0x7f0000000840)='GPL\x00', 0x40, 0x6b, &(0x7f0000000880)=""/107, 0x1e00, 0x2, '\x00', r4, 0x0, r3, 0x8, &(0x7f0000000980)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000009c0)={0x1, 0x7, 0x1, 0xffff0000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r5, r2, r6, r7, r8, r9]}, 0x80) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xc0, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000001}, 0x4) r10 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0x1000}}) 03:06:20 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:20 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0x0, r2, {0x0, 0x18}}, 0x20) 03:06:20 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, 0x0, &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:21 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = getegid() read$FUSE(r1, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$fuseblk(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x10c3080, &(0x7f0000002700)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x4}}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@pcr={'pcr', 0x3d, 0x3}}, {@appraise}, {@euid_eq}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0xe2}}]}}) read$FUSE(r1, &(0x7f0000002900)={0x2020}, 0x2020) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/109) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, ']'}}, 0x22) 03:06:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 1) 03:06:21 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:21 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, 0x0, &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2240.904942] FAULT_INJECTION: forcing a failure. [ 2240.904942] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.939605] CPU: 1 PID: 17890 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 03:06:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2240.947511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2240.956858] Call Trace: [ 2240.959443] dump_stack+0x1b2/0x281 [ 2240.963068] should_fail.cold+0x10a/0x149 [ 2240.967212] should_failslab+0xd6/0x130 [ 2240.971183] kmem_cache_alloc+0x28e/0x3c0 [ 2240.975322] getname_flags+0xc8/0x550 [ 2240.979112] ? vfs_write+0x319/0x4d0 [ 2240.982820] SyS_mkdirat+0x83/0x270 [ 2240.986442] ? SyS_mknod+0x30/0x30 [ 2240.989976] ? __do_page_fault+0x159/0xad0 [ 2240.994205] ? do_syscall_64+0x4c/0x640 [ 2240.998169] ? SyS_mknod+0x30/0x30 [ 2241.001700] do_syscall_64+0x1d5/0x640 03:06:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2241.005582] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2241.010763] RIP: 0033:0x7f53dd92c317 [ 2241.014461] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2241.022159] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2241.029419] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2241.036680] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.043939] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 03:06:21 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 2) [ 2241.051197] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2241.104896] FAULT_INJECTION: forcing a failure. [ 2241.104896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2241.116707] CPU: 1 PID: 17913 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2241.124586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2241.133937] Call Trace: [ 2241.136522] dump_stack+0x1b2/0x281 [ 2241.140145] should_fail.cold+0x10a/0x149 [ 2241.144294] __alloc_pages_nodemask+0x22c/0x2720 [ 2241.149047] ? _kstrtoull+0x1f2/0x450 [ 2241.152846] ? __lock_acquire+0x5fc/0x3f20 [ 2241.157081] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2241.161916] ? lock_downgrade+0x740/0x740 [ 2241.166059] ? get_pid_task+0xb8/0x130 [ 2241.169941] ? proc_fail_nth_write+0x7b/0x180 [ 2241.174428] ? proc_tgid_io_accounting+0x7a0/0x7a0 [ 2241.179364] cache_grow_begin+0x91/0x700 [ 2241.183425] ? fs_reclaim_release+0xd0/0x110 [ 2241.187826] ? check_preemption_disabled+0x35/0x240 [ 2241.192838] cache_alloc_refill+0x273/0x350 [ 2241.197159] kmem_cache_alloc+0x333/0x3c0 [ 2241.201306] getname_flags+0xc8/0x550 [ 2241.205095] ? vfs_write+0x319/0x4d0 [ 2241.208821] SyS_mkdirat+0x83/0x270 [ 2241.212439] ? SyS_mknod+0x30/0x30 [ 2241.215971] ? __do_page_fault+0x159/0xad0 [ 2241.220197] ? do_syscall_64+0x4c/0x640 [ 2241.224162] ? SyS_mknod+0x30/0x30 [ 2241.227688] do_syscall_64+0x1d5/0x640 [ 2241.231557] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2241.236721] RIP: 0033:0x7f53dd92c317 [ 2241.240405] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2241.248228] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2241.255486] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2241.262749] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.270006] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2241.277277] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 3) 03:06:22 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) [ 2241.693199] FAULT_INJECTION: forcing a failure. [ 2241.693199] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.705942] CPU: 1 PID: 17933 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2241.713832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2241.723175] Call Trace: [ 2241.725755] dump_stack+0x1b2/0x281 [ 2241.729386] should_fail.cold+0x10a/0x149 [ 2241.733527] should_failslab+0xd6/0x130 [ 2241.737527] kmem_cache_alloc+0x28e/0x3c0 03:06:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2241.741674] __d_alloc+0x2a/0xa20 [ 2241.745116] ? d_lookup+0x172/0x220 [ 2241.748737] d_alloc+0x46/0x240 [ 2241.752017] __lookup_hash+0x101/0x270 [ 2241.755901] filename_create+0x156/0x3f0 [ 2241.759958] ? kern_path_mountpoint+0x40/0x40 [ 2241.764450] ? vfs_write+0x319/0x4d0 [ 2241.768158] SyS_mkdirat+0x95/0x270 [ 2241.771776] ? SyS_mknod+0x30/0x30 [ 2241.775312] ? __do_page_fault+0x159/0xad0 [ 2241.779544] ? do_syscall_64+0x4c/0x640 [ 2241.783508] ? SyS_mknod+0x30/0x30 [ 2241.787039] do_syscall_64+0x1d5/0x640 03:06:22 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, 0x0, &(0x7f0000000080), 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2241.790925] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2241.796106] RIP: 0033:0x7f53dd92c317 [ 2241.799818] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2241.807518] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2241.814785] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2241.822042] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2241.829302] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2241.836563] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 4) 03:06:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2241.930426] FAULT_INJECTION: forcing a failure. [ 2241.930426] name failslab, interval 1, probability 0, space 0, times 0 [ 2241.954731] CPU: 1 PID: 17966 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2241.962632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2241.971981] Call Trace: [ 2241.974566] dump_stack+0x1b2/0x281 [ 2241.978194] should_fail.cold+0x10a/0x149 [ 2241.982338] should_failslab+0xd6/0x130 [ 2241.986307] __kmalloc+0x2c1/0x400 [ 2241.989838] ? ext4_find_extent+0x879/0xbc0 [ 2241.994154] ext4_find_extent+0x879/0xbc0 [ 2241.998299] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2242.003749] ext4_ext_map_blocks+0x19a/0x6b10 [ 2242.008244] ? __lock_acquire+0x5fc/0x3f20 [ 2242.012473] ? __lock_acquire+0x5fc/0x3f20 [ 2242.016700] ? mark_buffer_dirty+0x95/0x480 [ 2242.021012] ? trace_hardirqs_on+0x10/0x10 [ 2242.025241] ? __ext4_handle_dirty_metadata+0x120/0x480 03:06:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2242.030601] ? ext4_find_delalloc_cluster+0x180/0x180 [ 2242.035784] ? trace_hardirqs_on+0x10/0x10 [ 2242.040009] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 2242.044847] ? ext4_es_lookup_extent+0x321/0xac0 [ 2242.049600] ? lock_acquire+0x170/0x3f0 [ 2242.053570] ? lock_acquire+0x170/0x3f0 [ 2242.057535] ? ext4_map_blocks+0x29f/0x1730 [ 2242.061852] ext4_map_blocks+0xb19/0x1730 [ 2242.065997] ? ext4_issue_zeroout+0x150/0x150 [ 2242.070487] ? __ext4_new_inode+0x27c/0x4eb0 [ 2242.074896] ext4_getblk+0x98/0x3f0 03:06:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2242.078632] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2242.082951] ext4_bread+0x6c/0x1a0 [ 2242.086487] ? ext4_getblk+0x3f0/0x3f0 [ 2242.090367] ? dquot_initialize_needed+0x240/0x240 [ 2242.095291] ext4_append+0x143/0x350 [ 2242.098997] ext4_mkdir+0x4c9/0xbd0 [ 2242.102623] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2242.107289] ? security_inode_mkdir+0xca/0x100 [ 2242.111865] vfs_mkdir+0x463/0x6e0 [ 2242.115401] SyS_mkdirat+0x1fd/0x270 [ 2242.119109] ? SyS_mknod+0x30/0x30 [ 2242.122642] ? __do_page_fault+0x159/0xad0 [ 2242.126868] ? do_syscall_64+0x4c/0x640 [ 2242.130830] ? SyS_mknod+0x30/0x30 [ 2242.134359] do_syscall_64+0x1d5/0x640 [ 2242.138240] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2242.143418] RIP: 0033:0x7f53dd92c317 [ 2242.147124] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2242.154822] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2242.162081] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2242.169344] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 03:06:22 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 5) [ 2242.176600] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2242.183856] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2242.225751] FAULT_INJECTION: forcing a failure. [ 2242.225751] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.241506] CPU: 1 PID: 17996 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2242.249504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2242.258931] Call Trace: [ 2242.261499] dump_stack+0x1b2/0x281 [ 2242.265106] should_fail.cold+0x10a/0x149 [ 2242.269244] should_failslab+0xd6/0x130 [ 2242.273206] __kmalloc+0x2c1/0x400 [ 2242.276745] ? ext4_find_extent+0x879/0xbc0 [ 2242.281051] ext4_find_extent+0x879/0xbc0 [ 2242.285193] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2242.290635] ext4_ext_map_blocks+0x19a/0x6b10 [ 2242.295115] ? __lock_acquire+0x5fc/0x3f20 [ 2242.299329] ? __lock_acquire+0x5fc/0x3f20 [ 2242.303545] ? mark_buffer_dirty+0x95/0x480 [ 2242.307846] ? trace_hardirqs_on+0x10/0x10 [ 2242.312061] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 2242.317409] ? ext4_find_delalloc_cluster+0x180/0x180 [ 2242.322597] ? trace_hardirqs_on+0x10/0x10 [ 2242.326823] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 2242.331662] ? ext4_es_lookup_extent+0x321/0xac0 [ 2242.336402] ? lock_acquire+0x170/0x3f0 [ 2242.340364] ? lock_acquire+0x170/0x3f0 [ 2242.344334] ? ext4_map_blocks+0x29f/0x1730 [ 2242.348636] ext4_map_blocks+0xb19/0x1730 [ 2242.352770] ? ext4_issue_zeroout+0x150/0x150 [ 2242.357266] ? __ext4_new_inode+0x27c/0x4eb0 [ 2242.361668] ext4_getblk+0x98/0x3f0 [ 2242.365278] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2242.369583] ext4_bread+0x6c/0x1a0 [ 2242.373095] ? ext4_getblk+0x3f0/0x3f0 [ 2242.376955] ? dquot_initialize_needed+0x240/0x240 [ 2242.381860] ext4_append+0x143/0x350 [ 2242.385570] ext4_mkdir+0x4c9/0xbd0 [ 2242.389174] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2242.393830] ? security_inode_mkdir+0xca/0x100 [ 2242.398412] vfs_mkdir+0x463/0x6e0 [ 2242.401930] SyS_mkdirat+0x1fd/0x270 [ 2242.405620] ? SyS_mknod+0x30/0x30 [ 2242.409138] ? __do_page_fault+0x159/0xad0 [ 2242.413348] ? do_syscall_64+0x4c/0x640 [ 2242.417299] ? SyS_mknod+0x30/0x30 [ 2242.420818] do_syscall_64+0x1d5/0x640 [ 2242.424686] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2242.429848] RIP: 0033:0x7f53dd92c317 [ 2242.433534] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2242.441216] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2242.448462] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2242.455709] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2242.462950] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 03:06:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 6) [ 2242.470194] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2242.514724] FAULT_INJECTION: forcing a failure. [ 2242.514724] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.526145] CPU: 0 PID: 18003 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2242.534014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2242.543343] Call Trace: [ 2242.545908] dump_stack+0x1b2/0x281 [ 2242.549527] should_fail.cold+0x10a/0x149 [ 2242.553661] should_failslab+0xd6/0x130 [ 2242.557618] kmem_cache_alloc+0x40/0x3c0 [ 2242.561670] __es_insert_extent+0x338/0x1360 [ 2242.566052] ? __es_shrink+0x8c0/0x8c0 [ 2242.569918] ? lock_acquire+0x170/0x3f0 [ 2242.573870] ? ext4_es_insert_extent+0x11f/0x530 [ 2242.578606] ext4_es_insert_extent+0x1b9/0x530 [ 2242.583163] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 2242.588948] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2242.594381] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 2242.600177] ext4_ext_map_blocks+0x1e2c/0x6b10 [ 2242.604733] ? __lock_acquire+0x5fc/0x3f20 [ 2242.608943] ? __lock_acquire+0x5fc/0x3f20 [ 2242.613156] ? mark_buffer_dirty+0x95/0x480 [ 2242.617461] ? trace_hardirqs_on+0x10/0x10 [ 2242.621699] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 2242.627037] ? ext4_find_delalloc_cluster+0x180/0x180 [ 2242.632199] ? trace_hardirqs_on+0x10/0x10 [ 2242.636411] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 2242.641239] ? ext4_es_lookup_extent+0x321/0xac0 [ 2242.645978] ? lock_acquire+0x170/0x3f0 [ 2242.649927] ? lock_acquire+0x170/0x3f0 [ 2242.653877] ? ext4_map_blocks+0x29f/0x1730 [ 2242.658173] ext4_map_blocks+0xb19/0x1730 [ 2242.662310] ? ext4_issue_zeroout+0x150/0x150 [ 2242.666794] ? __ext4_new_inode+0x27c/0x4eb0 [ 2242.671184] ext4_getblk+0x98/0x3f0 [ 2242.674793] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2242.679102] ext4_bread+0x6c/0x1a0 [ 2242.682623] ? ext4_getblk+0x3f0/0x3f0 [ 2242.686490] ? dquot_initialize_needed+0x240/0x240 [ 2242.691423] ext4_append+0x143/0x350 [ 2242.695111] ext4_mkdir+0x4c9/0xbd0 [ 2242.698728] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2242.703395] ? security_inode_mkdir+0xca/0x100 [ 2242.707954] vfs_mkdir+0x463/0x6e0 [ 2242.711479] SyS_mkdirat+0x1fd/0x270 03:06:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 1) read$FUSE(r0, 0x0, 0x0) 03:06:23 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:23 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (fail_nth: 1) [ 2242.715175] ? SyS_mknod+0x30/0x30 [ 2242.718692] ? __do_page_fault+0x159/0xad0 [ 2242.722902] ? do_syscall_64+0x4c/0x640 [ 2242.726851] ? SyS_mknod+0x30/0x30 [ 2242.730364] do_syscall_64+0x1d5/0x640 [ 2242.734240] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2242.739414] RIP: 0033:0x7f53dd92c317 [ 2242.743100] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2242.750790] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2242.758050] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c 03:06:23 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x840811, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) [ 2242.765302] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2242.772549] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2242.779797] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2242.830052] FAULT_INJECTION: forcing a failure. [ 2242.830052] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.842150] CPU: 1 PID: 18014 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 2242.850028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2242.859382] Call Trace: [ 2242.861966] dump_stack+0x1b2/0x281 [ 2242.865589] should_fail.cold+0x10a/0x149 [ 2242.869734] should_failslab+0xd6/0x130 [ 2242.873703] kmem_cache_alloc+0x28e/0x3c0 [ 2242.877846] getname_flags+0xc8/0x550 [ 2242.881642] ? vfs_write+0x319/0x4d0 [ 2242.885349] SyS_mkdirat+0x83/0x270 [ 2242.888972] ? SyS_mknod+0x30/0x30 [ 2242.890021] FAULT_INJECTION: forcing a failure. [ 2242.890021] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.892501] ? __do_page_fault+0x159/0xad0 [ 2242.892511] ? do_syscall_64+0x4c/0x640 [ 2242.892519] ? SyS_mknod+0x30/0x30 [ 2242.892529] do_syscall_64+0x1d5/0x640 [ 2242.892544] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2242.892551] RIP: 0033:0x7f4e061ed317 [ 2242.892555] RSP: 002b:00007f4e04b62f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2242.892564] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e061ed317 [ 2242.892574] RDX: 00000000000001ff RSI: 0000000020000480 RDI: 00000000ffffff9c [ 2242.950342] RBP: 00007f4e04b631d0 R08: 0000000000000000 R09: 0000000000000000 [ 2242.957604] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2242.964856] R13: 0000000020000480 R14: 00007f4e04b62fe0 R15: 0000000020002680 [ 2242.972141] CPU: 0 PID: 18029 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 03:06:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2242.980017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2242.989360] Call Trace: [ 2242.991939] dump_stack+0x1b2/0x281 [ 2242.995566] should_fail.cold+0x10a/0x149 [ 2242.999702] should_failslab+0xd6/0x130 [ 2243.003664] kmem_cache_alloc+0x28e/0x3c0 [ 2243.007806] getname_flags+0xc8/0x550 [ 2243.011592] user_path_at_empty+0x2a/0x50 [ 2243.015718] do_mount+0x118/0x2a30 [ 2243.019233] ? __mutex_unlock_slowpath+0x75/0x770 [ 2243.024064] ? copy_mount_string+0x40/0x40 [ 2243.028286] ? wait_for_completion_io+0x10/0x10 [ 2243.032933] ? vfs_write+0x319/0x4d0 [ 2243.036621] ? fput_many+0xe/0x140 [ 2243.040136] ? copy_mount_options+0x1fa/0x2f0 [ 2243.044604] ? copy_mnt_ns+0xa30/0xa30 [ 2243.048483] SyS_mount+0xa8/0x120 [ 2243.051934] ? copy_mnt_ns+0xa30/0xa30 [ 2243.055807] do_syscall_64+0x1d5/0x640 [ 2243.059693] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2243.064913] RIP: 0033:0x7f252e373209 [ 2243.068620] RSP: 002b:00007f252ccc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:06:23 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 2) read$FUSE(r0, 0x0, 0x0) 03:06:23 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 7) [ 2243.076308] RAX: ffffffffffffffda RBX: 00007f252e486030 RCX: 00007f252e373209 [ 2243.083660] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 2243.090921] RBP: 00007f252ccc71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.098184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2243.105436] R13: 00007ffe8f6f3eaf R14: 00007f252ccc7300 R15: 0000000000022000 [ 2243.143217] FAULT_INJECTION: forcing a failure. [ 2243.143217] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.161521] CPU: 0 PID: 18037 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 2243.169424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2243.172260] FAULT_INJECTION: forcing a failure. [ 2243.172260] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.178768] Call Trace: [ 2243.178785] dump_stack+0x1b2/0x281 [ 2243.178802] should_fail.cold+0x10a/0x149 [ 2243.200286] should_failslab+0xd6/0x130 [ 2243.204261] kmem_cache_alloc+0x28e/0x3c0 [ 2243.208406] __d_alloc+0x2a/0xa20 [ 2243.211862] ? d_lookup+0x172/0x220 [ 2243.215487] d_alloc+0x46/0x240 [ 2243.218766] __lookup_hash+0x101/0x270 [ 2243.222653] filename_create+0x156/0x3f0 [ 2243.226715] ? kern_path_mountpoint+0x40/0x40 [ 2243.231206] ? vfs_write+0x319/0x4d0 [ 2243.234913] SyS_mkdirat+0x95/0x270 [ 2243.238531] ? SyS_mknod+0x30/0x30 [ 2243.242060] ? __do_page_fault+0x159/0xad0 [ 2243.246288] ? do_syscall_64+0x4c/0x640 [ 2243.250250] ? SyS_mknod+0x30/0x30 [ 2243.253780] do_syscall_64+0x1d5/0x640 [ 2243.257667] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2243.262845] RIP: 0033:0x7f4e061ed317 [ 2243.266539] RSP: 002b:00007f4e04b62f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2243.274237] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e061ed317 [ 2243.281486] RDX: 00000000000001ff RSI: 0000000020000480 RDI: 00000000ffffff9c [ 2243.288748] RBP: 00007f4e04b631d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.295999] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2243.303248] R13: 0000000020000480 R14: 00007f4e04b62fe0 R15: 0000000020002680 [ 2243.310514] CPU: 1 PID: 18039 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2243.318399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2243.327744] Call Trace: [ 2243.330331] dump_stack+0x1b2/0x281 [ 2243.333955] should_fail.cold+0x10a/0x149 [ 2243.338107] should_failslab+0xd6/0x130 03:06:24 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 3) read$FUSE(r0, 0x0, 0x0) [ 2243.342086] __kmalloc+0x2c1/0x400 [ 2243.345626] ? ext4_find_extent+0x879/0xbc0 [ 2243.349946] ext4_find_extent+0x879/0xbc0 [ 2243.354101] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2243.359831] ext4_ext_map_blocks+0x19a/0x6b10 [ 2243.364337] ? __lock_acquire+0x5fc/0x3f20 [ 2243.368582] ? mark_buffer_dirty+0x95/0x480 [ 2243.372895] ? trace_hardirqs_on+0x10/0x10 [ 2243.377130] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 2243.382492] ? ext4_find_delalloc_cluster+0x180/0x180 [ 2243.387678] ? trace_hardirqs_on+0x10/0x10 [ 2243.391909] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 2243.396754] ? ext4_es_lookup_extent+0x321/0xac0 [ 2243.401506] ? lock_acquire+0x170/0x3f0 [ 2243.405481] ? lock_acquire+0x170/0x3f0 [ 2243.409456] ? ext4_map_blocks+0x623/0x1730 [ 2243.413778] ext4_map_blocks+0x675/0x1730 [ 2243.416831] FAULT_INJECTION: forcing a failure. [ 2243.416831] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.417929] ? ext4_issue_zeroout+0x150/0x150 [ 2243.417939] ? __ext4_new_inode+0x27c/0x4eb0 [ 2243.417958] ext4_getblk+0x98/0x3f0 [ 2243.417970] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2243.417985] ext4_bread+0x6c/0x1a0 [ 2243.417998] ? ext4_getblk+0x3f0/0x3f0 [ 2243.453287] ? dquot_initialize_needed+0x240/0x240 [ 2243.458205] ext4_append+0x143/0x350 [ 2243.461914] ext4_mkdir+0x4c9/0xbd0 [ 2243.465535] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2243.470191] ? security_inode_mkdir+0xca/0x100 [ 2243.474767] vfs_mkdir+0x463/0x6e0 [ 2243.478292] SyS_mkdirat+0x1fd/0x270 [ 2243.481988] ? SyS_mknod+0x30/0x30 [ 2243.485511] ? __do_page_fault+0x159/0xad0 [ 2243.489732] ? do_syscall_64+0x4c/0x640 [ 2243.493691] ? SyS_mknod+0x30/0x30 [ 2243.497216] do_syscall_64+0x1d5/0x640 [ 2243.501095] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2243.506270] RIP: 0033:0x7f53dd92c317 [ 2243.509965] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2243.517666] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2243.524922] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2243.532176] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.539428] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2243.546676] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2243.553939] CPU: 0 PID: 18055 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 2243.561818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2243.571164] Call Trace: [ 2243.573742] dump_stack+0x1b2/0x281 [ 2243.577358] should_fail.cold+0x10a/0x149 [ 2243.581490] should_failslab+0xd6/0x130 [ 2243.585443] kmem_cache_alloc+0x28e/0x3c0 [ 2243.589570] __d_alloc+0x2a/0xa20 [ 2243.593002] ? d_lookup+0x172/0x220 [ 2243.596607] d_alloc+0x46/0x240 [ 2243.599862] __lookup_hash+0x101/0x270 [ 2243.603741] filename_create+0x156/0x3f0 [ 2243.607780] ? kern_path_mountpoint+0x40/0x40 [ 2243.612268] ? vfs_write+0x319/0x4d0 [ 2243.615958] SyS_mkdirat+0x95/0x270 [ 2243.619562] ? SyS_mknod+0x30/0x30 [ 2243.623086] ? __do_page_fault+0x159/0xad0 [ 2243.627311] ? do_syscall_64+0x4c/0x640 [ 2243.631273] ? SyS_mknod+0x30/0x30 [ 2243.634800] do_syscall_64+0x1d5/0x640 [ 2243.638669] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2243.643835] RIP: 0033:0x7f4e061ed317 [ 2243.647532] RSP: 002b:00007f4e04b62f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2243.655226] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e061ed317 [ 2243.662470] RDX: 00000000000001ff RSI: 0000000020000480 RDI: 00000000ffffff9c [ 2243.669724] RBP: 00007f4e04b631d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.676988] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2243.684232] R13: 0000000020000480 R14: 00007f4e04b62fe0 R15: 0000000020002680 03:06:24 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 8) [ 2243.713897] FAULT_INJECTION: forcing a failure. [ 2243.713897] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.725517] CPU: 0 PID: 18058 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2243.733397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2243.742744] Call Trace: [ 2243.745331] dump_stack+0x1b2/0x281 [ 2243.748955] should_fail.cold+0x10a/0x149 [ 2243.753100] should_failslab+0xd6/0x130 [ 2243.757071] kmem_cache_alloc+0x40/0x3c0 03:06:24 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 4) read$FUSE(r0, 0x0, 0x0) 03:06:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (fail_nth: 2) 03:06:24 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3124}}], [{@dont_hash}, {@fsname={'fsname', 0x3d, '+'}}, {@fsmagic={'fsmagic', 0x3d, 0x3ba5708e}}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_eq}, {@dont_hash}]}}) 03:06:24 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2243.761132] __es_insert_extent+0x338/0x1360 [ 2243.765542] ext4_es_insert_extent+0x1b9/0x530 [ 2243.770121] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 2243.775949] ext4_map_blocks+0x887/0x1730 [ 2243.780103] ? ext4_issue_zeroout+0x150/0x150 [ 2243.782840] FAULT_INJECTION: forcing a failure. [ 2243.782840] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.784595] ? __ext4_new_inode+0x27c/0x4eb0 [ 2243.784615] ext4_getblk+0x98/0x3f0 [ 2243.784626] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2243.784641] ext4_bread+0x6c/0x1a0 [ 2243.811614] ? ext4_getblk+0x3f0/0x3f0 [ 2243.815482] ? dquot_initialize_needed+0x240/0x240 [ 2243.820392] ext4_append+0x143/0x350 [ 2243.824091] ext4_mkdir+0x4c9/0xbd0 [ 2243.827708] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2243.832364] ? security_inode_mkdir+0xca/0x100 [ 2243.836931] vfs_mkdir+0x463/0x6e0 [ 2243.840456] SyS_mkdirat+0x1fd/0x270 [ 2243.844149] ? SyS_mknod+0x30/0x30 [ 2243.847672] ? __do_page_fault+0x159/0xad0 [ 2243.851888] ? do_syscall_64+0x4c/0x640 [ 2243.855845] ? SyS_mknod+0x30/0x30 [ 2243.859364] do_syscall_64+0x1d5/0x640 [ 2243.863243] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2243.868412] RIP: 0033:0x7f53dd92c317 [ 2243.872107] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2243.879797] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 [ 2243.887070] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2243.894323] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2243.901574] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2243.908822] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2243.916087] CPU: 1 PID: 18064 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 2243.923966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2243.933309] Call Trace: [ 2243.935894] dump_stack+0x1b2/0x281 [ 2243.939515] should_fail.cold+0x10a/0x149 [ 2243.943643] should_failslab+0xd6/0x130 [ 2243.947595] kmem_cache_alloc+0x28e/0x3c0 [ 2243.951719] ? ext4_sync_fs+0x7e0/0x7e0 [ 2243.955669] ext4_alloc_inode+0x1a/0x640 [ 2243.959703] ? ext4_sync_fs+0x7e0/0x7e0 [ 2243.963653] alloc_inode+0x5d/0x170 [ 2243.967258] new_inode+0x1d/0xf0 [ 2243.970612] __ext4_new_inode+0x360/0x4eb0 [ 2243.974834] ? kmem_cache_free+0x7c/0x2b0 [ 2243.978962] ? putname+0xcd/0x110 [ 2243.982391] ? SyS_mkdirat+0x95/0x270 [ 2243.986167] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2243.991509] ? ext4_free_inode+0x1460/0x1460 [ 2243.995894] ? lock_downgrade+0x740/0x740 [ 2244.000022] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2244.005101] ? dquot_initialize_needed+0x240/0x240 [ 2244.010007] ext4_mkdir+0x2e4/0xbd0 [ 2244.013633] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2244.018290] ? security_inode_mkdir+0xca/0x100 [ 2244.022852] vfs_mkdir+0x463/0x6e0 [ 2244.026371] SyS_mkdirat+0x1fd/0x270 [ 2244.030064] ? SyS_mknod+0x30/0x30 [ 2244.033580] ? __do_page_fault+0x159/0xad0 [ 2244.037794] ? do_syscall_64+0x4c/0x640 [ 2244.041754] ? SyS_mknod+0x30/0x30 [ 2244.045268] do_syscall_64+0x1d5/0x640 [ 2244.049136] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2244.054300] RIP: 0033:0x7f4e061ed317 [ 2244.057986] RSP: 002b:00007f4e04b62f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 03:06:24 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 9) 03:06:24 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (fail_nth: 5) read$FUSE(r0, 0x0, 0x0) [ 2244.065678] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e061ed317 [ 2244.072926] RDX: 00000000000001ff RSI: 0000000020000480 RDI: 00000000ffffff9c [ 2244.080171] RBP: 00007f4e04b631d0 R08: 0000000000000000 R09: 0000000000000000 [ 2244.087414] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2244.094661] R13: 0000000020000480 R14: 00007f4e04b62fe0 R15: 0000000020002680 03:06:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2244.174479] FAULT_INJECTION: forcing a failure. [ 2244.174479] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.197995] FAULT_INJECTION: forcing a failure. [ 2244.197995] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.198902] FAULT_INJECTION: forcing a failure. [ 2244.198902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2244.209394] CPU: 1 PID: 18086 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2244.228829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2244.238156] Call Trace: [ 2244.240735] dump_stack+0x1b2/0x281 [ 2244.244352] should_fail.cold+0x10a/0x149 [ 2244.248482] should_failslab+0xd6/0x130 [ 2244.252451] kmem_cache_alloc+0x40/0x3c0 [ 2244.256503] __es_insert_extent+0x338/0x1360 [ 2244.260912] ext4_es_insert_extent+0x1b9/0x530 [ 2244.265487] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 2244.271278] ext4_map_blocks+0x887/0x1730 [ 2244.275410] ? ext4_issue_zeroout+0x150/0x150 [ 2244.279884] ? __ext4_new_inode+0x27c/0x4eb0 [ 2244.284276] ext4_getblk+0x98/0x3f0 [ 2244.287889] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2244.292201] ext4_bread+0x6c/0x1a0 [ 2244.295719] ? ext4_getblk+0x3f0/0x3f0 [ 2244.299594] ? dquot_initialize_needed+0x240/0x240 [ 2244.304506] ext4_append+0x143/0x350 [ 2244.308198] ext4_mkdir+0x4c9/0xbd0 [ 2244.311829] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2244.316480] ? security_inode_mkdir+0xca/0x100 [ 2244.321043] vfs_mkdir+0x463/0x6e0 [ 2244.324564] SyS_mkdirat+0x1fd/0x270 [ 2244.328259] ? SyS_mknod+0x30/0x30 [ 2244.331780] ? __do_page_fault+0x159/0xad0 [ 2244.335993] ? do_syscall_64+0x4c/0x640 [ 2244.339945] ? SyS_mknod+0x30/0x30 [ 2244.343464] do_syscall_64+0x1d5/0x640 [ 2244.347334] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2244.352501] RIP: 0033:0x7f53dd92c317 [ 2244.356190] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2244.363878] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92c317 03:06:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2244.371125] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 2244.378372] RBP: 00007f53dc2a21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2244.385629] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2244.392876] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2244.400152] CPU: 0 PID: 18092 Comm: syz-executor.4 Not tainted 4.14.289-syzkaller #0 [ 2244.408033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2244.417379] Call Trace: [ 2244.419985] dump_stack+0x1b2/0x281 03:06:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2244.423622] should_fail.cold+0x10a/0x149 [ 2244.427763] __alloc_pages_nodemask+0x22c/0x2720 [ 2244.432509] ? __lock_acquire+0x5fc/0x3f20 [ 2244.436741] ? __lock_acquire+0x5fc/0x3f20 [ 2244.440972] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2244.445805] ? trace_hardirqs_on+0x10/0x10 [ 2244.450031] ? lock_downgrade+0x740/0x740 [ 2244.454200] ? _kstrtoull+0x1f2/0x450 [ 2244.457995] ? get_pid_task+0x91/0x130 [ 2244.461877] cache_grow_begin+0x91/0x700 [ 2244.465929] ? fs_reclaim_release+0xd0/0x110 [ 2244.470334] ? check_preemption_disabled+0x35/0x240 03:06:25 executing program 1: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) [ 2244.475348] cache_alloc_refill+0x273/0x350 [ 2244.479677] kmem_cache_alloc+0x333/0x3c0 [ 2244.483816] getname_flags+0xc8/0x550 [ 2244.487615] user_path_at_empty+0x2a/0x50 [ 2244.491763] do_mount+0x118/0x2a30 [ 2244.495290] ? __mutex_unlock_slowpath+0x75/0x770 [ 2244.500118] ? copy_mount_string+0x40/0x40 [ 2244.504339] ? wait_for_completion_io+0x10/0x10 [ 2244.508994] ? vfs_write+0x319/0x4d0 [ 2244.512693] ? fput_many+0xe/0x140 [ 2244.516219] ? copy_mount_options+0x1fa/0x2f0 [ 2244.520700] ? copy_mnt_ns+0xa30/0xa30 03:06:25 executing program 1: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) [ 2244.524585] SyS_mount+0xa8/0x120 [ 2244.528023] ? copy_mnt_ns+0xa30/0xa30 [ 2244.531895] do_syscall_64+0x1d5/0x640 [ 2244.535777] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2244.540949] RIP: 0033:0x7f252e373209 [ 2244.544641] RSP: 002b:00007f252ccc7168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2244.552358] RAX: ffffffffffffffda RBX: 00007f252e486030 RCX: 00007f252e373209 [ 2244.559616] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 2244.566868] RBP: 00007f252ccc71d0 R08: 0000000000000000 R09: 0000000000000000 03:06:25 executing program 1: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) [ 2244.574121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2244.581373] R13: 00007ffe8f6f3eaf R14: 00007f252ccc7300 R15: 0000000000022000 [ 2244.588640] CPU: 1 PID: 18083 Comm: syz-executor.2 Not tainted 4.14.289-syzkaller #0 [ 2244.596517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2244.605859] Call Trace: [ 2244.608444] dump_stack+0x1b2/0x281 [ 2244.612073] should_fail.cold+0x10a/0x149 [ 2244.616217] should_failslab+0xd6/0x130 [ 2244.620182] __kmalloc+0x2c1/0x400 [ 2244.623715] ? ext4_find_extent+0x879/0xbc0 [ 2244.628029] ext4_find_extent+0x879/0xbc0 [ 2244.632172] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2244.637617] ext4_ext_map_blocks+0x19a/0x6b10 [ 2244.642110] ? __lock_acquire+0x5fc/0x3f20 [ 2244.646341] ? __lock_acquire+0x5fc/0x3f20 [ 2244.650573] ? mark_buffer_dirty+0x95/0x480 [ 2244.654886] ? trace_hardirqs_on+0x10/0x10 [ 2244.659112] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 2244.664468] ? ext4_find_delalloc_cluster+0x180/0x180 [ 2244.669653] ? trace_hardirqs_on+0x10/0x10 [ 2244.673880] ? ext4_mark_iloc_dirty+0x1822/0x26a0 [ 2244.678719] ? ext4_es_lookup_extent+0x321/0xac0 [ 2244.683467] ? lock_acquire+0x170/0x3f0 [ 2244.687441] ? lock_acquire+0x170/0x3f0 [ 2244.691411] ? ext4_map_blocks+0x29f/0x1730 [ 2244.695732] ext4_map_blocks+0xb19/0x1730 [ 2244.699875] ? ext4_issue_zeroout+0x150/0x150 [ 2244.704363] ? __ext4_new_inode+0x27c/0x4eb0 [ 2244.708768] ext4_getblk+0x98/0x3f0 [ 2244.712387] ? ext4_iomap_begin+0x7f0/0x7f0 [ 2244.716703] ext4_bread+0x6c/0x1a0 [ 2244.720245] ? ext4_getblk+0x3f0/0x3f0 [ 2244.724121] ? dquot_initialize_needed+0x240/0x240 [ 2244.729045] ext4_append+0x143/0x350 [ 2244.732768] ext4_mkdir+0x4c9/0xbd0 [ 2244.736394] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 2244.741066] ? security_inode_mkdir+0xca/0x100 [ 2244.745643] vfs_mkdir+0x463/0x6e0 [ 2244.749187] SyS_mkdirat+0x1fd/0x270 [ 2244.752884] ? SyS_mknod+0x30/0x30 [ 2244.756403] ? __do_page_fault+0x159/0xad0 [ 2244.760615] ? do_syscall_64+0x4c/0x640 [ 2244.764571] ? SyS_mknod+0x30/0x30 [ 2244.768087] do_syscall_64+0x1d5/0x640 [ 2244.771968] entry_SYSCALL_64_after_hwframe+0x46/0xbb 03:06:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2244.777135] RIP: 0033:0x7f4e061ed317 [ 2244.780829] RSP: 002b:00007f4e04b62f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 2244.788513] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4e061ed317 [ 2244.795755] RDX: 00000000000001ff RSI: 0000000020000480 RDI: 00000000ffffff9c [ 2244.803004] RBP: 00007f4e04b631d0 R08: 0000000000000000 R09: 0000000000000000 [ 2244.810250] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000020000440 [ 2244.817506] R13: 0000000020000480 R14: 00007f4e04b62fe0 R15: 0000000020002680 03:06:25 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x111000, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000002700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0x0, r3, {{0x8, 0x100000000, 0x2d22, 0x4, 0x0, 0x5, 0x0, 0xb68}}}, 0x60) 03:06:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:25 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 10) 03:06:25 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:25 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21}, 0x21) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f00000004c0)="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", 0x1000, 0x642}, {&(0x7f0000000100)="fc857dbddec6b9e7bf95364d700969b72e855a8ee54672771f5b3f2671dd9d4c3d66c552cce7afd8f02029247c5eb4b9def827734a08b4eec84b1a337a831e37b66916d944c9c35a60342fc9c9091b5e300ce7db50fdd7bf4186d5a504c016ede31cff7ed4c7fc6586942f6d291ba7df6875fb93409c44aaa7d7dda3258ed014a117d2fe203a92e92b331bc9b8f7fcda1a25a56485273c", 0x97, 0x1ff}, {&(0x7f00000001c0)="e8ec0becc80d66c2123e4bac7be5e6f633edf5e84af94767197df868a23bd49c086b44958b452725fd722301e5e7c59ad67cc654bbbfa66dbcc01123978401229eaf81332f9f024c5e75fd12ea227ae74afd3ad10510", 0x56, 0xf614}], 0x0, &(0x7f00000002c0)={[{'rootmode'}, {'rootmode'}, {'\x8f*%'}, {'#%\xa0:^\\--}.#/\''}, {'/dev/fuse\x00'}, {'&}'}], [{@euid_lt={'euid<', r1}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2245.018717] FAULT_INJECTION: forcing a failure. [ 2245.018717] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.040969] CPU: 0 PID: 18140 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2245.048871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2245.058225] Call Trace: [ 2245.060809] dump_stack+0x1b2/0x281 [ 2245.064437] should_fail.cold+0x10a/0x149 [ 2245.068584] should_failslab+0xd6/0x130 [ 2245.072553] __kmalloc_track_caller+0x2bc/0x400 [ 2245.077213] ? strndup_user+0x5b/0xf0 [ 2245.081010] memdup_user+0x22/0xa0 [ 2245.084565] strndup_user+0x5b/0xf0 [ 2245.088182] ? copy_mnt_ns+0xa30/0xa30 [ 2245.092067] SyS_mount+0x39/0x120 [ 2245.095512] ? copy_mnt_ns+0xa30/0xa30 [ 2245.099389] do_syscall_64+0x1d5/0x640 [ 2245.103267] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2245.108449] RIP: 0033:0x7f53dd92e73a [ 2245.112149] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2245.119852] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2245.127104] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2245.134349] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2245.141593] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2245.148838] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2245.154046] gfs2: gfs2 mount does not exist [ 2245.204862] print_req_error: I/O error, dev loop4, sector 0 03:06:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 11) 03:06:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2245.473117] FAULT_INJECTION: forcing a failure. [ 2245.473117] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.498342] CPU: 1 PID: 18170 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2245.506247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2245.515598] Call Trace: [ 2245.518184] dump_stack+0x1b2/0x281 [ 2245.521814] should_fail.cold+0x10a/0x149 [ 2245.525961] should_failslab+0xd6/0x130 [ 2245.529944] kmem_cache_alloc+0x28e/0x3c0 [ 2245.534090] getname_flags+0xc8/0x550 [ 2245.537880] ? __do_page_fault+0x159/0xad0 [ 2245.542103] user_path_at_empty+0x2a/0x50 [ 2245.546238] do_mount+0x118/0x2a30 [ 2245.549767] ? __do_page_fault+0x159/0xad0 [ 2245.553999] ? retint_kernel+0x2d/0x2d [ 2245.557862] ? copy_mount_string+0x40/0x40 [ 2245.562086] ? memset+0x20/0x40 [ 2245.565358] ? copy_mount_options+0x1fa/0x2f0 [ 2245.569826] ? copy_mnt_ns+0xa30/0xa30 [ 2245.573695] SyS_mount+0xa8/0x120 [ 2245.577124] ? copy_mnt_ns+0xa30/0xa30 [ 2245.580996] do_syscall_64+0x1d5/0x640 [ 2245.584873] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2245.590038] RIP: 0033:0x7f53dd92e73a [ 2245.593724] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2245.601540] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2245.608801] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2245.616051] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 12) 03:06:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2245.623308] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2245.630567] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2245.698483] FAULT_INJECTION: forcing a failure. [ 2245.698483] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2245.710306] CPU: 0 PID: 18183 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2245.718182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2245.727530] Call Trace: [ 2245.730119] dump_stack+0x1b2/0x281 [ 2245.733745] should_fail.cold+0x10a/0x149 [ 2245.737901] __alloc_pages_nodemask+0x22c/0x2720 [ 2245.742644] ? __save_stack_trace+0x63/0x160 [ 2245.747030] ? is_bpf_text_address+0x91/0x150 [ 2245.751505] ? __lock_acquire+0x5fc/0x3f20 [ 2245.755720] ? cmp_ex_sort+0xb0/0xb0 [ 2245.759413] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2245.764256] ? search_extable+0x6f/0x80 [ 2245.768208] ? trim_init_extable+0x280/0x280 [ 2245.772593] ? __kernel_text_address+0x9/0x30 [ 2245.777064] ? copy_mount_options+0x194/0x2f0 [ 2245.781541] ? fixup_exception+0x93/0xd0 [ 2245.785578] ? no_context+0x9c/0x7c0 [ 2245.789271] ? force_sig_info_fault.constprop.0+0x260/0x260 [ 2245.794956] ? bad_area_access_error+0x1f8/0x3e0 [ 2245.799696] cache_grow_begin+0x91/0x700 [ 2245.803741] ? fs_reclaim_release+0xd0/0x110 [ 2245.808127] ? check_preemption_disabled+0x35/0x240 [ 2245.813127] cache_alloc_refill+0x273/0x350 [ 2245.817434] kmem_cache_alloc+0x333/0x3c0 [ 2245.821567] getname_flags+0xc8/0x550 [ 2245.825349] ? __do_page_fault+0x159/0xad0 [ 2245.829565] user_path_at_empty+0x2a/0x50 [ 2245.833693] do_mount+0x118/0x2a30 [ 2245.837212] ? __do_page_fault+0x159/0xad0 [ 2245.841428] ? retint_kernel+0x2d/0x2d [ 2245.845307] ? copy_mount_string+0x40/0x40 [ 2245.849532] ? memset+0x20/0x40 [ 2245.852799] ? copy_mount_options+0x1fa/0x2f0 [ 2245.857277] ? copy_mnt_ns+0xa30/0xa30 [ 2245.861148] SyS_mount+0xa8/0x120 [ 2245.864579] ? copy_mnt_ns+0xa30/0xa30 [ 2245.868447] do_syscall_64+0x1d5/0x640 [ 2245.872324] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2245.877489] RIP: 0033:0x7f53dd92e73a [ 2245.881176] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2245.888860] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:26 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21}, 0x21) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f00000004c0)="2eaf7089d243a1bf67f5987f73a6ec2941e94653e686f605d2ba53eb850c64924dfa192bc8e0595bd3c1645689c889cf5adbf984626ab5e78201099bb56d395e751e787e7c8c5e9bf2331f558111480464a0ed448d2d47610b410c57397a5db8bffbfb41d242a8f8c61a575b961d0a2b763d0e3869b2489ece26621bf45a3d965d1704363ce48a48529f28ae2a0b2e7149c1b8d17aabfd46a47d5afa0e1088fdd547ca3ca0ffc972b9e9c5440765dad1770962c9486d1a14b74594c2c4bf14163a7c482bcbb76ee5e927388040b6aafeac3a01a1be72d4187ebbe13b5903722176b1680a238885f1523b73000844b3a641822646f694dfd0cb14163826d21fdc7b3bbf9223f6fcbe308a49dcbf56726528f6a7d829057a8e1fdaf801d30ae40569b159a341d4d368f7b343c49dd454d9cca1ca9245751e93ce8e41fadf34d5e78ad68fe0b8f164886745f8c887ce1da82839cf9b1fb9398479c9069379f25e2a357ac0fb508e021272d6bd6ee2ac7f29379fdeace8a56a0bbe2e4645a8a15d976c768b97ecddccd8febae6aea0707126812551d09602141e31c993c129944062fbfb468a2e1fa4f25dfd14ab2ef3aeb741df56586474e4d2493252dde2fd02d8bac9bb383f9173af2380b737e68beb8c2b36d509b3cf2b1c1808aba52835e7a3109317c865571140e25645575f46d649722ff530b121c2e5ec6166350d697da5c1af54d69564b63f9c3cf645239286015f0722a4b6ad4eaa27fe8eb9eaf1696624753482ba7171e0916fcf66769e6981e14e83116fc4836fdbb2c7c4522cabec28222582140ff051166a00ab820d4f38d09a939c4bde26cd290ace62cce5914b5798c3a2dfc179a07a12487a3a661ca0137ccea6814694d4cdc5c2437a473ecc2350caa68d42013ecd2384cf0e3270b87365faed02a2c44fda07559b1bdacee744f9a3cd5df49e0752511f15d27299a502e83fd4b87681af3369554d258bac6eb23d21289a0c6cabeca08ee8fbec287915c90125ea872f42d6859cab92232248a3306c11ed3e177dbb41b7d6b157a73164c9659273639db6bd3c515367e744ab913c6c96307b937bcfb2a66e9be73af5af24799c44af786d8531feba0537a8c07ea733ee5b259238d1607fcf7095ef16a12516f3f48f89f09c72aa2969e9c0e0334a58a79af5b6d5aa4eb2d00906d3ec6e4e691c16f3e0bb662da3267ea1e9cb74902db692479d565872e78eb83f4aba42ff70eda75a4f997b72131c841e6c85516c1f0f7a54af8c8810896018cf200a6dede30f1cacd6cfcc0e1e6404e419fb8f0246b3de662b2c94d2d0dd6a3982f7211495c287967917d059e49907319dcf20c2e39063bb89f486f1d838f9a4b5e40d90ea09cd05182bd933e6378a588495f0a060ed03b7602dfdbc343d1b044aa36df5010213025d48474f02e16af2b9a22cab5493b21755fbb4d2e77f47169f858be894d10b154dddae218f886b9ebff5be6b5db82db75f9cee3c68e446f0c4d3f653b1e7bd8741aa417c05a704573900aab8ed7c4a06cf6b47e1c90a7040333210287a09c95cdaa3371184bf3987ab949cc225fe80cd337df85c72c6b804a348d29735e464e1f1c555e72cd27f22a66e2f76812a5e193be0094ad88abbeea04ed3d57e8ed4fec48a3e50d5db8dc3bc492d936ff81f0cfeed3accb9a071541dea96239e91920534543763349dc2fb85da8fe5b675830037f32a19d31e0023d1b04bee6965d7f79056b94835537f3870d835d837784ccf43e64f5d03f569fa11f7faeb8e6390c8073a3553585017eaeb8f9d11c35ef7b10aaf996664d5530497bc8b6c800c0933c78965091f0c0bf48552c3ac102fde78c03a7d3d0a8a749317d4bec09148405cfa35228be7fb086839680463659f25d405fcecf952b7feac899ec90f4a61dfe8bd8da7983531f2b4ebc56f7cbfab845cd8a955dd7f1fa7747d5bb9155f69aef93bb8aef61677fe61c421f006859109f619c325d4b69c686e384794466a76b9e809d853b37442747bced3982c7c18848ad46fd9f120dfe260b02a9896af86ecffc8641bddf338425b1f917ac3da31d92f5c8cc71ef1eddd0cb5c7d900d25ed0d399b2663e36573d6ca9221d6bfee4ba8683196743a84d22a042dec619e85324229f0ff56dc107d982f5a0f9419e6dc9bbf59b0d0630c28999e10da333d34af470c9da097eff6c06f1d3b87f6efce3c892274d7a3e4119b1c0d892e3adb5de34f6a4996d647494e3f92808751fae95ffa08af7f256c803ff520ca65d056679a1821d4c4ceedabda9b74fb6491da3fc7835e4715f8f177d48913a76ad034dcac0d23987cbe566eabe666a3bc616ce8c210e952af517db5d68c234bb75a1ed42184aa15b402b7cbbf4a16fe30082c2b47d895351b91dbee482a7aedefc133645755e2d0b805db159678df54dedbd952f541f7dc0c08da3ac3ce5a3f228afa73e12cbf4b273f3f1710f837be53d5b2b31770bb4a2fd3ec8f246ddba7cf79cfad2e27e11c2693c1f3511dee97071361107602210d9dcaf0d335bf76c8cc498d23172fd102cff42a3f2be0e7471f25aa8574a2b64f4f4dc9d0090d7a11fa7e8d4d3db59e9e196af91c15122980e6a1a2502ad77ddf3f77059dd8ef5f023f303823e5d06dbc04a4ba7e0eeeae1a9b720635d2bac32b7b3b1c42ec24174da22ca2aac3040be4a7b7f9b2271cde3fd22bd332b42810cb7c4d570db7ed63b29fc575e0ee91b44b8b5dd12e4c5a12a391eda4113171d478d5493e27a677d3f38f24ae3a19d3b17fbe9ef4eb0986e6c1d5bbbbebaa24d0883e9ff7d58cee4e8ae634d2743288fd82bb7d705a10d000794f8ae41b0342c8e1a87298f59e048cb0f2ba8d2e51981e3075671813c6e14b153a974b47e5db6edeab4891c0195c209810720bdfd0728862bb6d0e7508e7b88e74f9ec9ab60ce8ad74bf02f80fe74d54d71c5b8792be4deca322a34db6c39fabf8aa5cd8e595f7250253efdb36194005e27536e49244c87d260b878335f8496ea6492704cfa52a2e9c67a0d307acff885dd8b6a58cef4863b35b31dca1f96f9f3491eadf33f588d3888bd994de24a60c7aad89c6722e71a7a1c386953d4a6deb048aaec5eaf7412360f7ee01136d248883e8453e395346a937c2e508b32b633895695475cd781ad768a016d9741d2e51921a9857f8ddcd4d3684fea3bbf3820afc531d94852beb9cd4392346e6442bb7d36e6f059fbd687ce4503e584fb4f2bcb91ed5c4f6e6dd29d24145604e41cf3ad66dfba29dd8bc26e4866e2838f8a0ff73f9c50111d84e947b95a7d2335326eb197f7dcdc775581fdca3c613e047a5913a89cf63084df86dc09fb1c7ab927b6f25b8477b00c6b22db8d44740e924b057295395bce6c352664816eebd42acc105a8237c3e34a0a7ea12b6a6ccc3fee41eadf85e3b58433e97b18d3b3ada2c1b5a0db1df2894c283923e7197fea6f7b58cbe2d0da49dfffda11ea7516f749c4cad1b4cbe84a658b345c81b65fcefc187b00a9a1e27e8fc8ec1d44405d13cda69156538142789c95cb28f62623de6425d008d755d5c800999399a8d82a6811fa611c07243fc26496766faa5576fa0f8f7bda5777f907774364dc61287e4c013a871d16758ffa8b8569bc8d73c4ee73513a4e68249a5c77e50eac6ec6beb1677839734467e078a1f5b0a01fbefc8b243dc6665fd8a81108056f08275a964186cf8984bb7a8110b268e7dd4d8a388b8f6a7a5f671003d566fa56d664a9460ad19ccd0c93523662f7f360dc3468bf7950b3b360f84be324b2d4e1ca925aea6b40153cb3af98fe0f9962fd1ba54dae1fe79c804045a8ab4ce8be785f62e5cde17f70da7f1e501aff9667d13bca63a9767cdfae2e642418e29c0874fbd68fe6d99ef49e588c14f9b173150421d0620b7ca9c699da75017481d029cd54e68f730629c5ec7ae073bcf7af1a13afd2122bff0ff0aaaac6f382ef3776cc85ee8b67adcc5817ba5fab5a8f3ce1d7e00ab2b4b10335c4deb35ed1667b38fcf4bdfa0b06c1586b5cf8eea327384cb976fb58027de98727fea41db033375ac2f333542d60cedfbafd4d5031a3e890d4b50b0cdf9191b29b1b7218caf07d85060cf1a38f1ca78317e13e213ae06029689e3c472cd595e0930ca9e46354e7e13a1937b28bf5abbe654a57d5275a7933d2ac06f499efe59a28e44fa6c883ee203e0717c2c867479d8fdcc5bd58b7b70a9a06a4d6f3602c84e36fb9791e8634bccb53aab538d3428c393065270862ed1baa9f65435b25c7e0df7dde6fc97ee45d901df58410ad3e5f6775f7678ac1aa0a4db56d667ae3828190ce4bbbbd9cf78a2cfe25e80975c3d9c25f75af3ee87a6bd34e3b4d5a64c64858c05c422ae95728ff1c2168c58157948c185ff5d66dfb4761f31ae1d9702b916043b1cdb7a4c0cce5624e26c113784aa42e22e4e014c9adca6d49aa4e3def4aba12744658a8e74c6c36dd8959e1cc19d0b19001135576e641937fb692026ee2d28006d87eb1c66ed5d764fbf8944ecf53d8748a5d0449978159d8333daf327225c423ffe7305fe83bf9079c3620bf6f1ee45fd1b67becd6fd8c924f4d58d1c2fcf6ecc892bfb20de1feafeae1c4fcf99176c2efdc1679959900bb692f8887f6ed327c494cba36cee53cfa50ae9c3a03938f16dd7e63e0e278366aa3a4f74abfa0ad1ea3b3737f2269af9a3b47f9535c01ae1f65bb5303c9c5f662cf5e8654720826838e92dbf1ee67aadd2226f95864a1e4d556f39eff5c4acf7e2de56f48f16f0119d477a697c99b47828ee80235180c41b66dc566bed47cb7747a25d00422f46a22a5d3178b9633b8f8b0581b95070419becfd5958abe2c77e8923b5d1690f7831061688e8d73daff8d8abc545ad93eca6eaaffb6fd7fe4d12f6678e11c75cdf8f624bd945f0c8bb5ae05930b8fec6f721554a3cfc0349e4706e62ec7d25a8a90fd2ac23300f2e2ef30216cf5dbe9a43a1727a9f2e91bab1d46dcc076a58f063a5b2643c3f7b4aed0b3465edb46ec414408a4a3c5ed087bec319340943663e8e335df616d841fe990f9320aeb95d99b656a775b6a7d19280e868e9b737e36ccba283decef10cf1c6fac9aa3a1138ea26e4e8cf07ff79b8dcded3948eed938e280549ed4d8fb90793f538fda23ceaf676768a49621b1e57e09aefc726a84c5e757fc740abcf0ebd3a2a07eefe9aac6816a1a608e4d835ee46f0553141e64eec8605ce8b92dbd89da4edfae1392f2a3a85779e6cf63d6ef66f5e066fae8e5bb1cef97264ec083e3e132f8f17af12cc0a4f0dcd63986422a79d460fc42835549ffe4b96dfd8a1b2d6a7cd060c7fae0a20c1b921080381a428562a6c323dbd7ad6aaa1395d86f61bff210183f700e45f9677ac4b82b8d5b790e8603f0f6904d6bb16443efd402ae2902828967b3ff03554848b5ec5a4d4482ac7bdf478adcae92d0882efd360d785e18d8f86753976d0fad8eaa04546684a9d0d8d8db232a9800c11fb79a46274edcd8871e9cd683f26cc7f85dd302b5bb74c7e3e2f78725e36e5c850a1b1715441b941944f5f6c5c7857406bdb7c70d86b6e23571ff04435bb2ec05f8ac3c7f3beb09c2922b4c6d8205d39db64f87b8890859597bc51d5b8461a4c22cf08d662d7137e984c8692f00f2fcd35d5c8c0d94009a56ad1ec17e13202bc696b0eec41d75e27285b818d88b5a63bdb48e02874848a4520e0cbdde8ad7261c7cfa9f0eacf54113ec62177eb41678d854124cd6ee4590227791208c8413f25e", 0x1000, 0x642}, {&(0x7f0000000100)="fc857dbddec6b9e7bf95364d700969b72e855a8ee54672771f5b3f2671dd9d4c3d66c552cce7afd8f02029247c5eb4b9def827734a08b4eec84b1a337a831e37b66916d944c9c35a60342fc9c9091b5e300ce7db50fdd7bf4186d5a504c016ede31cff7ed4c7fc6586942f6d291ba7df6875fb93409c44aaa7d7dda3258ed014a117d2fe203a92e92b331bc9b8f7fcda1a25a56485273c", 0x97, 0x1ff}, {&(0x7f00000001c0)="e8ec0becc80d66c2123e4bac7be5e6f633edf5e84af94767197df868a23bd49c086b44958b452725fd722301e5e7c59ad67cc654bbbfa66dbcc01123978401229eaf81332f9f024c5e75fd12ea227ae74afd3ad10510", 0x56, 0xf614}], 0x0, &(0x7f00000002c0)={[{'rootmode'}, {'rootmode'}, {'\x8f*%'}, {'#%\xa0:^\\--}.#/\''}, {'/dev/fuse\x00'}, {'&}'}], [{@euid_lt={'euid<', r1}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f00000003c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:26 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x111000, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000002700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0x0, r3, {{0x8, 0x100000000, 0x2d22, 0x4, 0x0, 0x5, 0x0, 0xb68}}}, 0x60) 03:06:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 13) [ 2245.896107] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2245.903355] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2245.910614] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2245.917859] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2246.018255] FAULT_INJECTION: forcing a failure. [ 2246.018255] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.020141] gfs2: gfs2 mount does not exist [ 2246.031706] CPU: 1 PID: 18208 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2246.041776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2246.051123] Call Trace: [ 2246.053709] dump_stack+0x1b2/0x281 [ 2246.057339] should_fail.cold+0x10a/0x149 [ 2246.061490] should_failslab+0xd6/0x130 [ 2246.065460] kmem_cache_alloc+0x28e/0x3c0 [ 2246.069612] alloc_vfsmnt+0x23/0x7f0 [ 2246.073320] ? _raw_read_unlock+0x29/0x40 [ 2246.077467] vfs_kern_mount.part.0+0x27/0x470 [ 2246.081961] do_mount+0xe65/0x2a30 [ 2246.085499] ? __do_page_fault+0x159/0xad0 [ 2246.089730] ? retint_kernel+0x2d/0x2d [ 2246.093619] ? copy_mount_string+0x40/0x40 [ 2246.097857] ? memset+0x20/0x40 [ 2246.101133] ? copy_mount_options+0x1fa/0x2f0 [ 2246.105617] ? copy_mnt_ns+0xa30/0xa30 [ 2246.109480] SyS_mount+0xa8/0x120 [ 2246.112913] ? copy_mnt_ns+0xa30/0xa30 [ 2246.116882] do_syscall_64+0x1d5/0x640 [ 2246.120749] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2246.125921] RIP: 0033:0x7f53dd92e73a [ 2246.129636] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2246.137345] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2246.144594] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2246.151844] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2246.159088] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2246.166331] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2246.194902] print_req_error: I/O error, dev loop4, sector 0 03:06:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:26 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:26 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 14) [ 2246.316441] FAULT_INJECTION: forcing a failure. [ 2246.316441] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.329667] CPU: 1 PID: 18228 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2246.337551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2246.346896] Call Trace: [ 2246.349477] dump_stack+0x1b2/0x281 [ 2246.353102] should_fail.cold+0x10a/0x149 [ 2246.357252] should_failslab+0xd6/0x130 [ 2246.361222] kmem_cache_alloc+0x28e/0x3c0 [ 2246.365368] alloc_vfsmnt+0x23/0x7f0 [ 2246.369085] ? _raw_read_unlock+0x29/0x40 [ 2246.373234] vfs_kern_mount.part.0+0x27/0x470 [ 2246.377723] do_mount+0xe65/0x2a30 [ 2246.381262] ? __do_page_fault+0x159/0xad0 [ 2246.385489] ? retint_kernel+0x2d/0x2d [ 2246.389382] ? copy_mount_string+0x40/0x40 [ 2246.393611] ? memset+0x20/0x40 [ 2246.396885] ? copy_mount_options+0x1fa/0x2f0 [ 2246.401371] ? copy_mnt_ns+0xa30/0xa30 [ 2246.405250] SyS_mount+0xa8/0x120 [ 2246.408694] ? copy_mnt_ns+0xa30/0xa30 [ 2246.412574] do_syscall_64+0x1d5/0x640 03:06:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (fail_nth: 1) 03:06:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2246.416458] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2246.421633] RIP: 0033:0x7f53dd92e73a [ 2246.425330] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2246.433029] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2246.440293] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2246.447555] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2246.454818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2246.458818] FAULT_INJECTION: forcing a failure. 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 15) [ 2246.458818] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.462075] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2246.518289] CPU: 0 PID: 18245 Comm: syz-executor.5 Not tainted 4.14.289-syzkaller #0 [ 2246.526190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2246.527820] FAULT_INJECTION: forcing a failure. [ 2246.527820] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2246.535534] Call Trace: [ 2246.535551] dump_stack+0x1b2/0x281 [ 2246.535565] should_fail.cold+0x10a/0x149 [ 2246.535579] should_failslab+0xd6/0x130 [ 2246.535590] kmem_cache_alloc+0x28e/0x3c0 [ 2246.535600] getname_flags+0xc8/0x550 [ 2246.535617] user_path_at_empty+0x2a/0x50 [ 2246.573657] do_mount+0x118/0x2a30 [ 2246.577183] ? __mutex_unlock_slowpath+0x75/0x770 [ 2246.582007] ? copy_mount_string+0x40/0x40 [ 2246.586219] ? wait_for_completion_io+0x10/0x10 [ 2246.590865] ? vfs_write+0x319/0x4d0 [ 2246.594573] ? fput_many+0xe/0x140 [ 2246.598092] ? copy_mount_options+0x1fa/0x2f0 [ 2246.602565] ? copy_mnt_ns+0xa30/0xa30 [ 2246.606428] SyS_mount+0xa8/0x120 [ 2246.609860] ? copy_mnt_ns+0xa30/0xa30 [ 2246.613732] do_syscall_64+0x1d5/0x640 [ 2246.617606] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2246.622776] RIP: 0033:0x7fca34665209 [ 2246.626466] RSP: 002b:00007fca32fb9168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.634151] RAX: ffffffffffffffda RBX: 00007fca34778030 RCX: 00007fca34665209 [ 2246.641401] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 2246.648664] RBP: 00007fca32fb91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2246.655910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.663156] R13: 00007ffda16a4a6f R14: 00007fca32fb9300 R15: 0000000000022000 [ 2246.670415] CPU: 1 PID: 18256 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2246.678291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2246.687634] Call Trace: [ 2246.690214] dump_stack+0x1b2/0x281 [ 2246.693838] should_fail.cold+0x10a/0x149 [ 2246.697990] __alloc_pages_nodemask+0x22c/0x2720 [ 2246.702726] ? trace_hardirqs_on+0x10/0x10 [ 2246.706938] ? pcpu_alloc+0xbe0/0xf50 [ 2246.710714] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2246.715545] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2246.720980] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2246.725982] alloc_pages_current+0x155/0x260 [ 2246.730370] ? __lockdep_init_map+0x100/0x560 [ 2246.734847] get_zeroed_page+0x19/0x50 [ 2246.738711] mount_fs+0x1c7/0x2a0 [ 2246.742144] vfs_kern_mount.part.0+0x5b/0x470 [ 2246.746614] do_mount+0xe65/0x2a30 [ 2246.750134] ? __do_page_fault+0x159/0xad0 [ 2246.754352] ? retint_kernel+0x2d/0x2d [ 2246.758214] ? copy_mount_string+0x40/0x40 [ 2246.762432] ? memset+0x20/0x40 [ 2246.765701] ? copy_mount_options+0x1fa/0x2f0 [ 2246.770178] ? copy_mnt_ns+0xa30/0xa30 [ 2246.774040] SyS_mount+0xa8/0x120 [ 2246.777467] ? copy_mnt_ns+0xa30/0xa30 [ 2246.781327] do_syscall_64+0x1d5/0x640 [ 2246.785192] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2246.790370] RIP: 0033:0x7f53dd92e73a [ 2246.794066] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2246.801762] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2246.809003] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:27 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x21}, 0x21) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async, rerun: 32) read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (rerun: 32) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000240)=[{&(0x7f00000004c0)="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", 0x1000, 0x642}, {&(0x7f0000000100)="fc857dbddec6b9e7bf95364d700969b72e855a8ee54672771f5b3f2671dd9d4c3d66c552cce7afd8f02029247c5eb4b9def827734a08b4eec84b1a337a831e37b66916d944c9c35a60342fc9c9091b5e300ce7db50fdd7bf4186d5a504c016ede31cff7ed4c7fc6586942f6d291ba7df6875fb93409c44aaa7d7dda3258ed014a117d2fe203a92e92b331bc9b8f7fcda1a25a56485273c", 0x97, 0x1ff}, {&(0x7f00000001c0)="e8ec0becc80d66c2123e4bac7be5e6f633edf5e84af94767197df868a23bd49c086b44958b452725fd722301e5e7c59ad67cc654bbbfa66dbcc01123978401229eaf81332f9f024c5e75fd12ea227ae74afd3ad10510", 0x56, 0xf614}], 0x0, &(0x7f00000002c0)={[{'rootmode'}, {'rootmode'}, {'\x8f*%'}, {'#%\xa0:^\\--}.#/\''}, {'/dev/fuse\x00'}, {'&}'}], [{@euid_lt={'euid<', r1}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r2, 0x2288, &(0x7f00000003c0)) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:27 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x111000, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000002700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_STATFS(r1, &(0x7f0000000040)={0x60, 0x0, r3, {{0x8, 0x100000000, 0x2d22, 0x4, 0x0, 0x5, 0x0, 0xb68}}}, 0x60) 03:06:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 16) [ 2246.816263] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2246.823507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2246.830752] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2246.906233] gfs2: gfs2 mount does not exist [ 2246.912162] FAULT_INJECTION: forcing a failure. [ 2246.912162] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.933759] CPU: 1 PID: 18272 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2246.941665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2246.951012] Call Trace: [ 2246.953598] dump_stack+0x1b2/0x281 [ 2246.957226] should_fail.cold+0x10a/0x149 [ 2246.961383] should_failslab+0xd6/0x130 [ 2246.965366] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2246.970038] sget_userns+0x102/0xc10 [ 2246.973747] ? get_anon_bdev+0x1c0/0x1c0 [ 2246.977789] ? get_anon_bdev+0x1c0/0x1c0 [ 2246.981834] sget+0xd1/0x110 [ 2246.984840] ? fuse_get_root_inode+0xc0/0xc0 [ 2246.989225] mount_nodev+0x2c/0xf0 [ 2246.992741] mount_fs+0x92/0x2a0 [ 2246.996087] vfs_kern_mount.part.0+0x5b/0x470 [ 2247.000564] do_mount+0xe65/0x2a30 [ 2247.004099] ? __do_page_fault+0x159/0xad0 [ 2247.008317] ? retint_kernel+0x2d/0x2d [ 2247.012191] ? copy_mount_string+0x40/0x40 [ 2247.016401] ? memset+0x20/0x40 [ 2247.019665] ? copy_mount_options+0x1fa/0x2f0 [ 2247.024138] ? copy_mnt_ns+0xa30/0xa30 [ 2247.028003] SyS_mount+0xa8/0x120 [ 2247.031432] ? copy_mnt_ns+0xa30/0xa30 [ 2247.035304] do_syscall_64+0x1d5/0x640 [ 2247.039191] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2247.044361] RIP: 0033:0x7f53dd92e73a [ 2247.048046] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:27 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 17) [ 2247.055729] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2247.062977] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2247.070232] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2247.077486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2247.084756] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2247.131616] FAULT_INJECTION: forcing a failure. [ 2247.131616] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.148410] print_req_error: I/O error, dev loop4, sector 0 [ 2247.157778] CPU: 0 PID: 18293 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2247.165672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2247.175015] Call Trace: [ 2247.177600] dump_stack+0x1b2/0x281 [ 2247.181222] should_fail.cold+0x10a/0x149 [ 2247.185364] should_failslab+0xd6/0x130 [ 2247.189321] __kmalloc+0x2c1/0x400 [ 2247.192840] ? __list_lru_init+0x67/0x710 [ 2247.196970] __list_lru_init+0x67/0x710 [ 2247.200929] sget_userns+0x4e4/0xc10 [ 2247.204620] ? get_anon_bdev+0x1c0/0x1c0 [ 2247.208658] ? get_anon_bdev+0x1c0/0x1c0 [ 2247.212690] sget+0xd1/0x110 [ 2247.215683] ? fuse_get_root_inode+0xc0/0xc0 [ 2247.220077] mount_nodev+0x2c/0xf0 [ 2247.223594] mount_fs+0x92/0x2a0 [ 2247.227031] vfs_kern_mount.part.0+0x5b/0x470 03:06:27 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (fail_nth: 2) [ 2247.231501] do_mount+0xe65/0x2a30 [ 2247.235020] ? __do_page_fault+0x159/0xad0 [ 2247.239235] ? retint_kernel+0x2d/0x2d [ 2247.243099] ? copy_mount_string+0x40/0x40 [ 2247.247309] ? memset+0x20/0x40 [ 2247.250562] ? copy_mount_options+0x1fa/0x2f0 [ 2247.255124] ? copy_mnt_ns+0xa30/0xa30 [ 2247.259002] SyS_mount+0xa8/0x120 [ 2247.262445] ? copy_mnt_ns+0xa30/0xa30 [ 2247.266316] do_syscall_64+0x1d5/0x640 [ 2247.270193] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2247.275359] RIP: 0033:0x7f53dd92e73a 03:06:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:27 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2247.279044] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2247.286741] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2247.293993] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2247.301258] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2247.308522] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2247.315782] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2247.416926] FAULT_INJECTION: forcing a failure. [ 2247.416926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2247.428740] CPU: 1 PID: 18320 Comm: syz-executor.5 Not tainted 4.14.289-syzkaller #0 [ 2247.436601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2247.445943] Call Trace: [ 2247.448518] dump_stack+0x1b2/0x281 [ 2247.452144] should_fail.cold+0x10a/0x149 [ 2247.456270] __alloc_pages_nodemask+0x22c/0x2720 [ 2247.461015] ? __lock_acquire+0x5fc/0x3f20 [ 2247.465233] ? __lock_acquire+0x5fc/0x3f20 [ 2247.469453] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2247.474271] ? trace_hardirqs_on+0x10/0x10 [ 2247.478478] ? lock_downgrade+0x740/0x740 [ 2247.482613] ? _kstrtoull+0x1f2/0x450 [ 2247.486403] ? get_pid_task+0x91/0x130 [ 2247.490271] cache_grow_begin+0x91/0x700 [ 2247.494312] ? fs_reclaim_release+0xd0/0x110 [ 2247.498708] ? check_preemption_disabled+0x35/0x240 [ 2247.503718] cache_alloc_refill+0x273/0x350 [ 2247.508034] kmem_cache_alloc+0x333/0x3c0 [ 2247.512164] getname_flags+0xc8/0x550 [ 2247.515949] user_path_at_empty+0x2a/0x50 [ 2247.520094] do_mount+0x118/0x2a30 [ 2247.523626] ? __mutex_unlock_slowpath+0x75/0x770 [ 2247.528457] ? copy_mount_string+0x40/0x40 [ 2247.532669] ? wait_for_completion_io+0x10/0x10 [ 2247.537338] ? vfs_write+0x319/0x4d0 [ 2247.541035] ? fput_many+0xe/0x140 [ 2247.544557] ? copy_mount_options+0x1fa/0x2f0 [ 2247.549025] ? copy_mnt_ns+0xa30/0xa30 [ 2247.552891] SyS_mount+0xa8/0x120 [ 2247.556325] ? copy_mnt_ns+0xa30/0xa30 [ 2247.560207] do_syscall_64+0x1d5/0x640 [ 2247.564092] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2247.569273] RIP: 0033:0x7fca34665209 [ 2247.572983] RSP: 002b:00007fca32fb9168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2247.580670] RAX: ffffffffffffffda RBX: 00007fca34778030 RCX: 00007fca34665209 [ 2247.587927] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000000 [ 2247.595192] RBP: 00007fca32fb91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2247.602442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2247.609696] R13: 00007ffda16a4a6f R14: 00007fca32fb9300 R15: 0000000000022000 03:06:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67728c36fce3e6be6f75705f000000007d55f13d7a32451df647a63d2b0b1e41955d1fd9788569abb82703042f8afa8c0a3e07d27039", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 18) 03:06:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:28 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)={0x74, 0x3, 0x8, "c7281ca6a2e1785156e11afc30f3bd99af8e25295be93f3b8df7600bfc91ea60c93cbb351456dc557d7b365e447af476a35ab7110ed33832ec4b3c2b2d2384da46a4b13858501c9d0051404676b819ba5dc0208c913c82d66d9161cd6420d87641499c1df70c61d1435ea5ffd665c96afbf76db9"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) socket(0x1a, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x887e5c5c73e0131a, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0xda}}], [{@appraise_type}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}]}}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, r4, {0x5}}, 0x18) [ 2247.738102] FAULT_INJECTION: forcing a failure. [ 2247.738102] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.755478] CPU: 1 PID: 18329 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2247.763371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2247.772724] Call Trace: [ 2247.775313] dump_stack+0x1b2/0x281 [ 2247.778942] should_fail.cold+0x10a/0x149 [ 2247.783091] should_failslab+0xd6/0x130 [ 2247.787063] __kmalloc+0x2c1/0x400 [ 2247.790598] ? __list_lru_init+0x67/0x710 [ 2247.794746] __list_lru_init+0x67/0x710 [ 2247.798720] sget_userns+0x504/0xc10 [ 2247.802445] ? get_anon_bdev+0x1c0/0x1c0 [ 2247.806497] ? get_anon_bdev+0x1c0/0x1c0 [ 2247.810543] sget+0xd1/0x110 [ 2247.813548] ? fuse_get_root_inode+0xc0/0xc0 [ 2247.817931] mount_nodev+0x2c/0xf0 [ 2247.821445] mount_fs+0x92/0x2a0 [ 2247.824797] vfs_kern_mount.part.0+0x5b/0x470 [ 2247.829268] do_mount+0xe65/0x2a30 [ 2247.832811] ? __do_page_fault+0x159/0xad0 [ 2247.837023] ? retint_kernel+0x2d/0x2d [ 2247.840899] ? copy_mount_string+0x40/0x40 [ 2247.845110] ? memset+0x20/0x40 [ 2247.848366] ? copy_mount_options+0x1fa/0x2f0 [ 2247.852835] ? copy_mnt_ns+0xa30/0xa30 [ 2247.856698] SyS_mount+0xa8/0x120 [ 2247.860134] ? copy_mnt_ns+0xa30/0xa30 [ 2247.863998] do_syscall_64+0x1d5/0x640 [ 2247.867864] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2247.873031] RIP: 0033:0x7f53dd92e73a [ 2247.876717] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67728c36fce3e6be6f75705f000000007d55f13d7a32451df647a63d2b0b1e41955d1fd9788569abb82703042f8afa8c0a3e07d27039", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:28 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)={0x74, 0x3, 0x8, "c7281ca6a2e1785156e11afc30f3bd99af8e25295be93f3b8df7600bfc91ea60c93cbb351456dc557d7b365e447af476a35ab7110ed33832ec4b3c2b2d2384da46a4b13858501c9d0051404676b819ba5dc0208c913c82d66d9161cd6420d87641499c1df70c61d1435ea5ffd665c96afbf76db9"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) socket(0x1a, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x887e5c5c73e0131a, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0xda}}], [{@appraise_type}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}]}}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, r4, {0x5}}, 0x18) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)={0x74, 0x3, 0x8, "c7281ca6a2e1785156e11afc30f3bd99af8e25295be93f3b8df7600bfc91ea60c93cbb351456dc557d7b365e447af476a35ab7110ed33832ec4b3c2b2d2384da46a4b13858501c9d0051404676b819ba5dc0208c913c82d66d9161cd6420d87641499c1df70c61d1435ea5ffd665c96afbf76db9"}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) socket(0x1a, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r2, 0x0, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x887e5c5c73e0131a, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0xda}}], [{@appraise_type}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}]}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) (async) read$FUSE(r3, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, r4, {0x5}}, 0x18) (async) 03:06:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2247.884404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2247.891653] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2247.898900] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2247.906157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2247.913407] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:28 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0x18) 03:06:28 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 19) 03:06:28 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67728c36fce3e6be6f75705f000000007d55f13d7a32451df647a63d2b0b1e41955d1fd9788569abb82703042f8afa8c0a3e07d27039", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67728c36fce3e6be6f75705f000000007d55f13d7a32451df647a63d2b0b1e41955d1fd9788569abb82703042f8afa8c0a3e07d27039", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:28 executing program 2: ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)={0x74, 0x3, 0x8, "c7281ca6a2e1785156e11afc30f3bd99af8e25295be93f3b8df7600bfc91ea60c93cbb351456dc557d7b365e447af476a35ab7110ed33832ec4b3c2b2d2384da46a4b13858501c9d0051404676b819ba5dc0208c913c82d66d9161cd6420d87641499c1df70c61d1435ea5ffd665c96afbf76db9"}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) socket(0x1a, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x887e5c5c73e0131a, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0xda}}], [{@appraise_type}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}]}}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, r4, {0x5}}, 0x18) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)={0x74, 0x3, 0x8, "c7281ca6a2e1785156e11afc30f3bd99af8e25295be93f3b8df7600bfc91ea60c93cbb351456dc557d7b365e447af476a35ab7110ed33832ec4b3c2b2d2384da46a4b13858501c9d0051404676b819ba5dc0208c913c82d66d9161cd6420d87641499c1df70c61d1435ea5ffd665c96afbf76db9"}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) socket(0x1a, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r2, 0x0, 0x0) (async) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x887e5c5c73e0131a, &(0x7f00000000c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0xda}}], [{@appraise_type}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_gt={'euid>', 0xee01}}]}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) (async) read$FUSE(r3, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r3, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r4, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_WRITE(r1, &(0x7f0000000280)={0x18, 0x0, r4, {0x5}}, 0x18) (async) 03:06:28 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2248.241585] FAULT_INJECTION: forcing a failure. [ 2248.241585] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.263536] CPU: 1 PID: 18394 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2248.271429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2248.280779] Call Trace: [ 2248.283369] dump_stack+0x1b2/0x281 [ 2248.287002] should_fail.cold+0x10a/0x149 03:06:28 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x810000, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, 0x0, 0x0) [ 2248.291160] should_failslab+0xd6/0x130 [ 2248.295137] __kmalloc+0x2c1/0x400 [ 2248.298675] ? __list_lru_init+0x67/0x710 [ 2248.302820] __list_lru_init+0x67/0x710 [ 2248.306793] sget_userns+0x4e4/0xc10 [ 2248.310508] ? get_anon_bdev+0x1c0/0x1c0 [ 2248.314565] ? get_anon_bdev+0x1c0/0x1c0 [ 2248.318618] sget+0xd1/0x110 [ 2248.321633] ? fuse_get_root_inode+0xc0/0xc0 [ 2248.326038] mount_nodev+0x2c/0xf0 [ 2248.329579] mount_fs+0x92/0x2a0 [ 2248.332933] vfs_kern_mount.part.0+0x5b/0x470 [ 2248.337409] do_mount+0xe65/0x2a30 [ 2248.340928] ? __do_page_fault+0x159/0xad0 [ 2248.345143] ? retint_kernel+0x2d/0x2d [ 2248.349098] ? copy_mount_string+0x40/0x40 [ 2248.353336] ? memset+0x20/0x40 [ 2248.356594] ? copy_mount_options+0x1fa/0x2f0 [ 2248.361068] ? copy_mnt_ns+0xa30/0xa30 [ 2248.364934] SyS_mount+0xa8/0x120 [ 2248.368362] ? copy_mnt_ns+0xa30/0xa30 [ 2248.372233] do_syscall_64+0x1d5/0x640 [ 2248.376122] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2248.381287] RIP: 0033:0x7f53dd92e73a 03:06:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r2, {0x9}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66643d527a68cefe23e2ce0b4486dd07700ed97f8e64befb8f08594478a46890e5b6c6912298baaf08b5c9199032da670834bc2c29d0c52f982ba6e92b14f0afe237be3085f90fdb7a9557961eae8231c6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 20) 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x810000, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) read$FUSE(r0, 0x0, 0x0) [ 2248.384973] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2248.392654] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2248.399900] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2248.407144] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2248.414388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2248.421636] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r2, {0x9}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66643d527a68cefe23e2ce0b4486dd07700ed97f8e64befb8f08594478a46890e5b6c6912298baaf08b5c9199032da670834bc2c29d0c52f982ba6e92b14f0afe237be3085f90fdb7a9557961eae8231c6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r2, {0x9}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66643d527a68cefe23e2ce0b4486dd07700ed97f8e64befb8f08594478a46890e5b6c6912298baaf08b5c9199032da670834bc2c29d0c52f982ba6e92b14f0afe237be3085f90fdb7a9557961eae8231c6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2248.477734] FAULT_INJECTION: forcing a failure. [ 2248.477734] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.508795] CPU: 0 PID: 18426 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2248.516699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2248.526052] Call Trace: [ 2248.528637] dump_stack+0x1b2/0x281 [ 2248.532262] should_fail.cold+0x10a/0x149 [ 2248.536404] should_failslab+0xd6/0x130 [ 2248.540375] __kmalloc+0x2c1/0x400 [ 2248.543909] ? match_number+0x9d/0x200 [ 2248.547795] match_number+0x9d/0x200 [ 2248.551502] ? match_strdup+0xa0/0xa0 [ 2248.555294] ? register_shrinker+0x15a/0x220 [ 2248.559706] fuse_fill_super+0x437/0x15c0 [ 2248.563851] ? fuse_get_root_inode+0xc0/0xc0 [ 2248.568250] ? up_write+0x17/0x60 [ 2248.571695] ? register_shrinker+0x15f/0x220 [ 2248.576104] ? sget_userns+0x768/0xc10 [ 2248.579997] ? get_anon_bdev+0x1c0/0x1c0 [ 2248.584046] ? sget+0xd9/0x110 [ 2248.587231] ? fuse_get_root_inode+0xc0/0xc0 [ 2248.591629] mount_nodev+0x4c/0xf0 [ 2248.595162] mount_fs+0x92/0x2a0 [ 2248.598524] vfs_kern_mount.part.0+0x5b/0x470 [ 2248.603020] do_mount+0xe65/0x2a30 [ 2248.606562] ? __do_page_fault+0x159/0xad0 [ 2248.610792] ? retint_kernel+0x2d/0x2d [ 2248.614675] ? copy_mount_string+0x40/0x40 [ 2248.619051] ? memset+0x20/0x40 [ 2248.622332] ? copy_mount_options+0x1fa/0x2f0 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x810000, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x810000, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) [ 2248.626827] ? copy_mnt_ns+0xa30/0xa30 [ 2248.630709] SyS_mount+0xa8/0x120 [ 2248.634158] ? copy_mnt_ns+0xa30/0xa30 [ 2248.638041] do_syscall_64+0x1d5/0x640 [ 2248.641930] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2248.647113] RIP: 0033:0x7f53dd92e73a [ 2248.650818] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2248.658519] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2248.665783] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2248.673047] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2248.680310] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2248.687573] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:29 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async, rerun: 32) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0x18) (rerun: 32) 03:06:29 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r2, {0x9}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66643d527a68cefe23e2ce0b4486dd07700ed97f8e64befb8f08594478a46890e5b6c6912298baaf08b5c9199032da670834bc2c29d0c52f982ba6e92b14f0afe237be3085f90fdb7a9557961eae8231c6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, r2, {0x9}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="66643d527a68cefe23e2ce0b4486dd07700ed97f8e64befb8f08594478a46890e5b6c6912298baaf08b5c9199032da670834bc2c29d0c52f982ba6e92b14f0afe237be3085f90fdb7a9557961eae8231c6", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:29 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 21) 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYBLOB="28a1adb129b019f0d3c1079d0977e9e5a80090b61f", @ANYBLOB="2c726f6f74c844599cf5fc586d6f64653d30303044e5399730303030303030303030303030303034303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB="214ef895f1420e570540", @ANYRES32=r1, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0x0) 03:06:29 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000000)={0x90, 0x0, r1, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2249.083505] FAULT_INJECTION: forcing a failure. [ 2249.083505] name failslab, interval 1, probability 0, space 0, times 0 [ 2249.099736] CPU: 1 PID: 18467 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2249.107631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2249.116984] Call Trace: [ 2249.119569] dump_stack+0x1b2/0x281 [ 2249.123198] should_fail.cold+0x10a/0x149 [ 2249.127348] should_failslab+0xd6/0x130 [ 2249.131323] __kmalloc+0x2c1/0x400 [ 2249.134860] ? match_number+0x9d/0x200 [ 2249.138747] match_number+0x9d/0x200 [ 2249.142457] ? match_strdup+0xa0/0xa0 [ 2249.146253] ? register_shrinker+0x15a/0x220 [ 2249.150664] fuse_fill_super+0x3f2/0x15c0 [ 2249.154813] ? fuse_get_root_inode+0xc0/0xc0 [ 2249.159220] ? up_write+0x17/0x60 [ 2249.162670] ? register_shrinker+0x15f/0x220 [ 2249.167073] ? sget_userns+0x768/0xc10 [ 2249.170965] ? get_anon_bdev+0x1c0/0x1c0 [ 2249.175017] ? sget+0xd9/0x110 [ 2249.178204] ? fuse_get_root_inode+0xc0/0xc0 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYBLOB="28a1adb129b019f0d3c1079d0977e9e5a80090b61f", @ANYBLOB="2c726f6f74c844599cf5fc586d6f64653d30303044e5399730303030303030303030303030303034303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB="214ef895f1420e570540", @ANYRES32=r1, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0x0) 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYBLOB="28a1adb129b019f0d3c1079d0977e9e5a80090b61f", @ANYBLOB="2c726f6f74c844599cf5fc586d6f64653d30303044e5399730303030303030303030303030303034303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB="214ef895f1420e570540", @ANYRES32=r1, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYBLOB="28a1adb129b019f0d3c1079d0977e9e5a80090b61f", @ANYBLOB="2c726f6f74c844599cf5fc586d6f64653d30303044e5399730303030303030303030303030303034303030302c75736572", @ANYRESDEC=0x0, @ANYBLOB="214ef895f1420e570540", @ANYRES32=r1, @ANYBLOB=',\x00']) (async) read$FUSE(r0, 0x0, 0x0) (async) [ 2249.182614] mount_nodev+0x4c/0xf0 [ 2249.186155] mount_fs+0x92/0x2a0 [ 2249.189520] vfs_kern_mount.part.0+0x5b/0x470 [ 2249.194011] do_mount+0xe65/0x2a30 [ 2249.197551] ? __do_page_fault+0x159/0xad0 [ 2249.201783] ? retint_kernel+0x2d/0x2d [ 2249.205842] ? copy_mount_string+0x40/0x40 [ 2249.210077] ? memset+0x20/0x40 [ 2249.213351] ? copy_mount_options+0x1fa/0x2f0 [ 2249.217842] ? copy_mnt_ns+0xa30/0xa30 [ 2249.221727] SyS_mount+0xa8/0x120 [ 2249.225185] ? copy_mnt_ns+0xa30/0xa30 [ 2249.229076] do_syscall_64+0x1d5/0x640 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1002068, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x4007, 0x4, 0x208, 0x81}}, 0x20) read$FUSE(r0, 0x0, 0x0) 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1002068, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x4007, 0x4, 0x208, 0x81}}, 0x20) read$FUSE(r0, 0x0, 0x0) [ 2249.232963] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2249.238147] RIP: 0033:0x7f53dd92e73a [ 2249.241848] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2249.249551] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2249.256814] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2249.264080] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2249.271343] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2249.278606] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:29 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1002068, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x4007, 0x4, 0x208, 0x81}}, 0x20) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1002068, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0x20, 0x0, 0x0, {0x4007, 0x4, 0x208, 0x81}}, 0x20) (async) read$FUSE(r0, 0x0, 0x0) (async) 03:06:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 22) [ 2249.375707] FAULT_INJECTION: forcing a failure. [ 2249.375707] name failslab, interval 1, probability 0, space 0, times 0 [ 2249.400546] CPU: 0 PID: 18520 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2249.408452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2249.417796] Call Trace: [ 2249.420372] dump_stack+0x1b2/0x281 [ 2249.423992] should_fail.cold+0x10a/0x149 [ 2249.428125] should_failslab+0xd6/0x130 [ 2249.432083] __kmalloc+0x2c1/0x400 [ 2249.435602] ? match_strdup+0x58/0xa0 [ 2249.439381] match_strdup+0x58/0xa0 [ 2249.442997] fuse_fill_super+0x2e1/0x15c0 [ 2249.447128] ? fuse_get_root_inode+0xc0/0xc0 [ 2249.451515] ? up_write+0x17/0x60 [ 2249.454944] ? register_shrinker+0x15f/0x220 [ 2249.459330] ? sget_userns+0x768/0xc10 [ 2249.463199] ? get_anon_bdev+0x1c0/0x1c0 [ 2249.467238] ? sget+0xd9/0x110 [ 2249.470409] ? fuse_get_root_inode+0xc0/0xc0 [ 2249.474800] mount_nodev+0x4c/0xf0 [ 2249.478320] mount_fs+0x92/0x2a0 [ 2249.481676] vfs_kern_mount.part.0+0x5b/0x470 [ 2249.486158] do_mount+0xe65/0x2a30 [ 2249.489678] ? __do_page_fault+0x159/0xad0 [ 2249.493888] ? retint_kernel+0x2d/0x2d [ 2249.497757] ? copy_mount_string+0x40/0x40 [ 2249.501982] ? memset+0x20/0x40 [ 2249.505246] ? copy_mount_options+0x1fa/0x2f0 [ 2249.509728] ? copy_mnt_ns+0xa30/0xa30 [ 2249.513603] SyS_mount+0xa8/0x120 [ 2249.517048] ? copy_mnt_ns+0xa30/0xa30 [ 2249.520928] do_syscall_64+0x1d5/0x640 [ 2249.524812] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2249.529985] RIP: 0033:0x7f53dd92e73a [ 2249.533679] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2249.541381] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2249.548637] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2249.555890] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2249.563148] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2249.570402] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:30 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18}, 0x18) 03:06:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f64653d3030303030303030303030303030303030ffff303030302c757365721f69643d2860e574260f88063f07e28528cb933430f15878753905cc129c9d18b51b4672aa53e16d971dd9a2992cabb1c9", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10, 0xffffffffffffffda}, 0x10) read$FUSE(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x4, 0x6, 0x7}}, 0x28) 03:06:30 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = getuid() read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = getuid() r7 = getuid() r8 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f0000004740)={0x3c8, 0x0, r2, [{{0x3, 0x1, 0x402, 0x8, 0x80, 0xc2a, {0x5, 0x8, 0xf4, 0x1, 0x100, 0x6, 0x9, 0x5e00, 0x7, 0x1000, 0x9, r3, 0xffffffffffffffff, 0x40, 0x7}}, {0x1, 0x6, 0x2, 0x2c54, ']\''}}, {{0x2, 0x3, 0x44e, 0x2c32, 0x101, 0xab3, {0x4, 0x0, 0x6, 0x9, 0x0, 0x6d, 0x9, 0xffffffff, 0xfffffc00, 0xc000, 0x4, 0xee00, r4, 0x8001, 0xc21}}, {0x6, 0xfffffffffffff000, 0x2, 0x1, 'fd'}}, {{0x5, 0x3, 0xffffffffffffffe0, 0x3f, 0x7ff, 0xc7, {0x6, 0x0, 0x81, 0x6f49036000000000, 0x0, 0x2d17b3b6, 0xd2, 0x8, 0x4, 0x7000, 0x1f7, r5, 0xee00, 0x3eb4, 0xc69}}, {0x6, 0x80}}, {{0x5, 0x2, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x4, {0x0, 0xc5b3, 0x100000001, 0xfff, 0x4, 0x2992, 0x7, 0x7, 0x0, 0x4000, 0xc2c, 0x0, 0x0, 0x3, 0x20}}, {0x0, 0x5caa, 0x0, 0x3}}, {{0x2, 0x3, 0x8000, 0xc6a7, 0x7, 0x5, {0x6, 0x2, 0x0, 0x1, 0x316, 0x20, 0x4, 0x9, 0x5, 0x2000, 0x9, r6, 0xee00, 0x3, 0x3}}, {0x2, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x5, 0x0, 0x8, 0x9, 0x6846, 0x9, {0x4, 0xcee0, 0x5, 0xfffffffffffff621, 0x2, 0x7e0, 0x4, 0x5, 0x8001, 0x4000, 0xfff, r7, r8, 0xbd5f, 0xffffff81}}, {0x2, 0x196, 0x7, 0x1, 'user_id'}}]}, 0x3c8) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 23) 03:06:30 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, 0x0, 0x0) 03:06:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f64653d3030303030303030303030303030303030ffff303030302c757365721f69643d2860e574260f88063f07e28528cb933430f15878753905cc129c9d18b51b4672aa53e16d971dd9a2992cabb1c9", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10, 0xffffffffffffffda}, 0x10) read$FUSE(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) (async) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x4, 0x6, 0x7}}, 0x28) [ 2249.980567] FAULT_INJECTION: forcing a failure. [ 2249.980567] name failslab, interval 1, probability 0, space 0, times 0 [ 2249.996132] CPU: 0 PID: 18543 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2250.004030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2250.013379] Call Trace: [ 2250.015966] dump_stack+0x1b2/0x281 [ 2250.019595] should_fail.cold+0x10a/0x149 [ 2250.023746] should_failslab+0xd6/0x130 [ 2250.027720] __kmalloc+0x2c1/0x400 [ 2250.031257] ? match_strdup+0x58/0xa0 [ 2250.035053] ? map_id_down+0xe9/0x180 [ 2250.038853] match_strdup+0x58/0xa0 [ 2250.042476] fuse_fill_super+0x21d/0x15c0 [ 2250.046623] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.051039] ? up_write+0x17/0x60 [ 2250.054491] ? register_shrinker+0x15f/0x220 [ 2250.058892] ? sget_userns+0x768/0xc10 [ 2250.062782] ? get_anon_bdev+0x1c0/0x1c0 [ 2250.066836] ? sget+0xd9/0x110 [ 2250.070027] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.074428] mount_nodev+0x4c/0xf0 [ 2250.077960] mount_fs+0x92/0x2a0 [ 2250.081319] vfs_kern_mount.part.0+0x5b/0x470 [ 2250.085794] do_mount+0xe65/0x2a30 [ 2250.089318] ? __do_page_fault+0x159/0xad0 [ 2250.093535] ? retint_kernel+0x2d/0x2d [ 2250.097420] ? copy_mount_string+0x40/0x40 [ 2250.101656] ? memset+0x20/0x40 [ 2250.104949] ? copy_mount_options+0x1fa/0x2f0 [ 2250.109441] ? copy_mnt_ns+0xa30/0xa30 [ 2250.113315] SyS_mount+0xa8/0x120 [ 2250.116758] ? copy_mnt_ns+0xa30/0xa30 [ 2250.120625] do_syscall_64+0x1d5/0x640 [ 2250.124499] entry_SYSCALL_64_after_hwframe+0x46/0xbb 03:06:30 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f64653d3030303030303030303030303030303030ffff303030302c757365721f69643d2860e574260f88063f07e28528cb933430f15878753905cc129c9d18b51b4672aa53e16d971dd9a2992cabb1c9", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async, rerun: 64) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async, rerun: 64) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10, 0xffffffffffffffda}, 0x10) (async, rerun: 64) read$FUSE(r0, 0x0, 0x0) (async, rerun: 64) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) (async) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x4, 0x6, 0x7}}, 0x28) 03:06:30 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 24) [ 2250.129671] RIP: 0033:0x7f53dd92e73a [ 2250.133363] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2250.141056] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2250.148314] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2250.155568] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2250.162819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2250.170094] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2250.238952] FAULT_INJECTION: forcing a failure. [ 2250.238952] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.261771] CPU: 0 PID: 18584 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2250.269655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2250.279001] Call Trace: [ 2250.281577] dump_stack+0x1b2/0x281 [ 2250.285191] should_fail.cold+0x10a/0x149 [ 2250.289332] should_failslab+0xd6/0x130 [ 2250.293286] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2250.297942] fuse_dev_alloc+0x4b/0x310 [ 2250.301816] ? task_active_pid_ns+0xa1/0xc0 [ 2250.306128] fuse_fill_super+0x79d/0x15c0 [ 2250.310256] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.314641] ? up_write+0x17/0x60 [ 2250.318138] ? register_shrinker+0x15f/0x220 [ 2250.322527] ? sget_userns+0x768/0xc10 [ 2250.326396] ? get_anon_bdev+0x1c0/0x1c0 [ 2250.330434] ? sget+0xd9/0x110 [ 2250.333620] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.338014] mount_nodev+0x4c/0xf0 [ 2250.341541] mount_fs+0x92/0x2a0 [ 2250.344897] vfs_kern_mount.part.0+0x5b/0x470 [ 2250.349377] do_mount+0xe65/0x2a30 [ 2250.352902] ? __do_page_fault+0x159/0xad0 [ 2250.357123] ? retint_kernel+0x2d/0x2d [ 2250.360994] ? copy_mount_string+0x40/0x40 [ 2250.365218] ? memset+0x20/0x40 [ 2250.368494] ? copy_mount_options+0x1fa/0x2f0 [ 2250.372982] ? copy_mnt_ns+0xa30/0xa30 [ 2250.376859] SyS_mount+0xa8/0x120 [ 2250.380290] ? copy_mnt_ns+0xa30/0xa30 [ 2250.384167] do_syscall_64+0x1d5/0x640 [ 2250.388110] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2250.393279] RIP: 0033:0x7f53dd92e73a [ 2250.396972] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2250.404660] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2250.411915] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2250.419230] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2250.426486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20440, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0x1}}, 0x20) 03:06:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 25) [ 2250.433734] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20440, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0x1}}, 0x20) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20440, 0x0) (async) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0x1}}, 0x20) (async) [ 2250.503539] FAULT_INJECTION: forcing a failure. [ 2250.503539] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.517921] CPU: 0 PID: 18597 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2250.525814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2250.535166] Call Trace: [ 2250.537754] dump_stack+0x1b2/0x281 [ 2250.541379] should_fail.cold+0x10a/0x149 [ 2250.545516] should_failslab+0xd6/0x130 [ 2250.549474] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2250.554136] wb_congested_get_create+0x15b/0x360 [ 2250.558883] wb_init+0x4f6/0x7c0 [ 2250.562234] ? __raw_spin_lock_init+0x28/0x100 [ 2250.566795] cgwb_bdi_init+0xe2/0x1e0 [ 2250.570590] bdi_alloc_node+0x224/0x2e0 [ 2250.574563] super_setup_bdi_name+0x8b/0x220 [ 2250.578978] ? kill_block_super+0xe0/0xe0 [ 2250.583122] ? __lockdep_init_map+0x100/0x560 [ 2250.587608] ? do_raw_spin_unlock+0x164/0x220 [ 2250.592087] fuse_fill_super+0x937/0x15c0 [ 2250.596221] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.600609] ? up_write+0x17/0x60 [ 2250.604051] ? register_shrinker+0x15f/0x220 [ 2250.608440] ? sget_userns+0x768/0xc10 [ 2250.612321] ? get_anon_bdev+0x1c0/0x1c0 [ 2250.616370] ? sget+0xd9/0x110 [ 2250.619648] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.624044] mount_nodev+0x4c/0xf0 [ 2250.627562] mount_fs+0x92/0x2a0 [ 2250.630910] vfs_kern_mount.part.0+0x5b/0x470 [ 2250.635386] do_mount+0xe65/0x2a30 [ 2250.639057] ? __do_page_fault+0x159/0xad0 [ 2250.643282] ? retint_kernel+0x2d/0x2d [ 2250.647151] ? copy_mount_string+0x40/0x40 [ 2250.651372] ? memset+0x20/0x40 [ 2250.654638] ? copy_mount_options+0x1fa/0x2f0 [ 2250.659125] ? copy_mnt_ns+0xa30/0xa30 [ 2250.662990] SyS_mount+0xa8/0x120 [ 2250.666423] ? copy_mnt_ns+0xa30/0xa30 [ 2250.670288] do_syscall_64+0x1d5/0x640 [ 2250.674159] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2250.679325] RIP: 0033:0x7f53dd92e73a [ 2250.683015] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2250.690697] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2250.697944] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2250.705216] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2250.712462] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2250.719716] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1c, 0x20, 0x4, 0x0, 0x48, 0xffffffffffffffff, 0x3d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x3, 0xeed8, 0x70}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1, r2, r3, 0x1]}, 0x80) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030ff303030303030303030307cc65c17bfb5d9c769c93030303034303030302c757365725f69643db2fbde4c8c27669b2f619c0f9957f5286f3f27b831a754671aac9f3056df31e9ba0fc1d502b4917a0e1c92082bc5ae1b03257438b0d85df7795b6afeb0fa029ce427b4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_DIRENT(r0, &(0x7f0000000000)={0x30, 0x0, 0x0, [{0x0, 0x1, 0x8, 0x7, 'rootmode'}]}, 0x30) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x20440, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040), 0x2, 0x1}}, 0x20) 03:06:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 26) 03:06:31 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:31 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = getuid() read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) (async) r6 = getuid() r7 = getuid() (async) r8 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f0000004740)={0x3c8, 0x0, r2, [{{0x3, 0x1, 0x402, 0x8, 0x80, 0xc2a, {0x5, 0x8, 0xf4, 0x1, 0x100, 0x6, 0x9, 0x5e00, 0x7, 0x1000, 0x9, r3, 0xffffffffffffffff, 0x40, 0x7}}, {0x1, 0x6, 0x2, 0x2c54, ']\''}}, {{0x2, 0x3, 0x44e, 0x2c32, 0x101, 0xab3, {0x4, 0x0, 0x6, 0x9, 0x0, 0x6d, 0x9, 0xffffffff, 0xfffffc00, 0xc000, 0x4, 0xee00, r4, 0x8001, 0xc21}}, {0x6, 0xfffffffffffff000, 0x2, 0x1, 'fd'}}, {{0x5, 0x3, 0xffffffffffffffe0, 0x3f, 0x7ff, 0xc7, {0x6, 0x0, 0x81, 0x6f49036000000000, 0x0, 0x2d17b3b6, 0xd2, 0x8, 0x4, 0x7000, 0x1f7, r5, 0xee00, 0x3eb4, 0xc69}}, {0x6, 0x80}}, {{0x5, 0x2, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x4, {0x0, 0xc5b3, 0x100000001, 0xfff, 0x4, 0x2992, 0x7, 0x7, 0x0, 0x4000, 0xc2c, 0x0, 0x0, 0x3, 0x20}}, {0x0, 0x5caa, 0x0, 0x3}}, {{0x2, 0x3, 0x8000, 0xc6a7, 0x7, 0x5, {0x6, 0x2, 0x0, 0x1, 0x316, 0x20, 0x4, 0x9, 0x5, 0x2000, 0x9, r6, 0xee00, 0x3, 0x3}}, {0x2, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x5, 0x0, 0x8, 0x9, 0x6846, 0x9, {0x4, 0xcee0, 0x5, 0xfffffffffffff621, 0x2, 0x7e0, 0x4, 0x5, 0x8001, 0x4000, 0xfff, r7, r8, 0xbd5f, 0xffffff81}}, {0x2, 0x196, 0x7, 0x1, 'user_id'}}]}, 0x3c8) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, 0x0, 0x0) 03:06:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1c, 0x20, 0x4, 0x0, 0x48, 0xffffffffffffffff, 0x3d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x3, 0xeed8, 0x70}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1, r2, r3, 0x1]}, 0x80) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030ff303030303030303030307cc65c17bfb5d9c769c93030303034303030302c757365725f69643db2fbde4c8c27669b2f619c0f9957f5286f3f27b831a754671aac9f3056df31e9ba0fc1d502b4917a0e1c92082bc5ae1b03257438b0d85df7795b6afeb0fa029ce427b4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_DIRENT(r0, &(0x7f0000000000)={0x30, 0x0, 0x0, [{0x0, 0x1, 0x8, 0x7, 'rootmode'}]}, 0x30) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1c, 0x20, 0x4, 0x0, 0x48, 0xffffffffffffffff, 0x3d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x3, 0xeed8, 0x70}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1, r2, r3, 0x1]}, 0x80) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030ff303030303030303030307cc65c17bfb5d9c769c93030303034303030302c757365725f69643db2fbde4c8c27669b2f619c0f9957f5286f3f27b831a754671aac9f3056df31e9ba0fc1d502b4917a0e1c92082bc5ae1b03257438b0d85df7795b6afeb0fa029ce427b4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_DIRENT(r0, &(0x7f0000000000)={0x30, 0x0, 0x0, [{0x0, 0x1, 0x8, 0x7, 'rootmode'}]}, 0x30) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2250.838780] FAULT_INJECTION: forcing a failure. [ 2250.838780] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.859557] CPU: 1 PID: 18632 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2250.867457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2250.876808] Call Trace: [ 2250.879393] dump_stack+0x1b2/0x281 [ 2250.883020] should_fail.cold+0x10a/0x149 [ 2250.887169] should_failslab+0xd6/0x130 [ 2250.891143] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2250.895806] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 2250.900910] device_create_groups_vargs+0x7b/0x250 [ 2250.905837] device_create_vargs+0x3a/0x50 [ 2250.910077] bdi_register_va.part.0+0x35/0x650 [ 2250.914660] bdi_register_va+0x63/0x80 [ 2250.918544] super_setup_bdi_name+0x123/0x220 [ 2250.923038] ? kill_block_super+0xe0/0xe0 [ 2250.927209] ? do_raw_spin_unlock+0x164/0x220 [ 2250.931707] fuse_fill_super+0x937/0x15c0 03:06:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1c, 0x20, 0x4, 0x0, 0x48, 0xffffffffffffffff, 0x3d, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0xb, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @cb_func={0x18, 0x8, 0x4, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x3, 0xeed8, 0x70}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0x1, r2, r3, 0x1]}, 0x80) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030ff303030303030303030307cc65c17bfb5d9c769c93030303034303030302c757365725f69643db2fbde4c8c27669b2f619c0f9957f5286f3f27b831a754671aac9f3056df31e9ba0fc1d502b4917a0e1c92082bc5ae1b03257438b0d85df7795b6afeb0fa029ce427b4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_DIRENT(r0, &(0x7f0000000000)={0x30, 0x0, 0x0, [{0x0, 0x1, 0x8, 0x7, 'rootmode'}]}, 0x30) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2250.935866] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.940268] ? up_write+0x17/0x60 [ 2250.943720] ? register_shrinker+0x15f/0x220 [ 2250.948131] ? sget_userns+0x768/0xc10 [ 2250.952021] ? get_anon_bdev+0x1c0/0x1c0 [ 2250.956072] ? sget+0xd9/0x110 [ 2250.959258] ? fuse_get_root_inode+0xc0/0xc0 [ 2250.963660] mount_nodev+0x4c/0xf0 [ 2250.967192] mount_fs+0x92/0x2a0 [ 2250.970552] vfs_kern_mount.part.0+0x5b/0x470 [ 2250.975043] do_mount+0xe65/0x2a30 [ 2250.978583] ? __do_page_fault+0x159/0xad0 [ 2250.982818] ? retint_kernel+0x2d/0x2d 03:06:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2250.986702] ? copy_mount_string+0x40/0x40 [ 2250.990935] ? memset+0x20/0x40 [ 2250.994207] ? copy_mount_options+0x1fa/0x2f0 [ 2250.998687] ? copy_mnt_ns+0xa30/0xa30 [ 2251.002571] SyS_mount+0xa8/0x120 [ 2251.006018] ? copy_mnt_ns+0xa30/0xa30 [ 2251.009898] do_syscall_64+0x1d5/0x640 [ 2251.013783] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2251.018965] RIP: 0033:0x7f53dd92e73a [ 2251.022674] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2251.030375] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66646a282a2492893321606aae79dfc26f268196435e321351086be61d034ec2f36300eca18a68bdce062d0393992c478f6bdd33ac50fa2901c35869874fba99fdaee86ce00eac49b6b8d4025dc6149030b2685271164b59b8a743ee4b97fe2b629414d4bad21c378d1fe491610b0600ac001d895951e0ea8247530bccfee22647c5cc69f7add9874f53f25222da6953ecf9ceb7f6ac1129a183aae2ae378321db454c5c5badf07487263c714efdb9da6cfe69ed6922ffa279445314446f508474d5438ef64aca69a7e77ea95bf38ca1ace8462c60eccf2719fb2b243b42d5dad041078378d16d423dc1fdcebd701b71494900000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="925c"]) read$FUSE(r0, 0x0, 0x0) 03:06:31 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 27) [ 2251.037631] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2251.044880] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2251.052128] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2251.059375] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:31 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66646a282a2492893321606aae79dfc26f268196435e321351086be61d034ec2f36300eca18a68bdce062d0393992c478f6bdd33ac50fa2901c35869874fba99fdaee86ce00eac49b6b8d4025dc6149030b2685271164b59b8a743ee4b97fe2b629414d4bad21c378d1fe491610b0600ac001d895951e0ea8247530bccfee22647c5cc69f7add9874f53f25222da6953ecf9ceb7f6ac1129a183aae2ae378321db454c5c5badf07487263c714efdb9da6cfe69ed6922ffa279445314446f508474d5438ef64aca69a7e77ea95bf38ca1ace8462c60eccf2719fb2b243b42d5dad041078378d16d423dc1fdcebd701b71494900000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="925c"]) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66646a282a2492893321606aae79dfc26f268196435e321351086be61d034ec2f36300eca18a68bdce062d0393992c478f6bdd33ac50fa2901c35869874fba99fdaee86ce00eac49b6b8d4025dc6149030b2685271164b59b8a743ee4b97fe2b629414d4bad21c378d1fe491610b0600ac001d895951e0ea8247530bccfee22647c5cc69f7add9874f53f25222da6953ecf9ceb7f6ac1129a183aae2ae378321db454c5c5badf07487263c714efdb9da6cfe69ed6922ffa279445314446f508474d5438ef64aca69a7e77ea95bf38ca1ace8462c60eccf2719fb2b243b42d5dad041078378d16d423dc1fdcebd701b71494900000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="925c"]) (async) read$FUSE(r0, 0x0, 0x0) (async) [ 2251.108235] FAULT_INJECTION: forcing a failure. [ 2251.108235] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.126150] CPU: 1 PID: 18683 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2251.134045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2251.143390] Call Trace: [ 2251.145975] dump_stack+0x1b2/0x281 [ 2251.149610] should_fail.cold+0x10a/0x149 [ 2251.153756] should_failslab+0xd6/0x130 [ 2251.157730] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2251.162402] wb_congested_get_create+0x15b/0x360 [ 2251.167157] wb_init+0x4f6/0x7c0 [ 2251.170512] ? __raw_spin_lock_init+0x28/0x100 [ 2251.175077] cgwb_bdi_init+0xe2/0x1e0 [ 2251.178856] bdi_alloc_node+0x224/0x2e0 [ 2251.182814] super_setup_bdi_name+0x8b/0x220 [ 2251.187201] ? kill_block_super+0xe0/0xe0 [ 2251.191336] ? __lockdep_init_map+0x100/0x560 [ 2251.195878] ? do_raw_spin_unlock+0x164/0x220 [ 2251.200357] fuse_fill_super+0x937/0x15c0 [ 2251.204490] ? fuse_get_root_inode+0xc0/0xc0 [ 2251.208884] ? up_write+0x17/0x60 [ 2251.212322] ? register_shrinker+0x15f/0x220 [ 2251.216723] ? sget_userns+0x768/0xc10 [ 2251.220597] ? get_anon_bdev+0x1c0/0x1c0 [ 2251.224632] ? sget+0xd9/0x110 [ 2251.227814] ? fuse_get_root_inode+0xc0/0xc0 [ 2251.232220] mount_nodev+0x4c/0xf0 [ 2251.235753] mount_fs+0x92/0x2a0 [ 2251.239102] vfs_kern_mount.part.0+0x5b/0x470 [ 2251.243576] do_mount+0xe65/0x2a30 [ 2251.247099] ? __do_page_fault+0x159/0xad0 [ 2251.251318] ? retint_kernel+0x2d/0x2d [ 2251.255201] ? copy_mount_string+0x40/0x40 [ 2251.259422] ? memset+0x20/0x40 [ 2251.262683] ? copy_mount_options+0x1fa/0x2f0 [ 2251.267155] ? copy_mnt_ns+0xa30/0xa30 [ 2251.271025] SyS_mount+0xa8/0x120 [ 2251.274463] ? copy_mnt_ns+0xa30/0xa30 [ 2251.278331] do_syscall_64+0x1d5/0x640 [ 2251.282201] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2251.287369] RIP: 0033:0x7f53dd92e73a [ 2251.291089] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2251.298790] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66646a282a2492893321606aae79dfc26f268196435e321351086be61d034ec2f36300eca18a68bdce062d0393992c478f6bdd33ac50fa2901c35869874fba99fdaee86ce00eac49b6b8d4025dc6149030b2685271164b59b8a743ee4b97fe2b629414d4bad21c378d1fe491610b0600ac001d895951e0ea8247530bccfee22647c5cc69f7add9874f53f25222da6953ecf9ceb7f6ac1129a183aae2ae378321db454c5c5badf07487263c714efdb9da6cfe69ed6922ffa279445314446f508474d5438ef64aca69a7e77ea95bf38ca1ace8462c60eccf2719fb2b243b42d5dad041078378d16d423dc1fdcebd701b71494900000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="925c"]) read$FUSE(r0, 0x0, 0x0) 03:06:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 28) [ 2251.306037] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2251.313288] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2251.320545] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2251.327796] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) read$FUSE(r0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0xce7ce28c6732de89) [ 2251.374096] FAULT_INJECTION: forcing a failure. [ 2251.374096] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.386833] CPU: 0 PID: 18695 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2251.394729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2251.404084] Call Trace: [ 2251.406671] dump_stack+0x1b2/0x281 [ 2251.410299] should_fail.cold+0x10a/0x149 [ 2251.414449] should_failslab+0xd6/0x130 [ 2251.418419] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2251.423086] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 2251.428188] device_create_groups_vargs+0x7b/0x250 [ 2251.433118] device_create_vargs+0x3a/0x50 [ 2251.437354] bdi_register_va.part.0+0x35/0x650 [ 2251.441932] bdi_register_va+0x63/0x80 [ 2251.445813] super_setup_bdi_name+0x123/0x220 [ 2251.450286] ? kill_block_super+0xe0/0xe0 [ 2251.454410] ? do_raw_spin_unlock+0x164/0x220 [ 2251.458893] fuse_fill_super+0x937/0x15c0 [ 2251.463017] ? fuse_get_root_inode+0xc0/0xc0 [ 2251.467401] ? up_write+0x17/0x60 [ 2251.470830] ? register_shrinker+0x15f/0x220 [ 2251.475214] ? sget_userns+0x768/0xc10 [ 2251.479085] ? get_anon_bdev+0x1c0/0x1c0 [ 2251.483120] ? sget+0xd9/0x110 [ 2251.486288] ? fuse_get_root_inode+0xc0/0xc0 [ 2251.490785] mount_nodev+0x4c/0xf0 [ 2251.494299] mount_fs+0x92/0x2a0 [ 2251.497645] vfs_kern_mount.part.0+0x5b/0x470 [ 2251.502119] do_mount+0xe65/0x2a30 [ 2251.505638] ? __do_page_fault+0x159/0xad0 [ 2251.509850] ? retint_kernel+0x2d/0x2d [ 2251.513711] ? copy_mount_string+0x40/0x40 [ 2251.517924] ? memset+0x20/0x40 [ 2251.521178] ? copy_mount_options+0x1fa/0x2f0 [ 2251.525646] ? copy_mnt_ns+0xa30/0xa30 [ 2251.529526] SyS_mount+0xa8/0x120 [ 2251.532955] ? copy_mnt_ns+0xa30/0xa30 [ 2251.536822] do_syscall_64+0x1d5/0x640 [ 2251.540690] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2251.545856] RIP: 0033:0x7f53dd92e73a [ 2251.549540] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2251.557223] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2251.564474] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2251.571749] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2251.579001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2251.586253] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:32 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r3 = getuid() read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000002700)={0x2020, 0x0, 0x0, 0x0}, 0x2020) r6 = getuid() r7 = getuid() r8 = getegid() write$FUSE_DIRENTPLUS(r0, &(0x7f0000004740)={0x3c8, 0x0, r2, [{{0x3, 0x1, 0x402, 0x8, 0x80, 0xc2a, {0x5, 0x8, 0xf4, 0x1, 0x100, 0x6, 0x9, 0x5e00, 0x7, 0x1000, 0x9, r3, 0xffffffffffffffff, 0x40, 0x7}}, {0x1, 0x6, 0x2, 0x2c54, ']\''}}, {{0x2, 0x3, 0x44e, 0x2c32, 0x101, 0xab3, {0x4, 0x0, 0x6, 0x9, 0x0, 0x6d, 0x9, 0xffffffff, 0xfffffc00, 0xc000, 0x4, 0xee00, r4, 0x8001, 0xc21}}, {0x6, 0xfffffffffffff000, 0x2, 0x1, 'fd'}}, {{0x5, 0x3, 0xffffffffffffffe0, 0x3f, 0x7ff, 0xc7, {0x6, 0x0, 0x81, 0x6f49036000000000, 0x0, 0x2d17b3b6, 0xd2, 0x8, 0x4, 0x7000, 0x1f7, r5, 0xee00, 0x3eb4, 0xc69}}, {0x6, 0x80}}, {{0x5, 0x2, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x4, {0x0, 0xc5b3, 0x100000001, 0xfff, 0x4, 0x2992, 0x7, 0x7, 0x0, 0x4000, 0xc2c, 0x0, 0x0, 0x3, 0x20}}, {0x0, 0x5caa, 0x0, 0x3}}, {{0x2, 0x3, 0x8000, 0xc6a7, 0x7, 0x5, {0x6, 0x2, 0x0, 0x1, 0x316, 0x20, 0x4, 0x9, 0x5, 0x2000, 0x9, r6, 0xee00, 0x3, 0x3}}, {0x2, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x5, 0x0, 0x8, 0x9, 0x6846, 0x9, {0x4, 0xcee0, 0x5, 0xfffffffffffff621, 0x2, 0x7e0, 0x4, 0x5, 0x8001, 0x4000, 0xfff, r7, r8, 0xbd5f, 0xffffff81}}, {0x2, 0x196, 0x7, 0x1, 'user_id'}}]}, 0x3c8) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) getuid() (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) read$FUSE(r0, &(0x7f0000002700)={0x2020}, 0x2020) (async) getuid() (async) getuid() (async) getegid() (async) write$FUSE_DIRENTPLUS(r0, &(0x7f0000004740)={0x3c8, 0x0, r2, [{{0x3, 0x1, 0x402, 0x8, 0x80, 0xc2a, {0x5, 0x8, 0xf4, 0x1, 0x100, 0x6, 0x9, 0x5e00, 0x7, 0x1000, 0x9, r3, 0xffffffffffffffff, 0x40, 0x7}}, {0x1, 0x6, 0x2, 0x2c54, ']\''}}, {{0x2, 0x3, 0x44e, 0x2c32, 0x101, 0xab3, {0x4, 0x0, 0x6, 0x9, 0x0, 0x6d, 0x9, 0xffffffff, 0xfffffc00, 0xc000, 0x4, 0xee00, r4, 0x8001, 0xc21}}, {0x6, 0xfffffffffffff000, 0x2, 0x1, 'fd'}}, {{0x5, 0x3, 0xffffffffffffffe0, 0x3f, 0x7ff, 0xc7, {0x6, 0x0, 0x81, 0x6f49036000000000, 0x0, 0x2d17b3b6, 0xd2, 0x8, 0x4, 0x7000, 0x1f7, r5, 0xee00, 0x3eb4, 0xc69}}, {0x6, 0x80}}, {{0x5, 0x2, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x4, {0x0, 0xc5b3, 0x100000001, 0xfff, 0x4, 0x2992, 0x7, 0x7, 0x0, 0x4000, 0xc2c, 0x0, 0x0, 0x3, 0x20}}, {0x0, 0x5caa, 0x0, 0x3}}, {{0x2, 0x3, 0x8000, 0xc6a7, 0x7, 0x5, {0x6, 0x2, 0x0, 0x1, 0x316, 0x20, 0x4, 0x9, 0x5, 0x2000, 0x9, r6, 0xee00, 0x3, 0x3}}, {0x2, 0x1, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x5, 0x0, 0x8, 0x9, 0x6846, 0x9, {0x4, 0xcee0, 0x5, 0xfffffffffffff621, 0x2, 0x7e0, 0x4, 0x5, 0x8001, 0x4000, 0xfff, r7, r8, 0xbd5f, 0xffffff81}}, {0x2, 0x196, 0x7, 0x1, 'user_id'}}]}, 0x3c8) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) read$FUSE(r0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0xce7ce28c6732de89) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) (async) read$FUSE(r0, 0x0, 0x0) (async) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0xce7ce28c6732de89) (async) 03:06:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 29) 03:06:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, 0x0, 0x0) [ 2251.697860] FAULT_INJECTION: forcing a failure. [ 2251.697860] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.714766] CPU: 0 PID: 18713 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2251.722661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2251.732011] Call Trace: [ 2251.734610] dump_stack+0x1b2/0x281 [ 2251.738236] should_fail.cold+0x10a/0x149 [ 2251.742386] should_failslab+0xd6/0x130 [ 2251.746365] __kmalloc_track_caller+0x2bc/0x400 [ 2251.751032] ? kvasprintf_const+0x55/0x180 [ 2251.755270] kvasprintf+0xa8/0x100 [ 2251.758810] ? bust_spinlocks+0xc0/0xc0 [ 2251.762788] kvasprintf_const+0x55/0x180 [ 2251.766842] kobject_set_name_vargs+0x56/0x150 [ 2251.771407] device_create_groups_vargs+0x1a2/0x250 [ 2251.776413] device_create_vargs+0x3a/0x50 [ 2251.780648] bdi_register_va.part.0+0x35/0x650 [ 2251.785228] bdi_register_va+0x63/0x80 [ 2251.789106] super_setup_bdi_name+0x123/0x220 [ 2251.793578] ? kill_block_super+0xe0/0xe0 [ 2251.797706] ? do_raw_spin_unlock+0x164/0x220 [ 2251.802182] fuse_fill_super+0x937/0x15c0 [ 2251.806316] ? fuse_get_root_inode+0xc0/0xc0 [ 2251.810704] ? up_write+0x17/0x60 [ 2251.814146] ? register_shrinker+0x15f/0x220 [ 2251.818550] ? sget_userns+0x768/0xc10 [ 2251.822437] ? get_anon_bdev+0x1c0/0x1c0 [ 2251.826484] ? sget+0xd9/0x110 [ 2251.829657] ? fuse_get_root_inode+0xc0/0xc0 [ 2251.834043] mount_nodev+0x4c/0xf0 [ 2251.837559] mount_fs+0x92/0x2a0 [ 2251.840902] vfs_kern_mount.part.0+0x5b/0x470 [ 2251.845375] do_mount+0xe65/0x2a30 [ 2251.848895] ? __do_page_fault+0x159/0xad0 [ 2251.853109] ? retint_kernel+0x2d/0x2d [ 2251.856988] ? copy_mount_string+0x40/0x40 [ 2251.861203] ? memset+0x20/0x40 [ 2251.864461] ? copy_mount_options+0x1fa/0x2f0 [ 2251.868935] ? copy_mnt_ns+0xa30/0xa30 [ 2251.872801] SyS_mount+0xa8/0x120 [ 2251.876229] ? copy_mnt_ns+0xa30/0xa30 [ 2251.880095] do_syscall_64+0x1d5/0x640 [ 2251.883961] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2251.889130] RIP: 0033:0x7f53dd92e73a 03:06:32 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:32 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) (async) read$FUSE(r0, 0x0, 0x0) (async, rerun: 64) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0xce7ce28c6732de89) (rerun: 64) 03:06:32 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 30) 03:06:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7, 0x3}}, 0x30) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ded2"]) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:32 executing program 2: getresgid(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) [ 2251.892817] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2251.900500] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2251.907748] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2251.914995] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2251.922242] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2251.929488] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7, 0x3}}, 0x30) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ded2"]) (async, rerun: 32) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (rerun: 32) [ 2251.995624] FAULT_INJECTION: forcing a failure. [ 2251.995624] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.034573] CPU: 1 PID: 18757 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2252.042477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2252.051829] Call Trace: [ 2252.054452] dump_stack+0x1b2/0x281 [ 2252.058078] should_fail.cold+0x10a/0x149 [ 2252.062229] should_failslab+0xd6/0x130 [ 2252.066211] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2252.070875] device_add+0xd72/0x15c0 [ 2252.074590] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2252.080035] ? kfree_const+0x33/0x40 [ 2252.083759] ? device_is_dependent+0x2a0/0x2a0 [ 2252.088316] ? kfree+0x1f0/0x250 [ 2252.091662] device_create_groups_vargs+0x1dc/0x250 [ 2252.096658] device_create_vargs+0x3a/0x50 [ 2252.100941] bdi_register_va.part.0+0x35/0x650 [ 2252.105502] bdi_register_va+0x63/0x80 [ 2252.109392] super_setup_bdi_name+0x123/0x220 [ 2252.113870] ? kill_block_super+0xe0/0xe0 [ 2252.117997] ? do_raw_spin_unlock+0x164/0x220 [ 2252.122474] fuse_fill_super+0x937/0x15c0 [ 2252.126617] ? fuse_get_root_inode+0xc0/0xc0 [ 2252.131018] ? up_write+0x17/0x60 [ 2252.134461] ? register_shrinker+0x15f/0x220 [ 2252.138855] ? sget_userns+0x768/0xc10 [ 2252.142728] ? get_anon_bdev+0x1c0/0x1c0 [ 2252.146771] ? sget+0xd9/0x110 [ 2252.149946] ? fuse_get_root_inode+0xc0/0xc0 [ 2252.154341] mount_nodev+0x4c/0xf0 [ 2252.157859] mount_fs+0x92/0x2a0 [ 2252.161204] vfs_kern_mount.part.0+0x5b/0x470 [ 2252.165677] do_mount+0xe65/0x2a30 [ 2252.169196] ? __do_page_fault+0x159/0xad0 [ 2252.173409] ? retint_kernel+0x2d/0x2d [ 2252.177273] ? copy_mount_string+0x40/0x40 [ 2252.181491] ? memset+0x20/0x40 [ 2252.184756] ? copy_mount_options+0x1fa/0x2f0 [ 2252.189238] ? copy_mnt_ns+0xa30/0xa30 [ 2252.193104] SyS_mount+0xa8/0x120 [ 2252.196534] ? copy_mnt_ns+0xa30/0xa30 [ 2252.200408] do_syscall_64+0x1d5/0x640 [ 2252.204283] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2252.209447] RIP: 0033:0x7f53dd92e73a [ 2252.213132] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2252.220818] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2252.228062] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2252.235321] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:32 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x5, 0x0, {0x0, 0x1, 0x7, 0x3}}, 0x30) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="ded2"]) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2252.242568] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2252.249816] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:33 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r1, {0x400}}, 0x18) 03:06:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 31) 03:06:33 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x9d830a664269096d, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000200)={0x10, 0x0, r5}, 0x10) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x8}}, 0x18) write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, r2, {0x0, 0x5, 0x0, {0x2, 0x0, 0x80000000, 0x4, 0x7, 0x5, 0x401, 0x3f, 0x9, 0x6000, 0x9, 0xee01, 0xee00, 0xfffffff7, 0x4}}}, 0x78) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2252.555564] FAULT_INJECTION: forcing a failure. [ 2252.555564] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.575382] CPU: 1 PID: 18793 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2252.583282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2252.592631] Call Trace: [ 2252.595219] dump_stack+0x1b2/0x281 [ 2252.598849] should_fail.cold+0x10a/0x149 [ 2252.602999] should_failslab+0xd6/0x130 [ 2252.606966] __kmalloc_track_caller+0x2bc/0x400 [ 2252.611614] ? kstrdup_const+0x35/0x60 [ 2252.615481] kstrdup+0x36/0x70 [ 2252.618667] kstrdup_const+0x35/0x60 [ 2252.622373] __kernfs_new_node+0x2e/0x470 [ 2252.626516] kernfs_create_dir_ns+0x8c/0x200 [ 2252.630902] sysfs_create_dir_ns+0xb7/0x1d0 [ 2252.635202] kobject_add_internal+0x28b/0x930 [ 2252.639687] kobject_add+0x11f/0x180 [ 2252.643389] ? kset_create_and_add+0x190/0x190 [ 2252.647963] device_add+0x33f/0x15c0 [ 2252.651657] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2252.657085] ? kfree_const+0x33/0x40 [ 2252.660790] ? device_is_dependent+0x2a0/0x2a0 [ 2252.665360] ? kfree+0x1f0/0x250 [ 2252.668707] device_create_groups_vargs+0x1dc/0x250 [ 2252.673706] device_create_vargs+0x3a/0x50 [ 2252.677920] bdi_register_va.part.0+0x35/0x650 [ 2252.682494] bdi_register_va+0x63/0x80 [ 2252.686367] super_setup_bdi_name+0x123/0x220 [ 2252.690840] ? kill_block_super+0xe0/0xe0 [ 2252.694975] ? do_raw_spin_unlock+0x164/0x220 [ 2252.699460] fuse_fill_super+0x937/0x15c0 [ 2252.703589] ? fuse_get_root_inode+0xc0/0xc0 [ 2252.707977] ? up_write+0x17/0x60 [ 2252.711412] ? register_shrinker+0x15f/0x220 [ 2252.715797] ? sget_userns+0x768/0xc10 [ 2252.719663] ? get_anon_bdev+0x1c0/0x1c0 [ 2252.723713] ? sget+0xd9/0x110 [ 2252.726887] ? fuse_get_root_inode+0xc0/0xc0 [ 2252.731285] mount_nodev+0x4c/0xf0 [ 2252.734816] mount_fs+0x92/0x2a0 [ 2252.738161] vfs_kern_mount.part.0+0x5b/0x470 [ 2252.742673] do_mount+0xe65/0x2a30 [ 2252.746202] ? __do_page_fault+0x159/0xad0 [ 2252.750413] ? retint_kernel+0x2d/0x2d [ 2252.754278] ? copy_mount_string+0x40/0x40 [ 2252.758494] ? memset+0x20/0x40 [ 2252.761759] ? copy_mount_options+0x1fa/0x2f0 [ 2252.766242] ? copy_mnt_ns+0xa30/0xa30 [ 2252.770121] SyS_mount+0xa8/0x120 [ 2252.773560] ? copy_mnt_ns+0xa30/0xa30 [ 2252.777424] do_syscall_64+0x1d5/0x640 [ 2252.781303] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2252.786481] RIP: 0033:0x7f53dd92e73a [ 2252.790213] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2252.797899] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:33 executing program 2: getresgid(0x0, 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) [ 2252.805146] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2252.812393] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2252.819638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2252.826885] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) setsockopt$MRT_PIM(r1, 0x0, 0xcf, &(0x7f0000000000)=0x3, 0x4) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 32) [ 2252.850433] kobject_add_internal failed for 0:59 (error: -12 parent: bdi) [ 2252.921365] FAULT_INJECTION: forcing a failure. [ 2252.921365] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.952560] CPU: 1 PID: 18819 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2252.960469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2252.969816] Call Trace: [ 2252.972401] dump_stack+0x1b2/0x281 [ 2252.976029] should_fail.cold+0x10a/0x149 [ 2252.980181] should_failslab+0xd6/0x130 [ 2252.984162] kmem_cache_alloc+0x28e/0x3c0 [ 2252.988308] __kernfs_new_node+0x6f/0x470 [ 2252.992436] kernfs_new_node+0x7b/0xe0 [ 2252.996303] __kernfs_create_file+0x3d/0x320 [ 2253.000699] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2253.005357] device_create_file+0xc8/0x100 [ 2253.009571] ? acpi_platform_notify_remove+0x1f0/0x1f0 [ 2253.014826] device_add+0x37a/0x15c0 [ 2253.018520] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2253.023948] ? kfree_const+0x33/0x40 [ 2253.027642] ? device_is_dependent+0x2a0/0x2a0 [ 2253.032210] ? kfree+0x1f0/0x250 [ 2253.035565] device_create_groups_vargs+0x1dc/0x250 [ 2253.040568] device_create_vargs+0x3a/0x50 [ 2253.044788] bdi_register_va.part.0+0x35/0x650 [ 2253.049349] bdi_register_va+0x63/0x80 [ 2253.053221] super_setup_bdi_name+0x123/0x220 [ 2253.057707] ? kill_block_super+0xe0/0xe0 [ 2253.061842] ? do_raw_spin_unlock+0x164/0x220 [ 2253.066318] fuse_fill_super+0x937/0x15c0 [ 2253.070452] ? fuse_get_root_inode+0xc0/0xc0 [ 2253.074870] ? up_write+0x17/0x60 [ 2253.078301] ? register_shrinker+0x15f/0x220 [ 2253.082689] ? sget_userns+0x768/0xc10 [ 2253.086567] ? get_anon_bdev+0x1c0/0x1c0 [ 2253.090619] ? sget+0xd9/0x110 [ 2253.093813] ? fuse_get_root_inode+0xc0/0xc0 [ 2253.098197] mount_nodev+0x4c/0xf0 [ 2253.101718] mount_fs+0x92/0x2a0 [ 2253.105071] vfs_kern_mount.part.0+0x5b/0x470 [ 2253.109544] do_mount+0xe65/0x2a30 [ 2253.113065] ? __do_page_fault+0x159/0xad0 [ 2253.117281] ? retint_kernel+0x2d/0x2d [ 2253.121162] ? copy_mount_string+0x40/0x40 [ 2253.125382] ? memset+0x20/0x40 [ 2253.128644] ? copy_mount_options+0x1fa/0x2f0 [ 2253.133116] ? copy_mnt_ns+0xa30/0xa30 [ 2253.136993] SyS_mount+0xa8/0x120 [ 2253.140432] ? copy_mnt_ns+0xa30/0xa30 [ 2253.144304] do_syscall_64+0x1d5/0x640 [ 2253.148173] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2253.153344] RIP: 0033:0x7f53dd92e73a [ 2253.157031] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2253.164728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:33 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 33) 03:06:33 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2253.171981] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2253.179234] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2253.186510] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2253.193765] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2253.243197] FAULT_INJECTION: forcing a failure. [ 2253.243197] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.254663] CPU: 0 PID: 18833 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2253.262547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2253.271897] Call Trace: [ 2253.274465] dump_stack+0x1b2/0x281 [ 2253.278071] should_fail.cold+0x10a/0x149 [ 2253.282210] should_failslab+0xd6/0x130 [ 2253.286168] kmem_cache_alloc+0x40/0x3c0 [ 2253.290216] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 2253.295832] ? idr_get_free_cmn+0x1d4/0x8d0 [ 2253.300141] idr_get_free_cmn+0x595/0x8d0 [ 2253.304273] idr_alloc_cmn+0xe8/0x1e0 [ 2253.308051] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 2253.312872] ? fs_reclaim_release+0xd0/0x110 [ 2253.317255] ? fs_reclaim_release+0xd0/0x110 [ 2253.321640] idr_alloc_cyclic+0xc2/0x1d0 [ 2253.325678] ? idr_alloc_cmn+0x1e0/0x1e0 [ 2253.329717] ? __radix_tree_preload+0x1c3/0x250 [ 2253.334371] __kernfs_new_node+0xaf/0x470 [ 2253.338494] kernfs_create_dir_ns+0x8c/0x200 [ 2253.342893] sysfs_create_dir_ns+0xb7/0x1d0 [ 2253.347201] kobject_add_internal+0x28b/0x930 [ 2253.351685] kobject_add+0x11f/0x180 [ 2253.355387] ? kset_create_and_add+0x190/0x190 [ 2253.359966] device_add+0x33f/0x15c0 [ 2253.363663] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2253.369092] ? kfree_const+0x33/0x40 [ 2253.372780] ? device_is_dependent+0x2a0/0x2a0 [ 2253.377340] ? kfree+0x1f0/0x250 [ 2253.380685] device_create_groups_vargs+0x1dc/0x250 [ 2253.385679] device_create_vargs+0x3a/0x50 [ 2253.389895] bdi_register_va.part.0+0x35/0x650 [ 2253.394454] bdi_register_va+0x63/0x80 [ 2253.398404] super_setup_bdi_name+0x123/0x220 [ 2253.402872] ? kill_block_super+0xe0/0xe0 [ 2253.406996] ? do_raw_spin_unlock+0x164/0x220 [ 2253.411469] fuse_fill_super+0x937/0x15c0 [ 2253.415610] ? fuse_get_root_inode+0xc0/0xc0 [ 2253.419997] ? up_write+0x17/0x60 [ 2253.423441] ? register_shrinker+0x15f/0x220 [ 2253.427824] ? sget_userns+0x768/0xc10 [ 2253.431690] ? get_anon_bdev+0x1c0/0x1c0 [ 2253.435721] ? sget+0xd9/0x110 [ 2253.438913] ? fuse_get_root_inode+0xc0/0xc0 [ 2253.443304] mount_nodev+0x4c/0xf0 [ 2253.446821] mount_fs+0x92/0x2a0 [ 2253.450168] vfs_kern_mount.part.0+0x5b/0x470 [ 2253.454644] do_mount+0xe65/0x2a30 [ 2253.458165] ? __do_page_fault+0x159/0xad0 [ 2253.462373] ? retint_kernel+0x2d/0x2d [ 2253.466234] ? copy_mount_string+0x40/0x40 [ 2253.470450] ? memset+0x20/0x40 [ 2253.473711] ? copy_mount_options+0x1fa/0x2f0 [ 2253.478178] ? copy_mnt_ns+0xa30/0xa30 [ 2253.482040] SyS_mount+0xa8/0x120 [ 2253.485471] ? copy_mnt_ns+0xa30/0xa30 [ 2253.489335] do_syscall_64+0x1d5/0x640 [ 2253.493201] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2253.498364] RIP: 0033:0x7f53dd92e73a [ 2253.502049] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2253.509731] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2253.516976] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2253.524221] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2253.531467] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:34 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:34 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x9d830a664269096d, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000200)={0x10, 0x0, r5}, 0x10) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x8}}, 0x18) write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, r2, {0x0, 0x5, 0x0, {0x2, 0x0, 0x80000000, 0x4, 0x7, 0x5, 0x401, 0x3f, 0x9, 0x6000, 0x9, 0xee01, 0xee00, 0xfffffff7, 0x4}}}, 0x78) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x9d830a664269096d, 0x0) (async) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000080)) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020}, 0x2020) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002700)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r4, &(0x7f0000000200)={0x10, 0x0, r5}, 0x10) (async) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x8}}, 0x18) (async) write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, r2, {0x0, 0x5, 0x0, {0x2, 0x0, 0x80000000, 0x4, 0x7, 0x5, 0x401, 0x3f, 0x9, 0x6000, 0x9, 0xee01, 0xee00, 0xfffffff7, 0x4}}}, 0x78) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2253.538717] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 34) [ 2253.666492] FAULT_INJECTION: forcing a failure. [ 2253.666492] name failslab, interval 1, probability 0, space 0, times 0 [ 2253.684283] CPU: 0 PID: 18864 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2253.692175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2253.701509] Call Trace: [ 2253.704078] dump_stack+0x1b2/0x281 [ 2253.707696] should_fail.cold+0x10a/0x149 [ 2253.711831] should_failslab+0xd6/0x130 [ 2253.715793] kmem_cache_alloc+0x28e/0x3c0 [ 2253.719942] __kernfs_new_node+0x6f/0x470 [ 2253.724087] kernfs_new_node+0x7b/0xe0 [ 2253.727963] __kernfs_create_file+0x3d/0x320 [ 2253.732361] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2253.737019] device_create_file+0xc8/0x100 [ 2253.741240] ? acpi_platform_notify_remove+0x1f0/0x1f0 [ 2253.746504] device_add+0x37a/0x15c0 [ 2253.750203] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2253.755645] ? kfree_const+0x33/0x40 [ 2253.759342] ? device_is_dependent+0x2a0/0x2a0 [ 2253.763902] ? kfree+0x1f0/0x250 [ 2253.767253] device_create_groups_vargs+0x1dc/0x250 [ 2253.772252] device_create_vargs+0x3a/0x50 [ 2253.776478] bdi_register_va.part.0+0x35/0x650 [ 2253.781053] bdi_register_va+0x63/0x80 [ 2253.784929] super_setup_bdi_name+0x123/0x220 [ 2253.789407] ? kill_block_super+0xe0/0xe0 [ 2253.793541] ? do_raw_spin_unlock+0x164/0x220 [ 2253.798019] fuse_fill_super+0x937/0x15c0 [ 2253.802155] ? fuse_get_root_inode+0xc0/0xc0 [ 2253.806552] ? up_write+0x17/0x60 [ 2253.809991] ? register_shrinker+0x15f/0x220 [ 2253.814377] ? sget_userns+0x768/0xc10 [ 2253.818245] ? get_anon_bdev+0x1c0/0x1c0 [ 2253.822286] ? sget+0xd9/0x110 [ 2253.825470] ? fuse_get_root_inode+0xc0/0xc0 [ 2253.829864] mount_nodev+0x4c/0xf0 [ 2253.833413] mount_fs+0x92/0x2a0 [ 2253.836762] vfs_kern_mount.part.0+0x5b/0x470 [ 2253.841254] do_mount+0xe65/0x2a30 [ 2253.844788] ? __do_page_fault+0x159/0xad0 [ 2253.849011] ? retint_kernel+0x2d/0x2d [ 2253.852890] ? copy_mount_string+0x40/0x40 [ 2253.857114] ? memset+0x20/0x40 [ 2253.860391] ? copy_mount_options+0x1fa/0x2f0 [ 2253.864873] ? copy_mnt_ns+0xa30/0xa30 [ 2253.868748] SyS_mount+0xa8/0x120 [ 2253.872188] ? copy_mnt_ns+0xa30/0xa30 [ 2253.876056] do_syscall_64+0x1d5/0x640 [ 2253.879936] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2253.885121] RIP: 0033:0x7f53dd92e73a [ 2253.888817] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2253.896573] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2253.903825] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:34 executing program 2: getresgid(0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) 03:06:34 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x9d830a664269096d, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000080)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002700)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000200)={0x10, 0x0, r5}, 0x10) (async) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x8}}, 0x18) (async) write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, r2, {0x0, 0x5, 0x0, {0x2, 0x0, 0x80000000, 0x4, 0x7, 0x5, 0x401, 0x3f, 0x9, 0x6000, 0x9, 0xee01, 0xee00, 0xfffffff7, 0x4}}}, 0x78) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2253.911181] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2253.918428] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2253.925675] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 35) [ 2253.994009] FAULT_INJECTION: forcing a failure. [ 2253.994009] name failslab, interval 1, probability 0, space 0, times 0 [ 2254.016966] CPU: 0 PID: 18891 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2254.024865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2254.034240] Call Trace: [ 2254.036811] dump_stack+0x1b2/0x281 [ 2254.040422] should_fail.cold+0x10a/0x149 [ 2254.044590] should_failslab+0xd6/0x130 [ 2254.048546] __kmalloc_track_caller+0x2bc/0x400 [ 2254.053195] ? kstrdup_const+0x35/0x60 [ 2254.057058] kstrdup+0x36/0x70 [ 2254.060233] kstrdup_const+0x35/0x60 [ 2254.063924] __kernfs_new_node+0x2e/0x470 [ 2254.068050] kernfs_new_node+0x7b/0xe0 [ 2254.071911] kernfs_create_link+0x27/0x160 [ 2254.076122] sysfs_do_create_link_sd+0x90/0x120 [ 2254.080763] sysfs_create_link+0x5f/0xc0 [ 2254.084800] device_add+0x749/0x15c0 [ 2254.088490] ? kfree_const+0x33/0x40 [ 2254.092176] ? device_is_dependent+0x2a0/0x2a0 [ 2254.096728] ? kfree+0x1f0/0x250 [ 2254.100071] device_create_groups_vargs+0x1dc/0x250 [ 2254.105062] device_create_vargs+0x3a/0x50 [ 2254.109273] bdi_register_va.part.0+0x35/0x650 [ 2254.113834] bdi_register_va+0x63/0x80 [ 2254.117712] super_setup_bdi_name+0x123/0x220 [ 2254.122183] ? kill_block_super+0xe0/0xe0 [ 2254.126308] ? do_raw_spin_unlock+0x164/0x220 [ 2254.130781] fuse_fill_super+0x937/0x15c0 [ 2254.134905] ? fuse_get_root_inode+0xc0/0xc0 [ 2254.139294] ? up_write+0x17/0x60 [ 2254.142723] ? register_shrinker+0x15f/0x220 [ 2254.147103] ? sget_userns+0x768/0xc10 [ 2254.150966] ? get_anon_bdev+0x1c0/0x1c0 [ 2254.155015] ? sget+0xd9/0x110 [ 2254.158179] ? fuse_get_root_inode+0xc0/0xc0 [ 2254.162559] mount_nodev+0x4c/0xf0 [ 2254.166074] mount_fs+0x92/0x2a0 [ 2254.169418] vfs_kern_mount.part.0+0x5b/0x470 [ 2254.173888] do_mount+0xe65/0x2a30 [ 2254.177439] ? __do_page_fault+0x159/0xad0 [ 2254.181648] ? retint_kernel+0x2d/0x2d [ 2254.185508] ? copy_mount_string+0x40/0x40 [ 2254.189716] ? memset+0x20/0x40 [ 2254.192969] ? copy_mount_options+0x1fa/0x2f0 [ 2254.197441] ? copy_mnt_ns+0xa30/0xa30 [ 2254.201303] SyS_mount+0xa8/0x120 [ 2254.204742] ? copy_mnt_ns+0xa30/0xa30 [ 2254.208611] do_syscall_64+0x1d5/0x640 [ 2254.212480] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2254.217656] RIP: 0033:0x7f53dd92e73a [ 2254.221339] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2254.229023] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2254.236296] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:34 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 03:06:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 36) [ 2254.243546] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2254.250794] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2254.258038] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2254.292923] FAULT_INJECTION: forcing a failure. [ 2254.292923] name failslab, interval 1, probability 0, space 0, times 0 [ 2254.308064] CPU: 0 PID: 18903 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2254.315953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2254.325297] Call Trace: [ 2254.327885] dump_stack+0x1b2/0x281 [ 2254.331514] should_fail.cold+0x10a/0x149 [ 2254.335655] should_failslab+0xd6/0x130 [ 2254.339622] kmem_cache_alloc+0x28e/0x3c0 [ 2254.343764] __kernfs_new_node+0x6f/0x470 [ 2254.347913] kernfs_new_node+0x7b/0xe0 [ 2254.351788] kernfs_create_link+0x27/0x160 [ 2254.355999] sysfs_do_create_link_sd+0x90/0x120 [ 2254.360658] sysfs_create_link+0x5f/0xc0 [ 2254.364867] device_add+0x749/0x15c0 [ 2254.368559] ? kfree_const+0x33/0x40 [ 2254.372249] ? device_is_dependent+0x2a0/0x2a0 [ 2254.376806] ? kfree+0x1f0/0x250 [ 2254.380152] device_create_groups_vargs+0x1dc/0x250 [ 2254.385148] device_create_vargs+0x3a/0x50 [ 2254.389368] bdi_register_va.part.0+0x35/0x650 [ 2254.393939] bdi_register_va+0x63/0x80 [ 2254.397919] super_setup_bdi_name+0x123/0x220 [ 2254.402401] ? kill_block_super+0xe0/0xe0 [ 2254.406528] ? do_raw_spin_unlock+0x164/0x220 [ 2254.411005] fuse_fill_super+0x937/0x15c0 [ 2254.415133] ? fuse_get_root_inode+0xc0/0xc0 [ 2254.419516] ? up_write+0x17/0x60 [ 2254.422945] ? register_shrinker+0x15f/0x220 [ 2254.427330] ? sget_userns+0x768/0xc10 [ 2254.431208] ? get_anon_bdev+0x1c0/0x1c0 [ 2254.435251] ? sget+0xd9/0x110 [ 2254.438419] ? fuse_get_root_inode+0xc0/0xc0 [ 2254.442815] mount_nodev+0x4c/0xf0 [ 2254.446335] mount_fs+0x92/0x2a0 [ 2254.449678] vfs_kern_mount.part.0+0x5b/0x470 [ 2254.454146] do_mount+0xe65/0x2a30 [ 2254.457674] ? __do_page_fault+0x159/0xad0 [ 2254.461889] ? retint_kernel+0x2d/0x2d [ 2254.465754] ? copy_mount_string+0x40/0x40 [ 2254.469966] ? memset+0x20/0x40 [ 2254.473217] ? copy_mount_options+0x1fa/0x2f0 [ 2254.477688] ? copy_mnt_ns+0xa30/0xa30 [ 2254.481563] SyS_mount+0xa8/0x120 [ 2254.484987] ? copy_mnt_ns+0xa30/0xa30 [ 2254.488850] do_syscall_64+0x1d5/0x640 [ 2254.492735] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2254.497896] RIP: 0033:0x7f53dd92e73a [ 2254.501598] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2254.509372] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2254.516626] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2254.523868] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2254.531111] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, 0x0, {0x2, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:35 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 37) [ 2254.538356] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2254.594791] FAULT_INJECTION: forcing a failure. [ 2254.594791] name failslab, interval 1, probability 0, space 0, times 0 [ 2254.607694] CPU: 0 PID: 18922 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2254.615611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2254.624970] Call Trace: [ 2254.627556] dump_stack+0x1b2/0x281 [ 2254.631188] should_fail.cold+0x10a/0x149 [ 2254.635337] should_failslab+0xd6/0x130 [ 2254.639318] kmem_cache_alloc+0x28e/0x3c0 [ 2254.643466] __kernfs_new_node+0x6f/0x470 [ 2254.647616] kernfs_new_node+0x7b/0xe0 [ 2254.651492] __kernfs_create_file+0x3d/0x320 [ 2254.655878] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2254.660538] internal_create_group+0x22b/0x710 [ 2254.665112] sysfs_create_groups+0x92/0x130 [ 2254.669416] device_add+0x7e5/0x15c0 [ 2254.673108] ? kfree_const+0x33/0x40 [ 2254.676804] ? device_is_dependent+0x2a0/0x2a0 [ 2254.681369] ? kfree+0x1f0/0x250 [ 2254.684724] device_create_groups_vargs+0x1dc/0x250 [ 2254.689740] device_create_vargs+0x3a/0x50 [ 2254.693956] bdi_register_va.part.0+0x35/0x650 [ 2254.698517] bdi_register_va+0x63/0x80 [ 2254.702381] super_setup_bdi_name+0x123/0x220 [ 2254.706855] ? kill_block_super+0xe0/0xe0 [ 2254.710979] ? do_raw_spin_unlock+0x164/0x220 [ 2254.715453] fuse_fill_super+0x937/0x15c0 [ 2254.719577] ? fuse_get_root_inode+0xc0/0xc0 [ 2254.723963] ? up_write+0x17/0x60 [ 2254.727391] ? register_shrinker+0x15f/0x220 [ 2254.731776] ? sget_userns+0x768/0xc10 [ 2254.735646] ? get_anon_bdev+0x1c0/0x1c0 [ 2254.739680] ? sget+0xd9/0x110 [ 2254.742849] ? fuse_get_root_inode+0xc0/0xc0 [ 2254.747247] mount_nodev+0x4c/0xf0 [ 2254.750765] mount_fs+0x92/0x2a0 [ 2254.754109] vfs_kern_mount.part.0+0x5b/0x470 [ 2254.758585] do_mount+0xe65/0x2a30 [ 2254.762111] ? __do_page_fault+0x159/0xad0 [ 2254.766340] ? retint_kernel+0x2d/0x2d [ 2254.770204] ? copy_mount_string+0x40/0x40 [ 2254.774418] ? memset+0x20/0x40 [ 2254.777676] ? copy_mount_options+0x1fa/0x2f0 [ 2254.782147] ? copy_mnt_ns+0xa30/0xa30 [ 2254.786009] SyS_mount+0xa8/0x120 [ 2254.789449] ? copy_mnt_ns+0xa30/0xa30 [ 2254.793336] do_syscall_64+0x1d5/0x640 [ 2254.797202] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2254.802383] RIP: 0033:0x7f53dd92e73a [ 2254.806066] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2254.813768] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2254.821016] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2254.828260] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2254.835505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2254.842752] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 38) 03:06:35 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc14e8472f53cd428, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x7f}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@allow_other}, {@allow_other}], [{@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xc4'}}, {@uid_eq}, {@obj_type={'obj_type', 0x3d, '*'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}]}}) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmodn=00000000000000000100000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f746865722c7375626a5f726f6c653d40112e7b21ab245ddf2c272f2c2f297b252d2c646f6e745f61707072616973652c7569643e", @ANYRESDEC, @ANYBLOB="2c6f626a5f747970653d27a021b123212e2c00"]) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x40) 03:06:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2254.916348] FAULT_INJECTION: forcing a failure. [ 2254.916348] name failslab, interval 1, probability 0, space 0, times 0 [ 2254.952254] CPU: 1 PID: 18936 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 03:06:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2254.960162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2254.969511] Call Trace: [ 2254.972107] dump_stack+0x1b2/0x281 [ 2254.975741] should_fail.cold+0x10a/0x149 [ 2254.979892] should_failslab+0xd6/0x130 [ 2254.983865] kmem_cache_alloc+0x28e/0x3c0 [ 2254.988013] __kernfs_new_node+0x6f/0x470 [ 2254.992153] kernfs_new_node+0x7b/0xe0 [ 2254.996018] __kernfs_create_file+0x3d/0x320 [ 2255.000419] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2255.005089] internal_create_group+0x22b/0x710 [ 2255.009671] sysfs_create_groups+0x92/0x130 03:06:35 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x6}}, 0x18) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) read$FUSE(r1, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x6, 0x1, 0x4, 0x6, 0x1000, 0x8, {0x2, 0x9e, 0x100000000, 0x0, 0x23b, 0x4, 0x7, 0x708b, 0xfffffffb, 0x4000, 0x0, 0xee01, 0xee01, 0x6}}, {0x0, 0x1}}}, 0xa0) [ 2255.013992] device_add+0x7e5/0x15c0 [ 2255.017705] ? kfree_const+0x33/0x40 [ 2255.021416] ? device_is_dependent+0x2a0/0x2a0 [ 2255.025995] ? kfree+0x1f0/0x250 [ 2255.029364] device_create_groups_vargs+0x1dc/0x250 [ 2255.034375] device_create_vargs+0x3a/0x50 [ 2255.038608] bdi_register_va.part.0+0x35/0x650 [ 2255.043199] bdi_register_va+0x63/0x80 [ 2255.047089] super_setup_bdi_name+0x123/0x220 [ 2255.051580] ? kill_block_super+0xe0/0xe0 [ 2255.055726] ? do_raw_spin_unlock+0x164/0x220 [ 2255.060225] fuse_fill_super+0x937/0x15c0 [ 2255.064370] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.068776] ? up_write+0x17/0x60 [ 2255.072220] ? register_shrinker+0x15f/0x220 [ 2255.076624] ? sget_userns+0x768/0xc10 [ 2255.080514] ? get_anon_bdev+0x1c0/0x1c0 [ 2255.084566] ? sget+0xd9/0x110 [ 2255.087755] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.092151] mount_nodev+0x4c/0xf0 [ 2255.095680] mount_fs+0x92/0x2a0 [ 2255.099042] vfs_kern_mount.part.0+0x5b/0x470 [ 2255.103517] do_mount+0xe65/0x2a30 [ 2255.107035] ? __do_page_fault+0x159/0xad0 [ 2255.111248] ? retint_kernel+0x2d/0x2d 03:06:35 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 2255.115115] ? copy_mount_string+0x40/0x40 [ 2255.119339] ? memset+0x20/0x40 [ 2255.122612] ? copy_mount_options+0x1fa/0x2f0 [ 2255.127100] ? copy_mnt_ns+0xa30/0xa30 [ 2255.130972] SyS_mount+0xa8/0x120 [ 2255.134403] ? copy_mnt_ns+0xa30/0xa30 [ 2255.138279] do_syscall_64+0x1d5/0x640 [ 2255.142167] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2255.147347] RIP: 0033:0x7f53dd92e73a [ 2255.151048] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2255.158744] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:35 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 39) [ 2255.165996] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2255.173253] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2255.180517] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2255.187782] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2255.243147] FAULT_INJECTION: forcing a failure. [ 2255.243147] name failslab, interval 1, probability 0, space 0, times 0 [ 2255.254920] CPU: 1 PID: 18967 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2255.262793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2255.272139] Call Trace: [ 2255.274724] dump_stack+0x1b2/0x281 [ 2255.278342] should_fail.cold+0x10a/0x149 [ 2255.282484] should_failslab+0xd6/0x130 [ 2255.286444] kmem_cache_alloc+0x28e/0x3c0 [ 2255.290579] __kernfs_new_node+0x6f/0x470 [ 2255.294715] kernfs_new_node+0x7b/0xe0 [ 2255.298583] __kernfs_create_file+0x3d/0x320 [ 2255.302967] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2255.307619] internal_create_group+0x22b/0x710 [ 2255.312189] sysfs_create_groups+0x92/0x130 [ 2255.316496] device_add+0x7e5/0x15c0 [ 2255.320188] ? kfree_const+0x33/0x40 [ 2255.323880] ? device_is_dependent+0x2a0/0x2a0 [ 2255.328436] ? kfree+0x1f0/0x250 [ 2255.331791] device_create_groups_vargs+0x1dc/0x250 [ 2255.336795] device_create_vargs+0x3a/0x50 [ 2255.341016] bdi_register_va.part.0+0x35/0x650 [ 2255.345588] bdi_register_va+0x63/0x80 [ 2255.349462] super_setup_bdi_name+0x123/0x220 [ 2255.353939] ? kill_block_super+0xe0/0xe0 [ 2255.358064] ? do_raw_spin_unlock+0x164/0x220 [ 2255.362541] fuse_fill_super+0x937/0x15c0 [ 2255.366678] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.371080] ? up_write+0x17/0x60 [ 2255.374517] ? register_shrinker+0x15f/0x220 [ 2255.378902] ? sget_userns+0x768/0xc10 [ 2255.382772] ? get_anon_bdev+0x1c0/0x1c0 [ 2255.386806] ? sget+0xd9/0x110 03:06:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x3, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2255.389984] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.394376] mount_nodev+0x4c/0xf0 [ 2255.397903] mount_fs+0x92/0x2a0 [ 2255.401248] vfs_kern_mount.part.0+0x5b/0x470 [ 2255.405797] do_mount+0xe65/0x2a30 [ 2255.409340] ? __do_page_fault+0x159/0xad0 [ 2255.413558] ? retint_kernel+0x2d/0x2d [ 2255.417447] ? copy_mount_string+0x40/0x40 [ 2255.421683] ? memset+0x20/0x40 [ 2255.424954] ? copy_mount_options+0x1fa/0x2f0 [ 2255.429446] ? copy_mnt_ns+0xa30/0xa30 [ 2255.433322] SyS_mount+0xa8/0x120 [ 2255.436758] ? copy_mnt_ns+0xa30/0xa30 [ 2255.440625] do_syscall_64+0x1d5/0x640 [ 2255.444496] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2255.449672] RIP: 0033:0x7f53dd92e73a [ 2255.453372] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2255.461081] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2255.468327] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2255.475575] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2255.482826] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:36 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) [ 2255.490079] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 40) [ 2255.554012] FAULT_INJECTION: forcing a failure. [ 2255.554012] name failslab, interval 1, probability 0, space 0, times 0 [ 2255.577904] CPU: 1 PID: 18980 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2255.585805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2255.595152] Call Trace: [ 2255.597720] dump_stack+0x1b2/0x281 [ 2255.601352] should_fail.cold+0x10a/0x149 [ 2255.605482] should_failslab+0xd6/0x130 [ 2255.609441] kmem_cache_alloc+0x28e/0x3c0 [ 2255.613575] __kernfs_new_node+0x6f/0x470 [ 2255.617711] kernfs_new_node+0x7b/0xe0 [ 2255.621585] __kernfs_create_file+0x3d/0x320 [ 2255.625971] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2255.630620] internal_create_group+0x22b/0x710 [ 2255.635193] sysfs_create_groups+0x92/0x130 [ 2255.639496] device_add+0x7e5/0x15c0 [ 2255.643187] ? kfree_const+0x33/0x40 [ 2255.646875] ? device_is_dependent+0x2a0/0x2a0 [ 2255.651446] ? kfree+0x1f0/0x250 [ 2255.654792] device_create_groups_vargs+0x1dc/0x250 [ 2255.659789] device_create_vargs+0x3a/0x50 [ 2255.664004] bdi_register_va.part.0+0x35/0x650 [ 2255.668565] bdi_register_va+0x63/0x80 [ 2255.672431] super_setup_bdi_name+0x123/0x220 [ 2255.676901] ? kill_block_super+0xe0/0xe0 [ 2255.681036] ? do_raw_spin_unlock+0x164/0x220 [ 2255.685517] fuse_fill_super+0x937/0x15c0 [ 2255.689655] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.694062] ? up_write+0x17/0x60 [ 2255.697493] ? register_shrinker+0x15f/0x220 [ 2255.701877] ? sget_userns+0x768/0xc10 [ 2255.705754] ? get_anon_bdev+0x1c0/0x1c0 [ 2255.709789] ? sget+0xd9/0x110 [ 2255.712958] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.717340] mount_nodev+0x4c/0xf0 [ 2255.720857] mount_fs+0x92/0x2a0 [ 2255.724211] vfs_kern_mount.part.0+0x5b/0x470 [ 2255.728694] do_mount+0xe65/0x2a30 [ 2255.732213] ? __do_page_fault+0x159/0xad0 [ 2255.736428] ? retint_kernel+0x2d/0x2d [ 2255.740291] ? copy_mount_string+0x40/0x40 [ 2255.744517] ? memset+0x20/0x40 [ 2255.747772] ? copy_mount_options+0x1fa/0x2f0 [ 2255.752251] ? copy_mnt_ns+0xa30/0xa30 [ 2255.756126] SyS_mount+0xa8/0x120 [ 2255.759554] ? copy_mnt_ns+0xa30/0xa30 [ 2255.763418] do_syscall_64+0x1d5/0x640 [ 2255.767283] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2255.772449] RIP: 0033:0x7f53dd92e73a [ 2255.776139] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2255.783821] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2255.791069] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x2, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:36 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc14e8472f53cd428, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x7f}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@allow_other}, {@allow_other}], [{@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xc4'}}, {@uid_eq}, {@obj_type={'obj_type', 0x3d, '*'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}]}}) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmodn=00000000000000000100000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f746865722c7375626a5f726f6c653d40112e7b21ab245ddf2c272f2c2f297b252d2c646f6e745f61707072616973652c7569643e", @ANYRESDEC, @ANYBLOB="2c6f626a5f747970653d27a021b123212e2c00"]) (async) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x40) 03:06:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 41) [ 2255.798316] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2255.805565] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2255.812816] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2255.873261] FAULT_INJECTION: forcing a failure. [ 2255.873261] name failslab, interval 1, probability 0, space 0, times 0 [ 2255.886483] CPU: 1 PID: 18997 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2255.894373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2255.903721] Call Trace: [ 2255.906308] dump_stack+0x1b2/0x281 [ 2255.909936] should_fail.cold+0x10a/0x149 [ 2255.914087] should_failslab+0xd6/0x130 [ 2255.918066] kmem_cache_alloc+0x28e/0x3c0 [ 2255.922214] __kernfs_new_node+0x6f/0x470 [ 2255.926364] kernfs_create_dir_ns+0x8c/0x200 [ 2255.930770] internal_create_group+0xe9/0x710 [ 2255.935280] dpm_sysfs_add+0x21/0x1c0 [ 2255.939067] device_add+0x977/0x15c0 [ 2255.942943] ? device_is_dependent+0x2a0/0x2a0 [ 2255.947529] ? kfree+0x1f0/0x250 [ 2255.950874] device_create_groups_vargs+0x1dc/0x250 [ 2255.955885] device_create_vargs+0x3a/0x50 [ 2255.960107] bdi_register_va.part.0+0x35/0x650 [ 2255.964707] bdi_register_va+0x63/0x80 [ 2255.968573] super_setup_bdi_name+0x123/0x220 [ 2255.973053] ? kill_block_super+0xe0/0xe0 [ 2255.977186] ? do_raw_spin_unlock+0x164/0x220 [ 2255.981674] fuse_fill_super+0x937/0x15c0 [ 2255.985809] ? fuse_get_root_inode+0xc0/0xc0 [ 2255.990203] ? up_write+0x17/0x60 [ 2255.993638] ? register_shrinker+0x15f/0x220 [ 2255.998024] ? sget_userns+0x768/0xc10 [ 2256.001904] ? get_anon_bdev+0x1c0/0x1c0 [ 2256.005956] ? sget+0xd9/0x110 [ 2256.009135] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.013524] mount_nodev+0x4c/0xf0 [ 2256.017048] mount_fs+0x92/0x2a0 [ 2256.020400] vfs_kern_mount.part.0+0x5b/0x470 [ 2256.024880] do_mount+0xe65/0x2a30 [ 2256.028404] ? __do_page_fault+0x159/0xad0 [ 2256.032618] ? retint_kernel+0x2d/0x2d [ 2256.036482] ? copy_mount_string+0x40/0x40 [ 2256.040704] ? memset+0x20/0x40 [ 2256.043976] ? copy_mount_options+0x1fa/0x2f0 [ 2256.048458] ? copy_mnt_ns+0xa30/0xa30 [ 2256.052328] SyS_mount+0xa8/0x120 [ 2256.055768] ? copy_mnt_ns+0xa30/0xa30 [ 2256.059640] do_syscall_64+0x1d5/0x640 [ 2256.063529] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2256.068707] RIP: 0033:0x7f53dd92e73a 03:06:36 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x6, 0x0, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) 03:06:36 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x6}}, 0x18) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) read$FUSE(r1, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x6, 0x1, 0x4, 0x6, 0x1000, 0x8, {0x2, 0x9e, 0x100000000, 0x0, 0x23b, 0x4, 0x7, 0x708b, 0xfffffffb, 0x4000, 0x0, 0xee01, 0xee01, 0x6}}, {0x0, 0x1}}}, 0xa0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x6}}, 0x18) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r2, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f00000004c0)={0x2020}, 0x2020) (async) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x6, 0x1, 0x4, 0x6, 0x1000, 0x8, {0x2, 0x9e, 0x100000000, 0x0, 0x23b, 0x4, 0x7, 0x708b, 0xfffffffb, 0x4000, 0x0, 0xee01, 0xee01, 0x6}}, {0x0, 0x1}}}, 0xa0) (async) 03:06:36 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 42) 03:06:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x29, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2256.072406] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2256.080108] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2256.087367] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2256.094628] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2256.101882] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2256.109137] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2256.163083] FAULT_INJECTION: forcing a failure. [ 2256.163083] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.186339] CPU: 1 PID: 19013 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2256.194254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2256.203604] Call Trace: [ 2256.206188] dump_stack+0x1b2/0x281 [ 2256.209813] should_fail.cold+0x10a/0x149 [ 2256.213958] should_failslab+0xd6/0x130 [ 2256.217927] kmem_cache_alloc+0x28e/0x3c0 [ 2256.222072] __kernfs_new_node+0x6f/0x470 [ 2256.226219] kernfs_new_node+0x7b/0xe0 [ 2256.230106] __kernfs_create_file+0x3d/0x320 [ 2256.234517] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2256.239187] sysfs_merge_group+0xdc/0x200 [ 2256.243333] dpm_sysfs_add+0x122/0x1c0 [ 2256.247212] device_add+0x977/0x15c0 [ 2256.250921] ? device_is_dependent+0x2a0/0x2a0 [ 2256.255496] ? kfree+0x1f0/0x250 [ 2256.258879] device_create_groups_vargs+0x1dc/0x250 [ 2256.263896] device_create_vargs+0x3a/0x50 [ 2256.268115] bdi_register_va.part.0+0x35/0x650 [ 2256.272683] bdi_register_va+0x63/0x80 [ 2256.276551] super_setup_bdi_name+0x123/0x220 [ 2256.281026] ? kill_block_super+0xe0/0xe0 [ 2256.285151] ? do_raw_spin_unlock+0x164/0x220 [ 2256.289633] fuse_fill_super+0x937/0x15c0 [ 2256.293767] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.298171] ? up_write+0x17/0x60 [ 2256.301603] ? register_shrinker+0x15f/0x220 [ 2256.305999] ? sget_userns+0x768/0xc10 [ 2256.309879] ? get_anon_bdev+0x1c0/0x1c0 [ 2256.313919] ? sget+0xd9/0x110 [ 2256.317085] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.321475] mount_nodev+0x4c/0xf0 [ 2256.324997] mount_fs+0x92/0x2a0 [ 2256.328340] vfs_kern_mount.part.0+0x5b/0x470 [ 2256.332811] do_mount+0xe65/0x2a30 [ 2256.336338] ? __do_page_fault+0x159/0xad0 [ 2256.340562] ? retint_kernel+0x2d/0x2d [ 2256.344431] ? copy_mount_string+0x40/0x40 [ 2256.348743] ? memset+0x20/0x40 [ 2256.352024] ? copy_mount_options+0x1fa/0x2f0 [ 2256.356507] ? copy_mnt_ns+0xa30/0xa30 [ 2256.360375] SyS_mount+0xa8/0x120 03:06:37 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2256.363820] ? copy_mnt_ns+0xa30/0xa30 [ 2256.367697] do_syscall_64+0x1d5/0x640 [ 2256.371582] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2256.376748] RIP: 0033:0x7f53dd92e73a [ 2256.380431] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2256.388147] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2256.395402] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2256.402653] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0xffffff0b, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 43) [ 2256.409910] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2256.417164] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:37 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x6}}, 0x18) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r2, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000140)={0xa0, 0x0, r3, {{0x6, 0x1, 0x4, 0x6, 0x1000, 0x8, {0x2, 0x9e, 0x100000000, 0x0, 0x23b, 0x4, 0x7, 0x708b, 0xfffffffb, 0x4000, 0x0, 0xee01, 0xee01, 0x6}}, {0x0, 0x1}}}, 0xa0) [ 2256.473616] FAULT_INJECTION: forcing a failure. [ 2256.473616] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.486331] CPU: 1 PID: 19047 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2256.494217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2256.503565] Call Trace: [ 2256.506153] dump_stack+0x1b2/0x281 [ 2256.509782] should_fail.cold+0x10a/0x149 [ 2256.513932] should_failslab+0xd6/0x130 [ 2256.517910] kmem_cache_alloc+0x28e/0x3c0 [ 2256.522056] __kernfs_new_node+0x6f/0x470 [ 2256.526202] kernfs_new_node+0x7b/0xe0 [ 2256.530098] __kernfs_create_file+0x3d/0x320 [ 2256.534560] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2256.539205] sysfs_merge_group+0xdc/0x200 [ 2256.543333] dpm_sysfs_add+0x122/0x1c0 [ 2256.547214] device_add+0x977/0x15c0 [ 2256.550908] ? device_is_dependent+0x2a0/0x2a0 [ 2256.555464] ? kfree+0x1f0/0x250 [ 2256.558807] device_create_groups_vargs+0x1dc/0x250 [ 2256.563805] device_create_vargs+0x3a/0x50 [ 2256.568031] bdi_register_va.part.0+0x35/0x650 [ 2256.572604] bdi_register_va+0x63/0x80 [ 2256.576469] super_setup_bdi_name+0x123/0x220 [ 2256.580951] ? kill_block_super+0xe0/0xe0 [ 2256.585098] ? do_raw_spin_unlock+0x164/0x220 [ 2256.589580] fuse_fill_super+0x937/0x15c0 [ 2256.593710] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.598091] ? up_write+0x17/0x60 [ 2256.601526] ? register_shrinker+0x15f/0x220 [ 2256.605919] ? sget_userns+0x768/0xc10 [ 2256.609795] ? get_anon_bdev+0x1c0/0x1c0 [ 2256.613835] ? sget+0xd9/0x110 [ 2256.617007] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.621394] mount_nodev+0x4c/0xf0 [ 2256.624920] mount_fs+0x92/0x2a0 [ 2256.628278] vfs_kern_mount.part.0+0x5b/0x470 [ 2256.632749] do_mount+0xe65/0x2a30 [ 2256.636266] ? __do_page_fault+0x159/0xad0 [ 2256.640482] ? retint_kernel+0x2d/0x2d [ 2256.644353] ? copy_mount_string+0x40/0x40 [ 2256.648564] ? memset+0x20/0x40 [ 2256.651816] ? copy_mount_options+0x1fa/0x2f0 [ 2256.656284] ? copy_mnt_ns+0xa30/0xa30 [ 2256.660152] SyS_mount+0xa8/0x120 [ 2256.663586] ? copy_mnt_ns+0xa30/0xa30 [ 2256.667451] do_syscall_64+0x1d5/0x640 03:06:37 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0xc14e8472f53cd428, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x7f}}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x9}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@allow_other}, {@allow_other}], [{@permit_directio}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xc4'}}, {@uid_eq}, {@obj_type={'obj_type', 0x3d, '*'}}, {@obj_type={'obj_type', 0x3d, 'rootmode'}}]}}) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmodn=00000000000000000100000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c616c6c6f775f6f746865722c7375626a5f726f6c653d40112e7b21ab245ddf2c272f2c2f297b252d2c646f6e745f61707072616973652c7569643e", @ANYRESDEC, @ANYBLOB="2c6f626a5f747970653d27a021b123212e2c00"]) (async) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x40) [ 2256.671316] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2256.676499] RIP: 0033:0x7f53dd92e73a [ 2256.680190] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2256.687882] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2256.695125] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2256.702376] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2256.709636] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2256.716887] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 44) 03:06:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2256.789426] FAULT_INJECTION: forcing a failure. [ 2256.789426] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.803722] CPU: 0 PID: 19077 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2256.811611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2256.821399] Call Trace: [ 2256.823984] dump_stack+0x1b2/0x281 [ 2256.827611] should_fail.cold+0x10a/0x149 [ 2256.831754] should_failslab+0xd6/0x130 03:06:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2256.835780] kmem_cache_alloc+0x28e/0x3c0 [ 2256.839926] __kernfs_new_node+0x6f/0x470 [ 2256.844073] kernfs_new_node+0x7b/0xe0 [ 2256.847949] __kernfs_create_file+0x3d/0x320 [ 2256.852334] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2256.856979] sysfs_merge_group+0xdc/0x200 [ 2256.861104] dpm_sysfs_add+0x122/0x1c0 [ 2256.864976] device_add+0x977/0x15c0 [ 2256.868674] ? device_is_dependent+0x2a0/0x2a0 [ 2256.873229] ? kfree+0x1f0/0x250 [ 2256.876588] device_create_groups_vargs+0x1dc/0x250 [ 2256.881586] device_create_vargs+0x3a/0x50 [ 2256.885803] bdi_register_va.part.0+0x35/0x650 [ 2256.890371] bdi_register_va+0x63/0x80 [ 2256.894233] super_setup_bdi_name+0x123/0x220 [ 2256.898795] ? kill_block_super+0xe0/0xe0 [ 2256.902927] ? do_raw_spin_unlock+0x164/0x220 [ 2256.907417] fuse_fill_super+0x937/0x15c0 [ 2256.911549] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.915939] ? up_write+0x17/0x60 [ 2256.919376] ? register_shrinker+0x15f/0x220 [ 2256.923785] ? sget_userns+0x768/0xc10 [ 2256.927651] ? get_anon_bdev+0x1c0/0x1c0 [ 2256.931693] ? sget+0xd9/0x110 [ 2256.934874] ? fuse_get_root_inode+0xc0/0xc0 [ 2256.939258] mount_nodev+0x4c/0xf0 [ 2256.942775] mount_fs+0x92/0x2a0 [ 2256.946121] vfs_kern_mount.part.0+0x5b/0x470 [ 2256.950598] do_mount+0xe65/0x2a30 [ 2256.954117] ? __do_page_fault+0x159/0xad0 [ 2256.958327] ? retint_kernel+0x2d/0x2d [ 2256.962191] ? copy_mount_string+0x40/0x40 [ 2256.966414] ? memset+0x20/0x40 [ 2256.969667] ? copy_mount_options+0x1fa/0x2f0 [ 2256.974134] ? copy_mnt_ns+0xa30/0xa30 [ 2256.977995] SyS_mount+0xa8/0x120 [ 2256.981440] ? copy_mnt_ns+0xa30/0xa30 [ 2256.985302] do_syscall_64+0x1d5/0x640 [ 2256.989169] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2256.994334] RIP: 0033:0x7f53dd92e73a [ 2256.998037] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2257.005717] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2257.012979] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2257.020224] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2257.027470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:37 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x6, 0x0, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) 03:06:37 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 45) [ 2257.034719] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2257.096453] FAULT_INJECTION: forcing a failure. [ 2257.096453] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.108805] CPU: 1 PID: 19101 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2257.116700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2257.126069] Call Trace: [ 2257.128659] dump_stack+0x1b2/0x281 [ 2257.132285] should_fail.cold+0x10a/0x149 [ 2257.136436] should_failslab+0xd6/0x130 [ 2257.140412] kmem_cache_alloc+0x28e/0x3c0 [ 2257.144561] __kernfs_new_node+0x6f/0x470 [ 2257.148709] kernfs_new_node+0x7b/0xe0 [ 2257.152590] __kernfs_create_file+0x3d/0x320 [ 2257.156992] sysfs_add_file_mode_ns+0x1e1/0x450 [ 2257.161641] sysfs_merge_group+0xdc/0x200 [ 2257.165773] dpm_sysfs_add+0x122/0x1c0 [ 2257.169655] device_add+0x977/0x15c0 [ 2257.173352] ? device_is_dependent+0x2a0/0x2a0 [ 2257.177909] ? kfree+0x1f0/0x250 [ 2257.181266] device_create_groups_vargs+0x1dc/0x250 [ 2257.186270] device_create_vargs+0x3a/0x50 [ 2257.190494] bdi_register_va.part.0+0x35/0x650 [ 2257.195067] bdi_register_va+0x63/0x80 [ 2257.198941] super_setup_bdi_name+0x123/0x220 [ 2257.203427] ? kill_block_super+0xe0/0xe0 [ 2257.207561] ? do_raw_spin_unlock+0x164/0x220 [ 2257.212051] fuse_fill_super+0x937/0x15c0 [ 2257.216191] ? fuse_get_root_inode+0xc0/0xc0 [ 2257.220584] ? up_write+0x17/0x60 [ 2257.224018] ? register_shrinker+0x15f/0x220 [ 2257.228399] ? sget_userns+0x768/0xc10 [ 2257.232266] ? get_anon_bdev+0x1c0/0x1c0 [ 2257.236298] ? sget+0xd9/0x110 [ 2257.239480] ? fuse_get_root_inode+0xc0/0xc0 [ 2257.243872] mount_nodev+0x4c/0xf0 [ 2257.247392] mount_fs+0x92/0x2a0 [ 2257.250751] vfs_kern_mount.part.0+0x5b/0x470 [ 2257.255258] do_mount+0xe65/0x2a30 [ 2257.258777] ? __do_page_fault+0x159/0xad0 [ 2257.262990] ? retint_kernel+0x2d/0x2d [ 2257.266853] ? copy_mount_string+0x40/0x40 [ 2257.271072] ? memset+0x20/0x40 [ 2257.274335] ? copy_mount_options+0x1fa/0x2f0 [ 2257.278806] ? copy_mnt_ns+0xa30/0xa30 [ 2257.282668] SyS_mount+0xa8/0x120 [ 2257.286104] ? copy_mnt_ns+0xa30/0xa30 [ 2257.289984] do_syscall_64+0x1d5/0x640 03:06:38 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 46) [ 2257.293856] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2257.299019] RIP: 0033:0x7f53dd92e73a [ 2257.302707] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2257.310415] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2257.317667] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2257.324910] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2257.332154] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2257.339402] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2257.403225] FAULT_INJECTION: forcing a failure. [ 2257.403225] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.419219] CPU: 1 PID: 19123 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2257.427153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2257.436501] Call Trace: [ 2257.439066] dump_stack+0x1b2/0x281 [ 2257.442681] should_fail.cold+0x10a/0x149 [ 2257.446959] should_failslab+0xd6/0x130 [ 2257.450916] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2257.455564] ? dev_uevent_filter+0xd0/0xd0 [ 2257.459784] kobject_uevent_env+0x20c/0xf30 [ 2257.464090] ? wait_for_completion_io+0x10/0x10 [ 2257.468735] device_add+0xa47/0x15c0 [ 2257.472443] ? device_is_dependent+0x2a0/0x2a0 [ 2257.477013] ? kfree+0x1f0/0x250 [ 2257.480365] device_create_groups_vargs+0x1dc/0x250 [ 2257.485373] device_create_vargs+0x3a/0x50 [ 2257.489604] bdi_register_va.part.0+0x35/0x650 [ 2257.494168] bdi_register_va+0x63/0x80 [ 2257.498029] super_setup_bdi_name+0x123/0x220 [ 2257.502501] ? kill_block_super+0xe0/0xe0 [ 2257.506634] ? do_raw_spin_unlock+0x164/0x220 [ 2257.511119] fuse_fill_super+0x937/0x15c0 [ 2257.515249] ? fuse_get_root_inode+0xc0/0xc0 [ 2257.519639] ? up_write+0x17/0x60 [ 2257.523085] ? register_shrinker+0x15f/0x220 [ 2257.527466] ? sget_userns+0x768/0xc10 [ 2257.531333] ? get_anon_bdev+0x1c0/0x1c0 [ 2257.535367] ? sget+0xd9/0x110 [ 2257.538534] ? fuse_get_root_inode+0xc0/0xc0 [ 2257.542916] mount_nodev+0x4c/0xf0 [ 2257.546432] mount_fs+0x92/0x2a0 [ 2257.549783] vfs_kern_mount.part.0+0x5b/0x470 [ 2257.554261] do_mount+0xe65/0x2a30 [ 2257.557777] ? __do_page_fault+0x159/0xad0 [ 2257.561991] ? retint_kernel+0x2d/0x2d [ 2257.565853] ? copy_mount_string+0x40/0x40 [ 2257.570075] ? memset+0x20/0x40 [ 2257.573337] ? copy_mount_options+0x1fa/0x2f0 [ 2257.577806] ? copy_mnt_ns+0xa30/0xa30 [ 2257.581682] SyS_mount+0xa8/0x120 [ 2257.585149] ? copy_mnt_ns+0xa30/0xa30 [ 2257.589022] do_syscall_64+0x1d5/0x640 [ 2257.592890] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2257.598056] RIP: 0033:0x7f53dd92e73a 03:06:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x3f, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:38 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x2}}, 0x18) read$FUSE(r0, 0x0, 0x0) 03:06:38 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x3}}, 0x21) [ 2257.601747] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2257.609435] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2257.616678] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2257.623922] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2257.631176] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2257.638425] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 47) [ 2257.705124] FAULT_INJECTION: forcing a failure. [ 2257.705124] name failslab, interval 1, probability 0, space 0, times 0 [ 2257.717932] CPU: 1 PID: 19143 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2257.725805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2257.735141] Call Trace: [ 2257.737713] dump_stack+0x1b2/0x281 [ 2257.741332] should_fail.cold+0x10a/0x149 [ 2257.745471] should_failslab+0xd6/0x130 [ 2257.749427] kmem_cache_alloc_node+0x263/0x410 [ 2257.753999] __alloc_skb+0x5c/0x510 [ 2257.757610] kobject_uevent_env+0x882/0xf30 [ 2257.761931] device_add+0xa47/0x15c0 [ 2257.765634] ? device_is_dependent+0x2a0/0x2a0 [ 2257.770193] ? kfree+0x1f0/0x250 [ 2257.773540] device_create_groups_vargs+0x1dc/0x250 [ 2257.778531] device_create_vargs+0x3a/0x50 [ 2257.782757] bdi_register_va.part.0+0x35/0x650 [ 2257.787329] bdi_register_va+0x63/0x80 [ 2257.791195] super_setup_bdi_name+0x123/0x220 [ 2257.795679] ? kill_block_super+0xe0/0xe0 [ 2257.799813] ? do_raw_spin_unlock+0x164/0x220 [ 2257.804295] fuse_fill_super+0x937/0x15c0 [ 2257.808431] ? fuse_get_root_inode+0xc0/0xc0 [ 2257.812820] ? up_write+0x17/0x60 [ 2257.816254] ? register_shrinker+0x15f/0x220 [ 2257.820650] ? sget_userns+0x768/0xc10 [ 2257.824536] ? get_anon_bdev+0x1c0/0x1c0 [ 2257.828580] ? sget+0xd9/0x110 [ 2257.831753] ? fuse_get_root_inode+0xc0/0xc0 [ 2257.836138] mount_nodev+0x4c/0xf0 [ 2257.839666] mount_fs+0x92/0x2a0 [ 2257.843025] vfs_kern_mount.part.0+0x5b/0x470 [ 2257.847505] do_mount+0xe65/0x2a30 [ 2257.851038] ? __do_page_fault+0x159/0xad0 [ 2257.855255] ? retint_kernel+0x2d/0x2d [ 2257.859117] ? copy_mount_string+0x40/0x40 [ 2257.863340] ? memset+0x20/0x40 [ 2257.866621] ? copy_mount_options+0x1fa/0x2f0 [ 2257.871090] ? copy_mnt_ns+0xa30/0xa30 [ 2257.874949] SyS_mount+0xa8/0x120 [ 2257.878375] ? copy_mnt_ns+0xa30/0xa30 [ 2257.882249] do_syscall_64+0x1d5/0x640 [ 2257.886135] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2257.891305] RIP: 0033:0x7f53dd92e73a [ 2257.894992] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x6, 0x0, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x6, 0x0, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) (async) 03:06:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 48) 03:06:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8001, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2257.902689] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2257.909966] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2257.917212] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2257.924470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2257.931722] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2257.983069] FAULT_INJECTION: forcing a failure. [ 2257.983069] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.005432] CPU: 1 PID: 19158 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2258.013331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2258.022677] Call Trace: [ 2258.025262] dump_stack+0x1b2/0x281 [ 2258.028890] should_fail.cold+0x10a/0x149 [ 2258.033044] should_failslab+0xd6/0x130 [ 2258.037019] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2258.041689] ? dev_uevent_filter+0xd0/0xd0 [ 2258.045920] kobject_uevent_env+0x20c/0xf30 [ 2258.050242] ? wait_for_completion_io+0x10/0x10 [ 2258.054909] device_add+0xa47/0x15c0 [ 2258.058616] ? device_is_dependent+0x2a0/0x2a0 [ 2258.063192] ? kfree+0x1f0/0x250 [ 2258.066546] device_create_groups_vargs+0x1dc/0x250 [ 2258.071540] device_create_vargs+0x3a/0x50 [ 2258.075771] bdi_register_va.part.0+0x35/0x650 [ 2258.080345] bdi_register_va+0x63/0x80 [ 2258.084216] super_setup_bdi_name+0x123/0x220 [ 2258.088688] ? kill_block_super+0xe0/0xe0 [ 2258.092815] ? do_raw_spin_unlock+0x164/0x220 [ 2258.097295] fuse_fill_super+0x937/0x15c0 [ 2258.101438] ? fuse_get_root_inode+0xc0/0xc0 [ 2258.105854] ? up_write+0x17/0x60 [ 2258.109295] ? register_shrinker+0x15f/0x220 [ 2258.113695] ? sget_userns+0x768/0xc10 [ 2258.117583] ? get_anon_bdev+0x1c0/0x1c0 [ 2258.121631] ? sget+0xd9/0x110 [ 2258.124807] ? fuse_get_root_inode+0xc0/0xc0 [ 2258.129193] mount_nodev+0x4c/0xf0 [ 2258.132709] mount_fs+0x92/0x2a0 [ 2258.136064] vfs_kern_mount.part.0+0x5b/0x470 [ 2258.140552] do_mount+0xe65/0x2a30 [ 2258.144074] ? __do_page_fault+0x159/0xad0 [ 2258.148283] ? retint_kernel+0x2d/0x2d [ 2258.152145] ? copy_mount_string+0x40/0x40 [ 2258.156354] ? memset+0x20/0x40 [ 2258.159614] ? copy_mount_options+0x1fa/0x2f0 [ 2258.164093] ? copy_mnt_ns+0xa30/0xa30 [ 2258.167964] SyS_mount+0xa8/0x120 [ 2258.171401] ? copy_mnt_ns+0xa30/0xa30 [ 2258.175264] do_syscall_64+0x1d5/0x640 03:06:38 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2258.179130] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.184293] RIP: 0033:0x7f53dd92e73a [ 2258.187977] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2258.195660] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2258.202909] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2258.210165] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2258.217414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2258.224662] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:38 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 49) 03:06:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x4, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2258.278204] FAULT_INJECTION: forcing a failure. [ 2258.278204] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.291133] CPU: 1 PID: 19185 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2258.299016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2258.308357] Call Trace: [ 2258.310936] dump_stack+0x1b2/0x281 [ 2258.314551] should_fail.cold+0x10a/0x149 [ 2258.318675] should_failslab+0xd6/0x130 [ 2258.322644] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2258.327726] __kmalloc_node_track_caller+0x38/0x70 [ 2258.332634] __alloc_skb+0x96/0x510 [ 2258.336239] kobject_uevent_env+0x882/0xf30 [ 2258.340560] device_add+0xa47/0x15c0 [ 2258.344276] ? device_is_dependent+0x2a0/0x2a0 [ 2258.348842] ? kfree+0x1f0/0x250 [ 2258.352189] device_create_groups_vargs+0x1dc/0x250 [ 2258.357184] device_create_vargs+0x3a/0x50 [ 2258.361410] bdi_register_va.part.0+0x35/0x650 [ 2258.365977] bdi_register_va+0x63/0x80 [ 2258.369854] super_setup_bdi_name+0x123/0x220 [ 2258.374356] ? kill_block_super+0xe0/0xe0 [ 2258.378481] ? do_raw_spin_unlock+0x164/0x220 [ 2258.382965] fuse_fill_super+0x937/0x15c0 [ 2258.387092] ? fuse_get_root_inode+0xc0/0xc0 [ 2258.391482] ? up_write+0x17/0x60 [ 2258.394928] ? register_shrinker+0x15f/0x220 [ 2258.399314] ? sget_userns+0x768/0xc10 [ 2258.403194] ? get_anon_bdev+0x1c0/0x1c0 [ 2258.407237] ? sget+0xd9/0x110 [ 2258.410421] ? fuse_get_root_inode+0xc0/0xc0 [ 2258.414874] mount_nodev+0x4c/0xf0 [ 2258.418401] mount_fs+0x92/0x2a0 [ 2258.421767] vfs_kern_mount.part.0+0x5b/0x470 [ 2258.426260] do_mount+0xe65/0x2a30 [ 2258.429792] ? __do_page_fault+0x159/0xad0 [ 2258.434020] ? retint_kernel+0x2d/0x2d [ 2258.437886] ? copy_mount_string+0x40/0x40 [ 2258.442103] ? memset+0x20/0x40 [ 2258.445361] ? copy_mount_options+0x1fa/0x2f0 [ 2258.449837] ? copy_mnt_ns+0xa30/0xa30 [ 2258.453710] SyS_mount+0xa8/0x120 [ 2258.457137] ? copy_mnt_ns+0xa30/0xa30 [ 2258.461012] do_syscall_64+0x1d5/0x640 [ 2258.464905] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.470077] RIP: 0033:0x7f53dd92e73a 03:06:39 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async, rerun: 64) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x3}}, 0x21) (rerun: 64) 03:06:39 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x2}}, 0x18) (async) read$FUSE(r0, 0x0, 0x0) [ 2258.473773] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2258.481464] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2258.488720] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2258.495966] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2258.503215] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2258.510471] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 50) [ 2258.597110] FAULT_INJECTION: forcing a failure. [ 2258.597110] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.620591] CPU: 1 PID: 19213 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2258.628485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2258.637830] Call Trace: [ 2258.640418] dump_stack+0x1b2/0x281 03:06:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2258.644046] should_fail.cold+0x10a/0x149 [ 2258.648200] should_failslab+0xd6/0x130 [ 2258.652172] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2258.656840] ? dev_uevent_filter+0xd0/0xd0 [ 2258.661074] kobject_uevent_env+0x20c/0xf30 [ 2258.665395] ? wait_for_completion_io+0x10/0x10 [ 2258.670063] device_add+0xa47/0x15c0 [ 2258.673773] ? device_is_dependent+0x2a0/0x2a0 [ 2258.678348] ? kfree+0x1f0/0x250 [ 2258.681714] device_create_groups_vargs+0x1dc/0x250 [ 2258.686719] device_create_vargs+0x3a/0x50 [ 2258.690942] bdi_register_va.part.0+0x35/0x650 [ 2258.695509] bdi_register_va+0x63/0x80 [ 2258.699377] super_setup_bdi_name+0x123/0x220 [ 2258.703861] ? kill_block_super+0xe0/0xe0 [ 2258.707988] ? do_raw_spin_unlock+0x164/0x220 [ 2258.712474] fuse_fill_super+0x937/0x15c0 [ 2258.716616] ? fuse_get_root_inode+0xc0/0xc0 [ 2258.721019] ? up_write+0x17/0x60 [ 2258.724457] ? register_shrinker+0x15f/0x220 [ 2258.728843] ? sget_userns+0x768/0xc10 [ 2258.732730] ? get_anon_bdev+0x1c0/0x1c0 [ 2258.736766] ? sget+0xd9/0x110 [ 2258.739945] ? fuse_get_root_inode+0xc0/0xc0 [ 2258.744341] mount_nodev+0x4c/0xf0 [ 2258.747860] mount_fs+0x92/0x2a0 [ 2258.751218] vfs_kern_mount.part.0+0x5b/0x470 [ 2258.755700] do_mount+0xe65/0x2a30 [ 2258.759217] ? __do_page_fault+0x159/0xad0 [ 2258.763428] ? retint_kernel+0x2d/0x2d [ 2258.767295] ? copy_mount_string+0x40/0x40 [ 2258.771517] ? memset+0x20/0x40 [ 2258.774780] ? copy_mount_options+0x1fa/0x2f0 [ 2258.779276] ? copy_mnt_ns+0xa30/0xa30 [ 2258.783139] SyS_mount+0xa8/0x120 [ 2258.786568] ? copy_mnt_ns+0xa30/0xa30 [ 2258.790464] do_syscall_64+0x1d5/0x640 03:06:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0xa98000, 0x0) [ 2258.794341] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2258.799511] RIP: 0033:0x7f53dd92e73a [ 2258.803204] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2258.810890] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2258.818147] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2258.825404] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2258.832657] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2258.839917] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 51) [ 2258.915072] FAULT_INJECTION: forcing a failure. [ 2258.915072] name failslab, interval 1, probability 0, space 0, times 0 [ 2258.929950] CPU: 0 PID: 19232 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2258.937834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2258.947167] Call Trace: [ 2258.949743] dump_stack+0x1b2/0x281 [ 2258.953351] should_fail.cold+0x10a/0x149 [ 2258.957489] should_failslab+0xd6/0x130 [ 2258.961445] kmem_cache_alloc_node+0x263/0x410 [ 2258.966019] __alloc_skb+0x5c/0x510 [ 2258.969642] kobject_uevent_env+0x882/0xf30 [ 2258.973945] device_add+0xa47/0x15c0 [ 2258.977638] ? device_is_dependent+0x2a0/0x2a0 [ 2258.982206] ? kfree+0x1f0/0x250 [ 2258.985572] device_create_groups_vargs+0x1dc/0x250 [ 2258.990576] device_create_vargs+0x3a/0x50 [ 2258.994791] bdi_register_va.part.0+0x35/0x650 [ 2258.999351] bdi_register_va+0x63/0x80 [ 2259.003236] super_setup_bdi_name+0x123/0x220 [ 2259.007715] ? kill_block_super+0xe0/0xe0 [ 2259.011839] ? do_raw_spin_unlock+0x164/0x220 [ 2259.016323] fuse_fill_super+0x937/0x15c0 [ 2259.020455] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.024841] ? up_write+0x17/0x60 [ 2259.028270] ? register_shrinker+0x15f/0x220 [ 2259.032682] ? sget_userns+0x768/0xc10 [ 2259.036551] ? get_anon_bdev+0x1c0/0x1c0 [ 2259.040591] ? sget+0xd9/0x110 [ 2259.043768] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.048153] mount_nodev+0x4c/0xf0 [ 2259.051669] mount_fs+0x92/0x2a0 [ 2259.055015] vfs_kern_mount.part.0+0x5b/0x470 [ 2259.059498] do_mount+0xe65/0x2a30 [ 2259.063023] ? __do_page_fault+0x159/0xad0 [ 2259.067242] ? retint_kernel+0x2d/0x2d [ 2259.071116] ? copy_mount_string+0x40/0x40 [ 2259.075332] ? memset+0x20/0x40 [ 2259.078588] ? copy_mount_options+0x1fa/0x2f0 [ 2259.083057] ? copy_mnt_ns+0xa30/0xa30 [ 2259.086977] SyS_mount+0xa8/0x120 [ 2259.090413] ? copy_mnt_ns+0xa30/0xa30 [ 2259.094293] do_syscall_64+0x1d5/0x640 [ 2259.098166] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.103350] RIP: 0033:0x7f53dd92e73a [ 2259.107039] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:39 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:39 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 52) [ 2259.114724] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2259.121971] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2259.129232] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2259.136486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2259.143735] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2259.196225] FAULT_INJECTION: forcing a failure. [ 2259.196225] name failslab, interval 1, probability 0, space 0, times 0 [ 2259.210842] CPU: 1 PID: 19245 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2259.218739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2259.228088] Call Trace: [ 2259.230675] dump_stack+0x1b2/0x281 [ 2259.234303] should_fail.cold+0x10a/0x149 [ 2259.238430] should_failslab+0xd6/0x130 [ 2259.242390] kmem_cache_alloc_node+0x263/0x410 [ 2259.246963] __alloc_skb+0x5c/0x510 [ 2259.250569] kobject_uevent_env+0x882/0xf30 [ 2259.254873] device_add+0xa47/0x15c0 [ 2259.258571] ? device_is_dependent+0x2a0/0x2a0 [ 2259.263144] ? kfree+0x1f0/0x250 [ 2259.266499] device_create_groups_vargs+0x1dc/0x250 [ 2259.271495] device_create_vargs+0x3a/0x50 [ 2259.275711] bdi_register_va.part.0+0x35/0x650 [ 2259.280282] bdi_register_va+0x63/0x80 [ 2259.284162] super_setup_bdi_name+0x123/0x220 [ 2259.288649] ? kill_block_super+0xe0/0xe0 [ 2259.292819] ? do_raw_spin_unlock+0x164/0x220 [ 2259.297299] fuse_fill_super+0x937/0x15c0 [ 2259.301426] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.305810] ? up_write+0x17/0x60 [ 2259.309240] ? register_shrinker+0x15f/0x220 [ 2259.313625] ? sget_userns+0x768/0xc10 [ 2259.317492] ? get_anon_bdev+0x1c0/0x1c0 [ 2259.321529] ? sget+0xd9/0x110 [ 2259.324700] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.329087] mount_nodev+0x4c/0xf0 [ 2259.332609] mount_fs+0x92/0x2a0 [ 2259.335963] vfs_kern_mount.part.0+0x5b/0x470 [ 2259.340434] do_mount+0xe65/0x2a30 [ 2259.343956] ? __do_page_fault+0x159/0xad0 [ 2259.348167] ? retint_kernel+0x2d/0x2d [ 2259.352043] ? copy_mount_string+0x40/0x40 [ 2259.356265] ? memset+0x20/0x40 [ 2259.359531] ? copy_mount_options+0x1fa/0x2f0 [ 2259.364014] ? copy_mnt_ns+0xa30/0xa30 [ 2259.367882] SyS_mount+0xa8/0x120 [ 2259.371320] ? copy_mnt_ns+0xa30/0xa30 [ 2259.375194] do_syscall_64+0x1d5/0x640 [ 2259.379060] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.384225] RIP: 0033:0x7f53dd92e73a [ 2259.387910] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:40 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x2}}, 0x18) read$FUSE(r0, 0x0, 0x0) 03:06:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x21, 0x3, 0x0, {0x3}}, 0x21) 03:06:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 53) [ 2259.395594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2259.402847] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2259.410106] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2259.417360] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2259.424606] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2259.481296] FAULT_INJECTION: forcing a failure. [ 2259.481296] name failslab, interval 1, probability 0, space 0, times 0 [ 2259.493852] CPU: 1 PID: 19260 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2259.501728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2259.511067] Call Trace: [ 2259.513644] dump_stack+0x1b2/0x281 [ 2259.517276] should_fail.cold+0x10a/0x149 [ 2259.521414] should_failslab+0xd6/0x130 [ 2259.525376] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2259.530468] __kmalloc_node_track_caller+0x38/0x70 [ 2259.535389] __alloc_skb+0x96/0x510 [ 2259.539001] kobject_uevent_env+0x882/0xf30 [ 2259.543318] device_add+0xa47/0x15c0 [ 2259.547019] ? device_is_dependent+0x2a0/0x2a0 [ 2259.551586] ? kfree+0x1f0/0x250 [ 2259.554931] device_create_groups_vargs+0x1dc/0x250 [ 2259.559936] device_create_vargs+0x3a/0x50 [ 2259.564166] bdi_register_va.part.0+0x35/0x650 [ 2259.568733] bdi_register_va+0x63/0x80 [ 2259.572608] super_setup_bdi_name+0x123/0x220 [ 2259.577099] ? kill_block_super+0xe0/0xe0 [ 2259.581236] ? do_raw_spin_unlock+0x164/0x220 [ 2259.585720] fuse_fill_super+0x937/0x15c0 [ 2259.589858] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.594251] ? up_write+0x17/0x60 [ 2259.597683] ? register_shrinker+0x15f/0x220 [ 2259.602067] ? sget_userns+0x768/0xc10 [ 2259.605935] ? get_anon_bdev+0x1c0/0x1c0 [ 2259.609975] ? sget+0xd9/0x110 [ 2259.613149] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.617532] mount_nodev+0x4c/0xf0 [ 2259.621064] mount_fs+0x92/0x2a0 [ 2259.624427] vfs_kern_mount.part.0+0x5b/0x470 [ 2259.628909] do_mount+0xe65/0x2a30 [ 2259.632429] ? __do_page_fault+0x159/0xad0 [ 2259.636640] ? retint_kernel+0x2d/0x2d [ 2259.640517] ? copy_mount_string+0x40/0x40 [ 2259.644740] ? memset+0x20/0x40 [ 2259.647996] ? copy_mount_options+0x1fa/0x2f0 [ 2259.652466] ? copy_mnt_ns+0xa30/0xa30 [ 2259.656333] SyS_mount+0xa8/0x120 [ 2259.659771] ? copy_mnt_ns+0xa30/0xa30 [ 2259.663643] do_syscall_64+0x1d5/0x640 [ 2259.667511] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.672680] RIP: 0033:0x7f53dd92e73a 03:06:40 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0xa98000, 0x0) 03:06:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 54) [ 2259.676374] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2259.684058] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2259.691311] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2259.698567] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2259.705816] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2259.713067] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2259.768214] FAULT_INJECTION: forcing a failure. [ 2259.768214] name failslab, interval 1, probability 0, space 0, times 0 [ 2259.779628] CPU: 1 PID: 19277 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2259.787515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2259.796853] Call Trace: [ 2259.799432] dump_stack+0x1b2/0x281 [ 2259.803049] should_fail.cold+0x10a/0x149 [ 2259.807178] should_failslab+0xd6/0x130 [ 2259.811141] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2259.816234] __kmalloc_node_track_caller+0x38/0x70 [ 2259.821153] __alloc_skb+0x96/0x510 [ 2259.824765] kobject_uevent_env+0x882/0xf30 [ 2259.829068] device_add+0xa47/0x15c0 [ 2259.832784] ? device_is_dependent+0x2a0/0x2a0 [ 2259.837352] ? kfree+0x1f0/0x250 [ 2259.840700] device_create_groups_vargs+0x1dc/0x250 [ 2259.845705] device_create_vargs+0x3a/0x50 [ 2259.849935] bdi_register_va.part.0+0x35/0x650 [ 2259.854515] bdi_register_va+0x63/0x80 [ 2259.858386] super_setup_bdi_name+0x123/0x220 [ 2259.862873] ? kill_block_super+0xe0/0xe0 [ 2259.867005] ? do_raw_spin_unlock+0x164/0x220 [ 2259.871499] fuse_fill_super+0x937/0x15c0 [ 2259.875634] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.880039] ? up_write+0x17/0x60 [ 2259.883476] ? register_shrinker+0x15f/0x220 [ 2259.887878] ? sget_userns+0x768/0xc10 [ 2259.891755] ? get_anon_bdev+0x1c0/0x1c0 [ 2259.895798] ? sget+0xd9/0x110 [ 2259.898968] ? fuse_get_root_inode+0xc0/0xc0 [ 2259.903363] mount_nodev+0x4c/0xf0 [ 2259.906881] mount_fs+0x92/0x2a0 [ 2259.910239] vfs_kern_mount.part.0+0x5b/0x470 [ 2259.914728] do_mount+0xe65/0x2a30 [ 2259.918255] ? __do_page_fault+0x159/0xad0 [ 2259.922477] ? retint_kernel+0x2d/0x2d [ 2259.926352] ? copy_mount_string+0x40/0x40 [ 2259.930584] ? memset+0x20/0x40 [ 2259.933853] ? copy_mount_options+0x1fa/0x2f0 [ 2259.938335] ? copy_mnt_ns+0xa30/0xa30 [ 2259.942210] SyS_mount+0xa8/0x120 [ 2259.945648] ? copy_mnt_ns+0xa30/0xa30 [ 2259.949520] do_syscall_64+0x1d5/0x640 [ 2259.953407] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2259.958582] RIP: 0033:0x7f53dd92e73a 03:06:40 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2259.962270] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2259.969956] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2259.977216] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2259.984462] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2259.991719] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2259.998996] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 55) [ 2260.082451] FAULT_INJECTION: forcing a failure. [ 2260.082451] name failslab, interval 1, probability 0, space 0, times 0 [ 2260.093940] CPU: 1 PID: 19298 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2260.101812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2260.111145] Call Trace: [ 2260.113717] dump_stack+0x1b2/0x281 [ 2260.117325] should_fail.cold+0x10a/0x149 [ 2260.121454] should_failslab+0xd6/0x130 [ 2260.125407] kmem_cache_alloc_node+0x263/0x410 [ 2260.129979] __alloc_skb+0x5c/0x510 [ 2260.133593] kobject_uevent_env+0x882/0xf30 [ 2260.137893] device_add+0xa47/0x15c0 [ 2260.141582] ? device_is_dependent+0x2a0/0x2a0 [ 2260.146155] ? kfree+0x1f0/0x250 [ 2260.149512] device_create_groups_vargs+0x1dc/0x250 [ 2260.154523] device_create_vargs+0x3a/0x50 [ 2260.158736] bdi_register_va.part.0+0x35/0x650 [ 2260.163293] bdi_register_va+0x63/0x80 [ 2260.167155] super_setup_bdi_name+0x123/0x220 [ 2260.171632] ? kill_block_super+0xe0/0xe0 [ 2260.175763] ? do_raw_spin_unlock+0x164/0x220 [ 2260.180257] fuse_fill_super+0x937/0x15c0 [ 2260.184386] ? fuse_get_root_inode+0xc0/0xc0 [ 2260.188860] ? up_write+0x17/0x60 [ 2260.192295] ? register_shrinker+0x15f/0x220 [ 2260.196685] ? sget_userns+0x768/0xc10 [ 2260.200567] ? get_anon_bdev+0x1c0/0x1c0 [ 2260.204599] ? sget+0xd9/0x110 [ 2260.207768] ? fuse_get_root_inode+0xc0/0xc0 [ 2260.212151] mount_nodev+0x4c/0xf0 [ 2260.215666] mount_fs+0x92/0x2a0 [ 2260.219006] vfs_kern_mount.part.0+0x5b/0x470 [ 2260.223476] do_mount+0xe65/0x2a30 [ 2260.226990] ? __do_page_fault+0x159/0xad0 [ 2260.231206] ? retint_kernel+0x2d/0x2d [ 2260.235077] ? copy_mount_string+0x40/0x40 [ 2260.239295] ? memset+0x20/0x40 [ 2260.242557] ? copy_mount_options+0x1fa/0x2f0 [ 2260.247026] ? copy_mnt_ns+0xa30/0xa30 [ 2260.250902] SyS_mount+0xa8/0x120 [ 2260.254345] ? copy_mnt_ns+0xa30/0xa30 [ 2260.258216] do_syscall_64+0x1d5/0x640 [ 2260.262085] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2260.267251] RIP: 0033:0x7f53dd92e73a [ 2260.270944] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:40 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x35d5, 0xfffff000}}, 0x30) read$FUSE(r0, 0x0, 0x0) 03:06:40 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000040000,user\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0x0, r2, {0x6, 0x1, 0x5, 0x0, 0x4, 0x4, {0x2, 0x4, 0xc0, 0x5, 0xf7c, 0x0, 0x3ff, 0x6, 0x9, 0xa000, 0x6, 0xee00, r3, 0x80000001, 0xfffffffc}}}, 0x90) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 56) [ 2260.278642] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2260.285905] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2260.293168] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2260.300423] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2260.307680] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x458b, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:41 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000040000,user\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0x0, r2, {0x6, 0x1, 0x5, 0x0, 0x4, 0x4, {0x2, 0x4, 0xc0, 0x5, 0xf7c, 0x0, 0x3ff, 0x6, 0x9, 0xa000, 0x6, 0xee00, r3, 0x80000001, 0xfffffffc}}}, 0x90) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2260.375668] FAULT_INJECTION: forcing a failure. [ 2260.375668] name failslab, interval 1, probability 0, space 0, times 0 [ 2260.389245] CPU: 0 PID: 19313 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2260.397137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2260.406491] Call Trace: [ 2260.409059] dump_stack+0x1b2/0x281 [ 2260.412662] should_fail.cold+0x10a/0x149 [ 2260.416792] should_failslab+0xd6/0x130 [ 2260.420746] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2260.425829] __kmalloc_node_track_caller+0x38/0x70 [ 2260.430758] __alloc_skb+0x96/0x510 [ 2260.434364] kobject_uevent_env+0x882/0xf30 [ 2260.438666] device_add+0xa47/0x15c0 [ 2260.442357] ? device_is_dependent+0x2a0/0x2a0 [ 2260.446912] ? kfree+0x1f0/0x250 [ 2260.450260] device_create_groups_vargs+0x1dc/0x250 [ 2260.455254] device_create_vargs+0x3a/0x50 [ 2260.459467] bdi_register_va.part.0+0x35/0x650 [ 2260.464027] bdi_register_va+0x63/0x80 [ 2260.467906] super_setup_bdi_name+0x123/0x220 [ 2260.472384] ? kill_block_super+0xe0/0xe0 [ 2260.476506] ? do_raw_spin_unlock+0x164/0x220 [ 2260.480991] fuse_fill_super+0x937/0x15c0 [ 2260.485144] ? fuse_get_root_inode+0xc0/0xc0 [ 2260.489533] ? up_write+0x17/0x60 [ 2260.492962] ? register_shrinker+0x15f/0x220 [ 2260.497357] ? sget_userns+0x768/0xc10 [ 2260.501231] ? get_anon_bdev+0x1c0/0x1c0 [ 2260.505269] ? sget+0xd9/0x110 [ 2260.508436] ? fuse_get_root_inode+0xc0/0xc0 [ 2260.512820] mount_nodev+0x4c/0xf0 [ 2260.516343] mount_fs+0x92/0x2a0 [ 2260.519687] vfs_kern_mount.part.0+0x5b/0x470 [ 2260.524163] do_mount+0xe65/0x2a30 [ 2260.527685] ? __do_page_fault+0x159/0xad0 [ 2260.531896] ? retint_kernel+0x2d/0x2d [ 2260.535759] ? copy_mount_string+0x40/0x40 [ 2260.539983] ? memset+0x20/0x40 [ 2260.543255] ? copy_mount_options+0x1fa/0x2f0 [ 2260.547733] ? copy_mnt_ns+0xa30/0xa30 [ 2260.551598] SyS_mount+0xa8/0x120 [ 2260.555026] ? copy_mnt_ns+0xa30/0xa30 [ 2260.558891] do_syscall_64+0x1d5/0x640 [ 2260.562759] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2260.567931] RIP: 0033:0x7f53dd92e73a 03:06:41 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000040000,user\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0x0, r2, {0x6, 0x1, 0x5, 0x0, 0x4, 0x4, {0x2, 0x4, 0xc0, 0x5, 0xf7c, 0x0, 0x3ff, 0x6, 0x9, 0xa000, 0x6, 0xee00, r3, 0x80000001, 0xfffffffc}}}, 0x90) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000040000,user\x00'/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90, 0x0, r2, {0x6, 0x1, 0x5, 0x0, 0x4, 0x4, {0x2, 0x4, 0xc0, 0x5, 0xf7c, 0x0, 0x3ff, 0x6, 0x9, 0xa000, 0x6, 0xee00, r3, 0x80000001, 0xfffffffc}}}, 0x90) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:41 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) (async, rerun: 32) mount$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0xa98000, 0x0) (rerun: 32) [ 2260.571617] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2260.579314] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2260.586561] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2260.593807] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2260.601053] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2260.608299] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 57) 03:06:41 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, r2, {0x81, 0x4, 0x2, 0x13e}}, 0x20) [ 2260.705624] FAULT_INJECTION: forcing a failure. [ 2260.705624] name failslab, interval 1, probability 0, space 0, times 0 [ 2260.717144] CPU: 1 PID: 19342 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2260.725018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2260.734366] Call Trace: [ 2260.736960] dump_stack+0x1b2/0x281 [ 2260.740588] should_fail.cold+0x10a/0x149 [ 2260.744743] should_failslab+0xd6/0x130 [ 2260.748705] kmem_cache_alloc_node_trace+0x25a/0x400 [ 2260.753798] __kmalloc_node_track_caller+0x38/0x70 [ 2260.758738] __alloc_skb+0x96/0x510 [ 2260.762344] kobject_uevent_env+0x882/0xf30 [ 2260.766668] device_add+0xa47/0x15c0 [ 2260.770362] ? device_is_dependent+0x2a0/0x2a0 [ 2260.774920] ? kfree+0x1f0/0x250 [ 2260.778274] device_create_groups_vargs+0x1dc/0x250 [ 2260.783294] device_create_vargs+0x3a/0x50 [ 2260.787515] bdi_register_va.part.0+0x35/0x650 [ 2260.792086] bdi_register_va+0x63/0x80 [ 2260.795959] super_setup_bdi_name+0x123/0x220 [ 2260.800435] ? kill_block_super+0xe0/0xe0 [ 2260.804566] ? do_raw_spin_unlock+0x164/0x220 [ 2260.809050] fuse_fill_super+0x937/0x15c0 [ 2260.813191] ? fuse_get_root_inode+0xc0/0xc0 [ 2260.817583] ? up_write+0x17/0x60 [ 2260.821029] ? register_shrinker+0x15f/0x220 [ 2260.825427] ? sget_userns+0x768/0xc10 [ 2260.829311] ? get_anon_bdev+0x1c0/0x1c0 [ 2260.833351] ? sget+0xd9/0x110 [ 2260.836528] ? fuse_get_root_inode+0xc0/0xc0 [ 2260.840924] mount_nodev+0x4c/0xf0 [ 2260.844451] mount_fs+0x92/0x2a0 [ 2260.847795] vfs_kern_mount.part.0+0x5b/0x470 [ 2260.852269] do_mount+0xe65/0x2a30 03:06:41 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, 0x0, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2260.855786] ? __do_page_fault+0x159/0xad0 [ 2260.859996] ? retint_kernel+0x2d/0x2d [ 2260.863859] ? copy_mount_string+0x40/0x40 [ 2260.868073] ? memset+0x20/0x40 [ 2260.871332] ? copy_mount_options+0x1fa/0x2f0 [ 2260.875807] ? copy_mnt_ns+0xa30/0xa30 [ 2260.879687] SyS_mount+0xa8/0x120 [ 2260.883125] ? copy_mnt_ns+0xa30/0xa30 [ 2260.886990] do_syscall_64+0x1d5/0x640 [ 2260.890857] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2260.896020] RIP: 0033:0x7f53dd92e73a [ 2260.899705] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2260.907395] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2260.914650] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2260.921896] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2260.929144] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2260.936394] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 58) [ 2261.005800] FAULT_INJECTION: forcing a failure. [ 2261.005800] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.018037] CPU: 0 PID: 19364 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2261.025913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2261.035251] Call Trace: [ 2261.037821] dump_stack+0x1b2/0x281 [ 2261.041427] should_fail.cold+0x10a/0x149 [ 2261.045556] should_failslab+0xd6/0x130 [ 2261.049511] kmem_cache_alloc_node+0x263/0x410 [ 2261.054073] __alloc_skb+0x5c/0x510 [ 2261.057682] kobject_uevent_env+0x882/0xf30 [ 2261.062004] device_add+0xa47/0x15c0 [ 2261.065696] ? device_is_dependent+0x2a0/0x2a0 [ 2261.070305] ? kfree+0x1f0/0x250 [ 2261.073651] device_create_groups_vargs+0x1dc/0x250 [ 2261.078651] device_create_vargs+0x3a/0x50 [ 2261.082881] bdi_register_va.part.0+0x35/0x650 [ 2261.087450] bdi_register_va+0x63/0x80 [ 2261.091321] super_setup_bdi_name+0x123/0x220 [ 2261.095798] ? kill_block_super+0xe0/0xe0 [ 2261.099937] ? do_raw_spin_unlock+0x164/0x220 [ 2261.104421] fuse_fill_super+0x937/0x15c0 [ 2261.108559] ? fuse_get_root_inode+0xc0/0xc0 [ 2261.112946] ? up_write+0x17/0x60 [ 2261.116376] ? register_shrinker+0x15f/0x220 [ 2261.120757] ? sget_userns+0x768/0xc10 [ 2261.124643] ? get_anon_bdev+0x1c0/0x1c0 [ 2261.128690] ? sget+0xd9/0x110 [ 2261.131863] ? fuse_get_root_inode+0xc0/0xc0 [ 2261.136248] mount_nodev+0x4c/0xf0 [ 2261.139764] mount_fs+0x92/0x2a0 [ 2261.143110] vfs_kern_mount.part.0+0x5b/0x470 [ 2261.147593] do_mount+0xe65/0x2a30 [ 2261.151117] ? __do_page_fault+0x159/0xad0 [ 2261.155347] ? retint_kernel+0x2d/0x2d [ 2261.159215] ? copy_mount_string+0x40/0x40 [ 2261.163429] ? memset+0x20/0x40 [ 2261.166686] ? copy_mount_options+0x1fa/0x2f0 [ 2261.171153] ? copy_mnt_ns+0xa30/0xa30 [ 2261.175015] SyS_mount+0xa8/0x120 [ 2261.178449] ? copy_mnt_ns+0xa30/0xa30 [ 2261.182311] do_syscall_64+0x1d5/0x640 [ 2261.186174] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2261.191341] RIP: 0033:0x7f53dd92e73a [ 2261.195028] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:41 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x35d5, 0xfffff000}}, 0x30) (async) read$FUSE(r0, 0x0, 0x0) 03:06:41 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 59) [ 2261.202708] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2261.209952] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2261.217202] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2261.224452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2261.231699] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2261.306079] FAULT_INJECTION: forcing a failure. [ 2261.306079] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.322605] CPU: 1 PID: 19378 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2261.330507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2261.339862] Call Trace: [ 2261.342448] dump_stack+0x1b2/0x281 [ 2261.346071] should_fail.cold+0x10a/0x149 [ 2261.350220] should_failslab+0xd6/0x130 [ 2261.354193] kmem_cache_alloc_node+0x263/0x410 [ 2261.358775] __alloc_skb+0x5c/0x510 [ 2261.362399] kobject_uevent_env+0x882/0xf30 [ 2261.366720] device_add+0xa47/0x15c0 [ 2261.370428] ? device_is_dependent+0x2a0/0x2a0 [ 2261.375003] ? kfree+0x1f0/0x250 [ 2261.378368] device_create_groups_vargs+0x1dc/0x250 [ 2261.383378] device_create_vargs+0x3a/0x50 [ 2261.387614] bdi_register_va.part.0+0x35/0x650 [ 2261.392195] bdi_register_va+0x63/0x80 [ 2261.396074] super_setup_bdi_name+0x123/0x220 [ 2261.400560] ? kill_block_super+0xe0/0xe0 [ 2261.404703] ? do_raw_spin_unlock+0x164/0x220 [ 2261.409192] fuse_fill_super+0x937/0x15c0 [ 2261.413322] ? fuse_get_root_inode+0xc0/0xc0 [ 2261.417705] ? up_write+0x17/0x60 [ 2261.421136] ? register_shrinker+0x15f/0x220 [ 2261.425525] ? sget_userns+0x768/0xc10 [ 2261.429400] ? get_anon_bdev+0x1c0/0x1c0 [ 2261.433477] ? sget+0xd9/0x110 [ 2261.436658] ? fuse_get_root_inode+0xc0/0xc0 [ 2261.441049] mount_nodev+0x4c/0xf0 [ 2261.444578] mount_fs+0x92/0x2a0 [ 2261.447929] vfs_kern_mount.part.0+0x5b/0x470 [ 2261.452401] do_mount+0xe65/0x2a30 [ 2261.455920] ? __do_page_fault+0x159/0xad0 [ 2261.460135] ? retint_kernel+0x2d/0x2d [ 2261.464006] ? copy_mount_string+0x40/0x40 [ 2261.468218] ? memset+0x20/0x40 [ 2261.471472] ? copy_mount_options+0x1fa/0x2f0 [ 2261.475943] ? copy_mnt_ns+0xa30/0xa30 [ 2261.479908] SyS_mount+0xa8/0x120 [ 2261.483343] ? copy_mnt_ns+0xa30/0xa30 [ 2261.487206] do_syscall_64+0x1d5/0x640 [ 2261.491072] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2261.496243] RIP: 0033:0x7f53dd92e73a 03:06:42 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, r2, {0x81, 0x4, 0x2, 0x13e}}, 0x20) 03:06:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 60) [ 2261.499939] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2261.507637] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2261.514893] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2261.522138] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2261.529388] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2261.536637] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2261.611541] FAULT_INJECTION: forcing a failure. [ 2261.611541] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.627952] CPU: 0 PID: 19396 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2261.635851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2261.645205] Call Trace: [ 2261.647788] dump_stack+0x1b2/0x281 [ 2261.651415] should_fail.cold+0x10a/0x149 [ 2261.655566] should_failslab+0xd6/0x130 [ 2261.659535] kmem_cache_alloc_node+0x263/0x410 [ 2261.664112] __alloc_skb+0x5c/0x510 [ 2261.667738] kobject_uevent_env+0x882/0xf30 [ 2261.672055] device_add+0xa47/0x15c0 [ 2261.675789] ? device_is_dependent+0x2a0/0x2a0 [ 2261.680364] ? kfree+0x1f0/0x250 [ 2261.683730] device_create_groups_vargs+0x1dc/0x250 [ 2261.688742] device_create_vargs+0x3a/0x50 [ 2261.692980] bdi_register_va.part.0+0x35/0x650 [ 2261.697573] bdi_register_va+0x63/0x80 [ 2261.701453] super_setup_bdi_name+0x123/0x220 [ 2261.705941] ? kill_block_super+0xe0/0xe0 [ 2261.710082] ? do_raw_spin_unlock+0x164/0x220 [ 2261.714575] fuse_fill_super+0x937/0x15c0 [ 2261.718717] ? fuse_get_root_inode+0xc0/0xc0 [ 2261.723120] ? up_write+0x17/0x60 [ 2261.726556] ? register_shrinker+0x15f/0x220 [ 2261.730952] ? sget_userns+0x768/0xc10 [ 2261.734841] ? get_anon_bdev+0x1c0/0x1c0 [ 2261.738890] ? sget+0xd9/0x110 [ 2261.742073] ? fuse_get_root_inode+0xc0/0xc0 [ 2261.746482] mount_nodev+0x4c/0xf0 [ 2261.750015] mount_fs+0x92/0x2a0 [ 2261.753377] vfs_kern_mount.part.0+0x5b/0x470 [ 2261.757871] do_mount+0xe65/0x2a30 [ 2261.761406] ? __do_page_fault+0x159/0xad0 [ 2261.765632] ? retint_kernel+0x2d/0x2d [ 2261.769514] ? copy_mount_string+0x40/0x40 [ 2261.773741] ? memset+0x20/0x40 [ 2261.777011] ? copy_mount_options+0x1fa/0x2f0 [ 2261.781497] ? copy_mnt_ns+0xa30/0xa30 [ 2261.785378] SyS_mount+0xa8/0x120 [ 2261.788824] ? copy_mnt_ns+0xa30/0xa30 [ 2261.792712] do_syscall_64+0x1d5/0x640 [ 2261.796596] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2261.801775] RIP: 0033:0x7f53dd92e73a 03:06:42 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2261.805477] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2261.813176] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2261.820436] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2261.827694] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2261.834959] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2261.842222] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 61) [ 2261.935461] FAULT_INJECTION: forcing a failure. [ 2261.935461] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.946980] CPU: 1 PID: 19413 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2261.954861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2261.964207] Call Trace: [ 2261.966790] dump_stack+0x1b2/0x281 [ 2261.970418] should_fail.cold+0x10a/0x149 [ 2261.974564] should_failslab+0xd6/0x130 [ 2261.978533] kmem_cache_alloc_node+0x263/0x410 [ 2261.983113] __alloc_skb+0x5c/0x510 [ 2261.986734] kobject_uevent_env+0x882/0xf30 [ 2261.991052] device_add+0xa47/0x15c0 [ 2261.994757] ? device_is_dependent+0x2a0/0x2a0 [ 2261.999335] ? kfree+0x1f0/0x250 [ 2262.002696] device_create_groups_vargs+0x1dc/0x250 [ 2262.007708] device_create_vargs+0x3a/0x50 [ 2262.011937] bdi_register_va.part.0+0x35/0x650 [ 2262.016512] bdi_register_va+0x63/0x80 [ 2262.020396] super_setup_bdi_name+0x123/0x220 [ 2262.024887] ? kill_block_super+0xe0/0xe0 [ 2262.029027] ? do_raw_spin_unlock+0x164/0x220 [ 2262.033519] fuse_fill_super+0x937/0x15c0 [ 2262.037661] ? fuse_get_root_inode+0xc0/0xc0 [ 2262.042082] ? up_write+0x17/0x60 [ 2262.045528] ? register_shrinker+0x15f/0x220 [ 2262.049934] ? sget_userns+0x768/0xc10 [ 2262.053833] ? get_anon_bdev+0x1c0/0x1c0 [ 2262.057893] ? sget+0xd9/0x110 [ 2262.061092] ? fuse_get_root_inode+0xc0/0xc0 [ 2262.065494] mount_nodev+0x4c/0xf0 [ 2262.069028] mount_fs+0x92/0x2a0 [ 2262.072391] vfs_kern_mount.part.0+0x5b/0x470 [ 2262.076882] do_mount+0xe65/0x2a30 [ 2262.080422] ? __do_page_fault+0x159/0xad0 [ 2262.084650] ? retint_kernel+0x2d/0x2d [ 2262.088576] ? copy_mount_string+0x40/0x40 [ 2262.092808] ? memset+0x20/0x40 [ 2262.096087] ? copy_mount_options+0x1fa/0x2f0 [ 2262.100580] ? copy_mnt_ns+0xa30/0xa30 [ 2262.104466] SyS_mount+0xa8/0x120 [ 2262.108056] ? copy_mnt_ns+0xa30/0xa30 [ 2262.111940] do_syscall_64+0x1d5/0x640 [ 2262.115824] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2262.121005] RIP: 0033:0x7f53dd92e73a [ 2262.124709] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2262.132404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2262.139663] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2262.146930] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2262.154191] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2262.161448] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:42 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x35d5, 0xfffff000}}, 0x30) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) (async) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x35d5, 0xfffff000}}, 0x30) (async) read$FUSE(r0, 0x0, 0x0) (async) 03:06:42 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 62) 03:06:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2262.263644] FAULT_INJECTION: forcing a failure. [ 2262.263644] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.284534] CPU: 0 PID: 19428 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2262.292430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2262.301776] Call Trace: [ 2262.304361] dump_stack+0x1b2/0x281 [ 2262.307981] should_fail.cold+0x10a/0x149 [ 2262.312126] should_failslab+0xd6/0x130 [ 2262.316095] kmem_cache_alloc_node+0x263/0x410 [ 2262.320930] __alloc_skb+0x5c/0x510 [ 2262.324550] kobject_uevent_env+0x882/0xf30 [ 2262.328872] device_add+0xa47/0x15c0 [ 2262.332581] ? device_is_dependent+0x2a0/0x2a0 [ 2262.337182] ? kfree+0x1f0/0x250 [ 2262.340544] device_create_groups_vargs+0x1dc/0x250 [ 2262.345554] device_create_vargs+0x3a/0x50 [ 2262.349781] bdi_register_va.part.0+0x35/0x650 [ 2262.354372] bdi_register_va+0x63/0x80 [ 2262.358255] super_setup_bdi_name+0x123/0x220 [ 2262.362752] ? kill_block_super+0xe0/0xe0 [ 2262.366915] ? do_raw_spin_unlock+0x164/0x220 [ 2262.371411] fuse_fill_super+0x937/0x15c0 [ 2262.375555] ? fuse_get_root_inode+0xc0/0xc0 [ 2262.379957] ? up_write+0x17/0x60 [ 2262.383398] ? register_shrinker+0x15f/0x220 [ 2262.387797] ? sget_userns+0x768/0xc10 [ 2262.391683] ? get_anon_bdev+0x1c0/0x1c0 [ 2262.395735] ? sget+0xd9/0x110 [ 2262.398921] ? fuse_get_root_inode+0xc0/0xc0 [ 2262.403321] mount_nodev+0x4c/0xf0 [ 2262.406851] mount_fs+0x92/0x2a0 [ 2262.410209] vfs_kern_mount.part.0+0x5b/0x470 [ 2262.414692] do_mount+0xe65/0x2a30 [ 2262.418221] ? __do_page_fault+0x159/0xad0 [ 2262.422452] ? retint_kernel+0x2d/0x2d [ 2262.426330] ? copy_mount_string+0x40/0x40 [ 2262.430554] ? memset+0x20/0x40 [ 2262.433822] ? copy_mount_options+0x1fa/0x2f0 [ 2262.438309] ? copy_mnt_ns+0xa30/0xa30 [ 2262.442184] SyS_mount+0xa8/0x120 [ 2262.445626] ? copy_mnt_ns+0xa30/0xa30 [ 2262.449506] do_syscall_64+0x1d5/0x640 [ 2262.453389] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2262.458566] RIP: 0033:0x7f53dd92e73a 03:06:43 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, r2, {0x81, 0x4, 0x2, 0x13e}}, 0x20) 03:06:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 63) [ 2262.462259] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2262.469957] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2262.477213] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2262.484469] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2262.491726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2262.498985] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2262.576242] FAULT_INJECTION: forcing a failure. [ 2262.576242] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.607250] CPU: 0 PID: 19453 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2262.615156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2262.624504] Call Trace: [ 2262.627094] dump_stack+0x1b2/0x281 [ 2262.630717] should_fail.cold+0x10a/0x149 [ 2262.634866] should_failslab+0xd6/0x130 [ 2262.638835] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2262.643499] ? kobj_ns_drop+0x80/0x80 [ 2262.647295] call_usermodehelper_setup+0x73/0x2e0 [ 2262.652136] kobject_uevent_env+0xc21/0xf30 [ 2262.656458] device_add+0xa47/0x15c0 [ 2262.660165] ? device_is_dependent+0x2a0/0x2a0 [ 2262.664739] ? kfree+0x1f0/0x250 [ 2262.668106] device_create_groups_vargs+0x1dc/0x250 [ 2262.673120] device_create_vargs+0x3a/0x50 [ 2262.677352] bdi_register_va.part.0+0x35/0x650 [ 2262.681931] bdi_register_va+0x63/0x80 [ 2262.685806] super_setup_bdi_name+0x123/0x220 [ 2262.690295] ? kill_block_super+0xe0/0xe0 [ 2262.694436] ? do_raw_spin_unlock+0x164/0x220 [ 2262.698929] fuse_fill_super+0x937/0x15c0 [ 2262.703072] ? fuse_get_root_inode+0xc0/0xc0 [ 2262.707471] ? up_write+0x17/0x60 [ 2262.710911] ? register_shrinker+0x15f/0x220 [ 2262.715310] ? sget_userns+0x768/0xc10 [ 2262.719197] ? get_anon_bdev+0x1c0/0x1c0 [ 2262.723248] ? sget+0xd9/0x110 [ 2262.726438] ? fuse_get_root_inode+0xc0/0xc0 [ 2262.730848] mount_nodev+0x4c/0xf0 [ 2262.734378] mount_fs+0x92/0x2a0 [ 2262.737739] vfs_kern_mount.part.0+0x5b/0x470 [ 2262.742228] do_mount+0xe65/0x2a30 [ 2262.745760] ? __do_page_fault+0x159/0xad0 [ 2262.749981] ? retint_kernel+0x2d/0x2d [ 2262.753857] ? copy_mount_string+0x40/0x40 [ 2262.758084] ? memset+0x20/0x40 [ 2262.761351] ? copy_mount_options+0x1fa/0x2f0 [ 2262.765833] ? copy_mnt_ns+0xa30/0xa30 [ 2262.769712] SyS_mount+0xa8/0x120 [ 2262.773152] ? copy_mnt_ns+0xa30/0xa30 [ 2262.777032] do_syscall_64+0x1d5/0x640 [ 2262.780914] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2262.786093] RIP: 0033:0x7f53dd92e73a [ 2262.789791] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2262.797486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2262.804743] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2262.812005] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2262.819267] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:43 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) 03:06:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 64) [ 2262.826535] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2262.905230] FAULT_INJECTION: forcing a failure. [ 2262.905230] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.923703] CPU: 0 PID: 19469 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2262.931595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2262.940939] Call Trace: [ 2262.943521] dump_stack+0x1b2/0x281 [ 2262.947147] should_fail.cold+0x10a/0x149 [ 2262.951294] should_failslab+0xd6/0x130 [ 2262.955270] kmem_cache_alloc_node+0x263/0x410 [ 2262.959848] __alloc_skb+0x5c/0x510 [ 2262.963469] kobject_uevent_env+0x882/0xf30 [ 2262.967788] device_add+0xa47/0x15c0 [ 2262.971496] ? device_is_dependent+0x2a0/0x2a0 [ 2262.976069] ? kfree+0x1f0/0x250 [ 2262.979427] device_create_groups_vargs+0x1dc/0x250 [ 2262.984442] device_create_vargs+0x3a/0x50 [ 2262.988673] bdi_register_va.part.0+0x35/0x650 [ 2262.993253] bdi_register_va+0x63/0x80 [ 2262.997134] super_setup_bdi_name+0x123/0x220 [ 2263.001622] ? kill_block_super+0xe0/0xe0 [ 2263.005764] ? do_raw_spin_unlock+0x164/0x220 [ 2263.010268] fuse_fill_super+0x937/0x15c0 [ 2263.014412] ? fuse_get_root_inode+0xc0/0xc0 [ 2263.018815] ? up_write+0x17/0x60 [ 2263.022265] ? register_shrinker+0x15f/0x220 [ 2263.026679] ? sget_userns+0x768/0xc10 [ 2263.030565] ? get_anon_bdev+0x1c0/0x1c0 [ 2263.034621] ? sget+0xd9/0x110 [ 2263.037806] ? fuse_get_root_inode+0xc0/0xc0 [ 2263.042204] mount_nodev+0x4c/0xf0 [ 2263.045739] mount_fs+0x92/0x2a0 [ 2263.049099] vfs_kern_mount.part.0+0x5b/0x470 [ 2263.053590] do_mount+0xe65/0x2a30 [ 2263.057125] ? __do_page_fault+0x159/0xad0 [ 2263.061349] ? retint_kernel+0x2d/0x2d [ 2263.065232] ? copy_mount_string+0x40/0x40 [ 2263.069466] ? memset+0x20/0x40 [ 2263.072739] ? copy_mount_options+0x1fa/0x2f0 [ 2263.077225] ? copy_mnt_ns+0xa30/0xa30 [ 2263.081108] SyS_mount+0xa8/0x120 [ 2263.084552] ? copy_mnt_ns+0xa30/0xa30 [ 2263.088428] do_syscall_64+0x1d5/0x640 [ 2263.092310] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2263.097484] RIP: 0033:0x7f53dd92e73a 03:06:43 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="99eb119577f5df7beec32eed118276fb", 0x10) 03:06:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 65) [ 2263.101178] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2263.108874] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2263.116133] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2263.123399] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2263.130658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2263.137917] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2263.226917] FAULT_INJECTION: forcing a failure. [ 2263.226917] name failslab, interval 1, probability 0, space 0, times 0 [ 2263.246515] CPU: 0 PID: 19486 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2263.254405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2263.263751] Call Trace: [ 2263.266333] dump_stack+0x1b2/0x281 [ 2263.269955] should_fail.cold+0x10a/0x149 [ 2263.274097] should_failslab+0xd6/0x130 [ 2263.278066] kmem_cache_alloc+0x28e/0x3c0 [ 2263.282206] __d_alloc+0x2a/0xa20 [ 2263.285649] ? d_lookup+0x172/0x220 [ 2263.289265] d_alloc+0x46/0x240 [ 2263.292540] __lookup_hash+0x101/0x270 [ 2263.296419] ? __inode_permission+0xcd/0x2f0 [ 2263.300817] lookup_one_len+0x279/0x3a0 [ 2263.304774] ? lookup_one_len_unlocked+0x410/0x410 [ 2263.309690] start_creating+0xb0/0x200 [ 2263.313558] debugfs_create_dir+0x1f/0x420 [ 2263.317770] bdi_register_va.part.0+0x1ad/0x650 [ 2263.322422] bdi_register_va+0x63/0x80 [ 2263.326310] super_setup_bdi_name+0x123/0x220 [ 2263.330789] ? kill_block_super+0xe0/0xe0 [ 2263.334918] ? do_raw_spin_unlock+0x164/0x220 [ 2263.339407] fuse_fill_super+0x937/0x15c0 [ 2263.343546] ? fuse_get_root_inode+0xc0/0xc0 [ 2263.347941] ? up_write+0x17/0x60 [ 2263.351403] ? register_shrinker+0x15f/0x220 [ 2263.355798] ? sget_userns+0x768/0xc10 [ 2263.359678] ? get_anon_bdev+0x1c0/0x1c0 [ 2263.363727] ? sget+0xd9/0x110 [ 2263.366907] ? fuse_get_root_inode+0xc0/0xc0 [ 2263.371306] mount_nodev+0x4c/0xf0 [ 2263.374834] mount_fs+0x92/0x2a0 [ 2263.378190] vfs_kern_mount.part.0+0x5b/0x470 [ 2263.382669] do_mount+0xe65/0x2a30 [ 2263.386188] ? __do_page_fault+0x159/0xad0 [ 2263.390417] ? retint_kernel+0x2d/0x2d [ 2263.394300] ? copy_mount_string+0x40/0x40 [ 2263.398525] ? memset+0x20/0x40 [ 2263.401787] ? copy_mount_options+0x1fa/0x2f0 [ 2263.406263] ? copy_mnt_ns+0xa30/0xa30 [ 2263.410127] SyS_mount+0xa8/0x120 [ 2263.413561] ? copy_mnt_ns+0xa30/0xa30 [ 2263.417446] do_syscall_64+0x1d5/0x640 [ 2263.421718] entry_SYSCALL_64_after_hwframe+0x46/0xbb 03:06:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2263.426892] RIP: 0033:0x7f53dd92e73a [ 2263.430593] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2263.438298] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2263.445584] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2263.452842] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2263.460095] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2263.467355] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:44 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) 03:06:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 66) [ 2263.583124] FAULT_INJECTION: forcing a failure. [ 2263.583124] name failslab, interval 1, probability 0, space 0, times 0 [ 2263.615442] CPU: 1 PID: 19505 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2263.623345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2263.632701] Call Trace: [ 2263.635287] dump_stack+0x1b2/0x281 [ 2263.638917] should_fail.cold+0x10a/0x149 [ 2263.643119] should_failslab+0xd6/0x130 [ 2263.647095] kmem_cache_alloc+0x28e/0x3c0 [ 2263.651241] __d_alloc+0x2a/0xa20 [ 2263.654693] ? d_lookup+0x172/0x220 [ 2263.658317] d_alloc+0x46/0x240 [ 2263.661592] __lookup_hash+0x101/0x270 [ 2263.665470] ? __inode_permission+0xcd/0x2f0 [ 2263.669873] lookup_one_len+0x279/0x3a0 [ 2263.673846] ? lookup_one_len_unlocked+0x410/0x410 [ 2263.678771] start_creating+0xb0/0x200 [ 2263.682651] __debugfs_create_file+0x4f/0x440 [ 2263.687138] ? debugfs_create_file+0x37/0x60 [ 2263.691541] bdi_register_va.part.0+0x1f4/0x650 [ 2263.696206] bdi_register_va+0x63/0x80 [ 2263.700089] super_setup_bdi_name+0x123/0x220 [ 2263.704579] ? kill_block_super+0xe0/0xe0 [ 2263.708722] ? do_raw_spin_unlock+0x164/0x220 [ 2263.713218] fuse_fill_super+0x937/0x15c0 [ 2263.717361] ? fuse_get_root_inode+0xc0/0xc0 [ 2263.721763] ? up_write+0x17/0x60 [ 2263.725207] ? register_shrinker+0x15f/0x220 [ 2263.729609] ? sget_userns+0x768/0xc10 03:06:44 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x6}}, 0x18) r1 = syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c56ed726f6f746d6f64653d3030303030300100000000000000303069", @ANYRESDEC=0x0, @ANYBLOB="2c5d726f63705f69643d7cd08d65d1b81e637d722961fcf390dd8b15abd3e6fc448c71e432879981b311de34847ed76d8afcfe6adfc6ec0eff01d5b215ff10a3799c097bc1f1e2b8a1d98e4eff", @ANYBLOB="c7d75afaac2e4f18add080af4ebb9ef5cbf40d5701c4bb6c836ac4b9f0f7dd452f919f9ee4e0ab74420cc626", @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000280)={0x0, r3, "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", "fb3d81c628240c7639a8de3b98f912121ea9d8220d9c1a13c6f61751a4b125fd2ebbfdc402edf1953aec558697fc4e04f7cf5e39d4343524a78be337297443e25c0eac76e5ada15ceaeff4f416ed5ba6f15beead8d26b100e2e5f16ab96b4532ab6561b2be19ce15168b375f5e4a17c9ce2a0a54603208cb2e1a237fbe2ace4a37fffd9018c12b028e25bb2605566f6a7c7251ae257ce93850277fe763f7ea59a6e4b89a3cb79b53d476b91b892bb501dbf27c286815a7f42512ad0169e1101cf243cdab76ec8632e490a81bb68c0baa3b5f0f5d73e7fc690fabfe9e96b45730ac1207a41675c22927692629a8d4c69189b597f752878ca90008af06eca123c40b9e639de082bcb9fc45602024b848084e2dd126785de49ecb1374633828de5e878d0a375c5297fc863d2dfe713e4402a4cfc9c85aeb5bc388fd8e3319a30453afc8f4c84d35bc78d3fa4742d9df3225e7e304ffdf0f6c16c85e85412bed44dcfb5e4374c5d9b1342b75a592682d63936ebf24e51f001f11e8657f9bae406727e964384e6970ba054acf027eb14ac408bb83a59a843cad7835754c853dc2980fad54027ecc7068e8e685bf65f5d7955784957ab7042ec07fdcf10aa44c2d08a245f1d63892b821817cd002f1e724015029450bc19a79b4eec7cb8b1379f2de3dd8fa067d9f012fe12fd0a5df9168eb5aa703a262aee8c9054b98467c00abfc75de784be80057bc885526465ce71a92fe4ea729ed512d1bdfd2fae62db04550cf6685aa34bcce9a1bac7c57d30341148f74b84080d1f868df4028714d42372be648783bdb9954a80fb1f0e876adeb8d50bcf88a41dd6b509599b67e4c5a22af2e6368aa2d23eb86a6bfa79a1e3a3e006285d3815111dfed782a43c649448e2a914e6c8326d2109659fd3deb1697fc455ff6489d0d829f9561902d072bf3f52d211667fa8b4725989867296962729969896a9b0190a47d714acdd8ef78d13b0941bde64738d0d343d70a145069ee64f6d6cd4f46366a9a834f9ca050c11bb56f385026d52482c67b421482f19069e95c5bb029a92cf989398008aeb709d77bc2923e609edf194a3c9e7b05b4d0a8b6acd7685aa1b4fda74ce29b0327b03ef73684421c52a0d9d760ff707b159dbabbf08b2f75e31e1cb838aac7aa1bed885a72c1a17b5d56f593218f496652192209c8b49cdf6f8e6226fda91760f6d417d0b098ee20956bc49a254ddbfad7a204a32bfe5b348e238b088a52ba340ad347189c87ef8f0bdea3a9dc73b5574237888990ce611835de122ed31e568c7004ba9c50f428ea10ea423e17695cd870e00b251b15051b67d99ab43b60f6ed6a9550b67564e8ae10c76956b19dbf726b58a535ce7801e1cb6739f0e42b3c89afffaa568ce03a059db0a7259fcd1f9f1f020ce0be2abcf6c15960303eb0b860082f5302f90aafb2a8759d62712005c714ade06dd34728b917a20dd9c9198f86a901fdb158f2c93e93336c1e29c9b39df40fd440485fc94eddec198dc528cbfb8f8f8f99f9c88636f3821f4b99677a6c8aac5673b519c544dd0b3fbf986c2890e352c51e7ea72de7c870e51fae53cf5ebdddeea9cfff40180de699df79f847c12787e85473918405694af2262436ce11070d155ca711403010dcd60c881c9c26a5846fb36fd9469df3cf32ba3d850f3f021ef048ec0cedb22cee5693d3b01fda25ca02ba537e7db0488ac5215afb07910ca4d35019fa38690021a757cedce185bcb0e7d0c71de584089e77cf49e26928a047fbefb68229d8131f4f3d8730fb26cb12f73902d492b681087ef8c8a6da21c37ac8bc8b64a6b1424df20eac3ef9f440e6e8e9af902d6ff2e87550b1d32de0ef9866f48726421075feceef6dc569045e10c5447998869f7360b395d0d9abbc8cf879ecf4a9f23062ed0c59cba216327561271806f4796324f7567c5d1471dc608c0972f6e602cf9cc51732024a56f70efcd5252d121b92b8e7bef9dfea735d5fe242d8e0a207672485032ad0ebe1e9ff8f68871d498c9d860670f79bd283ef40c88d37680bb9b62b56f5306455e505131aeea0e1db2c821df0887ce0aeabf67d296d2db9aeb30cd3d4934f73142f126453bc70d8098a4347a4ca83ca843423bd4539789e29351a631acd4beea06eda2d5be34be3de6d39c3555e66a6e3096c06d638134f07f0f9901cbcba59bf9444b713313d207413b678aca3a4ac6cb1654de61cb761b072f8d62bd8597ced5ddddf99eff2d5c22cdfc01c236ebd8c6588066af1836f358f47f8d391f246883ab3ecdffa73f6a35c9aa5004f7d7ad06a2be056cefa5f2fad910631d11f95ec9a1bde5e3d6164bf25960208e341fbb6e74b07e33c1d84f761f97fd2748321aae502ecee7b3ca167d8fbea44d19d924b586b9555031da1e38e6aa9c6c50963c462664206e60cdf96f381261175a48333b3a3e302c3be9f21f43a69b6d002742870d27d657ee0bf3db41c57c6fab8854125361f7aaf648118399a201db053a067abdaa82cf9a951e5c629ea96d50bd0fddf71f81da3cf58d09199271ae83217c5bd2e3609908c91ccb83984553d16b56150a0e98a644b3859de13d81f0372818df26e1534b6e3d446357a974efb223be615fe24db88a675fe9a3fff0f59aa9fb9b3309bfea4f35801ec104f77cb599820a9fd2db49c86d79d549fe7980efcbc73c5aa12c83f7e8b8c9e9f797c8282f3c3cd89b44453c488a6cf9a94d0f8510765ba465ccc28b6b60b96d4593267455dcc6771fb66db6fe694973ae8f69d9d3fa97dceccbd6e0a121b47b2610042231dd5a1c2f34b78ddf3e1658f473e4378eeda2bc2a0b927f1d1bab3ac2128b0b0ece785cfb5c03e5f83c6a5d9a25af0caa3662b25c68701cdae0eb6c0a190154c252356eca2356461b40b9cf17fdfc63960b603f38be7be84aa8553af8ab096c8e0c2bb3b58a4364a3a44d88c0d17a4b02be473b5f3a5fb3c54c29c26b7a2a3cef7b5b0afb34eac550c0a6198956499e9c3aac0425907276c84e2385e945d76ff8ea825b906d311f3fb48fa7d2d0c3125192d6460115ff2bdfbea54cd4c8b3dbb686ed912902e80a12efd8575cb52d6fe6f51a1ad23a3372987b48690b6b83fb6de6cedc0b14d5097eb45528fa7eb24adcd97805351f6d9d213422e3d3a3873186da9d55d249bb8ce39c0ac4ee4321fd810b8f17f2130addd9c187768982b7f3e2ed62532a6ddd6ace932b4327f96acd25bd2ea72be31fddfc65bc28f1d74f78316fcd2c17ac9a5a3b03d786086679a7910888a98f2894243f8a88cc302f5834a6d145ae7f64fa55ea59ebfbd665bb30af1519539a1d785f587ef612f5207cf2af2511a9230a20a7c558e5dbc4367f64336a29058dcacf7fe3bd2334b2e6b6f6ae6a31cb85ffdd7803d167c60787c8f8ec44cd75cc2975fa3c0b3817fd26b23e6866acd4eeb75aa2a16d9fd2cec4ffebe485adcee47461255e763781cc4c67512e4854fc688ac49ac2822f385a01063de6f919c89be5640a898d856a2067344bdce7795ae08ed7db16f68e216d54935308c3353e7266419435bd85f26ca66b5139cdd42a5c474f535846cb20c39907c87a4e81c81fece938db77f060d65e6db099fc343e6d899a1e3745d96ab85ba11362c93cb9f7ee9d3b7bef8efda60c98ab84eb14b7de46a6635245e38d302466d722498d7faa01d417619584be1e5160b9ff277204bfadf3608bc2dc8048a43d273911d76e11a316fb98a0c4efe4d58b31b678d8e328e400eac09d8c4b22bf5a5d020ea97a79f1e81820591c506110e45705180873000f9e19ae899408f97771c4ecaf920c1f3e6b2ffecb2ffb5cf901ef574f80a903df49c1e5f49fc0d815daf38bca5c7a9cdb018ce8f608088e3170ff186954ba35cd04a3cf1935584ae37985eea32d8a70dfaab789bc3352ea212049d9e6545e416a7054841e04d2b79a06525643d8a6548fb9d7ce90afd69c478475bf391a9cece4e657ed30a0faef98994a8a11f1695dcb26cb426a29bd1e4f9d37fe001f1f03b36b70d776b46d30d80a19a703f316cad9148034e9cc6d0fe82859c484aca7dd777c92aa9cd8bcb7791e86772dce9de7cf8bffd637fbce57881c7e87064def0aabfd420f6036dd566e7d2c4a3f22580bcd0840755969bc6a8af3f12e57ad18df7457c2721c54f2c62c41837c1e7ba280785ef698a49c9939767a20e9fe58b5063fe63088d4a6f431cc5d354970451e73c34f2d7f193952b79f0c896dbd95d27a6a53056e50bc1f80573a5d43d5ef10e3abc730bf0731228efd11e1fc8b780c31db824c15299f0227ea0d14df87b538d2b28fcedacb9fd11f1eeb24aaab403131292a8c59edd909d792756b6ec901a68240ff7fe572aac15223d46622036cd1f835963db1c08b9701a19295fb233e91854547a12e5d792113ac2943e78b2e4f5e0a3c6cc7001a8ff617b09298565cbc94c6b0580aab0dbf0b2529b882ab5c2c2781ddb335bf92a42a08ab8f37c3b035dda7e779319e6ddce9ef09f2075ee6f0aeb2206a9658d6a9d0c152164aabc7571aa38bc957f6ca635426d640aaee232b5083e8dac96524e53d66ada342c15c6a582d3b7ee15dc49bc9cd0e13be12637df284be1fcb0b546c0211ec1e8807281fd45282735e8ab12d2064ae3f755c58ff1071c565ba43002a99f0b20e818e87874aacfb71174524ebfb29c964545030b9081c7465c36a8c77e6fa1276fef715dd1c32b6137261e6573b48918dd4c383377386f4ce891acae5b4dbb9c3095f8dedb192ed2ff9f52365c831fb7c8c4f817ffbf5a9dbbf333020bb19fe7f97b02182df17e1fb0d76d6b6c77a8d6fcba2e339a18b1ead88ab95ed47a46fb3ca7414b9f75e4d101d6f6ca0e3b730998f56e2b3e94918ceffe5fb9eb4f408a1060a75b1d9b332555452b5e691f91b26aae75394ce9746265620b381ec72bd5d6e798c0aeadc73bf12b5338c7d59e524b980b06716557f4aef182b1afa46e94842d07a6f3b0ac5237924b7cee6f6130a66352ff7843c24f48fb37d774961f82a5de10ed9777f786e0a56ec39910421abfcea339dc730dd8445ce3956b8486f12e4a96ea48c5739f38efccd4406f373703484d990477f3814643e7166ae75a5e563b3d466e33ac7a3c5ba3d49d2d6bda64e816bcfb933eef24988f74b4fc546caf4318854227bb474975f044f4fa64e991ad7f162ac09a44bd8e670ae494ce5fc38dd59758aa0fb0410237ce8112c0a91b737560cef8d8c0ee0a8f66e52765d3bcccdf8780930ea471c79170f3aee37e02c3459c3bc062009656ed2bbfe429ba37cf7a3e86b7eef50d153dfcea7162b4ff8ca95a39cb89fa96ea5595d9518e92cf869b68e0f0ddea0d94cf51509f438f0a739d129116b755b8c4fc"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a280)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005a480)={0x0, ""/256, 0x0, 0x0}) r6 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r6}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000001380)={0x18, 0x1, 0x0, {0x7}}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000280)={0x0, r7, "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", "fb3d81c628240c7639a8de3b98f912121ea9d8220d9c1a13c6f61751a4b125fd2ebbfdc402edf1953aec558697fc4e04f7cf5e39d4343524a78be337297443e25c0eac76e5ada15ceaeff4f416ed5ba6f15beead8d26b100e2e5f16ab96b4532ab6561b2be19ce15168b375f5e4a17c9ce2a0a54603208cb2e1a237fbe2ace4a37fffd9018c12b028e25bb2605566f6a7c7251ae257ce93850277fe763f7ea59a6e4b89a3cb79b53d476b91b892bb501dbf27c286815a7f42512ad0169e1101cf243cdab76ec8632e490a81bb68c0baa3b5f0f5d73e7fc690fabfe9e96b45730ac1207a41675c22927692629a8d4c69189b597f752878ca90008af06eca123c40b9e639de082bcb9fc45602024b848084e2dd126785de49ecb1374633828de5e878d0a375c5297fc863d2dfe713e4402a4cfc9c85aeb5bc388fd8e3319a30453afc8f4c84d35bc78d3fa4742d9df3225e7e304ffdf0f6c16c85e85412bed44dcfb5e4374c5d9b1342b75a592682d63936ebf24e51f001f11e8657f9bae406727e964384e6970ba054acf027eb14ac408bb83a59a843cad7835754c853dc2980fad54027ecc7068e8e685bf65f5d7955784957ab7042ec07fdcf10aa44c2d08a245f1d63892b821817cd002f1e724015029450bc19a79b4eec7cb8b1379f2de3dd8fa067d9f012fe12fd0a5df9168eb5aa703a262aee8c9054b98467c00abfc75de784be80057bc885526465ce71a92fe4ea729ed512d1bdfd2fae62db04550cf6685aa34bcce9a1bac7c57d30341148f74b84080d1f868df4028714d42372be648783bdb9954a80fb1f0e876adeb8d50bcf88a41dd6b509599b67e4c5a22af2e6368aa2d23eb86a6bfa79a1e3a3e006285d3815111dfed782a43c649448e2a914e6c8326d2109659fd3deb1697fc455ff6489d0d829f9561902d072bf3f52d211667fa8b4725989867296962729969896a9b0190a47d714acdd8ef78d13b0941bde64738d0d343d70a145069ee64f6d6cd4f46366a9a834f9ca050c11bb56f385026d52482c67b421482f19069e95c5bb029a92cf989398008aeb709d77bc2923e609edf194a3c9e7b05b4d0a8b6acd7685aa1b4fda74ce29b0327b03ef73684421c52a0d9d760ff707b159dbabbf08b2f75e31e1cb838aac7aa1bed885a72c1a17b5d56f593218f496652192209c8b49cdf6f8e6226fda91760f6d417d0b098ee20956bc49a254ddbfad7a204a32bfe5b348e238b088a52ba340ad347189c87ef8f0bdea3a9dc73b5574237888990ce611835de122ed31e568c7004ba9c50f428ea10ea423e17695cd870e00b251b15051b67d99ab43b60f6ed6a9550b67564e8ae10c76956b19dbf726b58a535ce7801e1cb6739f0e42b3c89afffaa568ce03a059db0a7259fcd1f9f1f020ce0be2abcf6c15960303eb0b860082f5302f90aafb2a8759d62712005c714ade06dd34728b917a20dd9c9198f86a901fdb158f2c93e93336c1e29c9b39df40fd440485fc94eddec198dc528cbfb8f8f8f99f9c88636f3821f4b99677a6c8aac5673b519c544dd0b3fbf986c2890e352c51e7ea72de7c870e51fae53cf5ebdddeea9cfff40180de699df79f847c12787e85473918405694af2262436ce11070d155ca711403010dcd60c881c9c26a5846fb36fd9469df3cf32ba3d850f3f021ef048ec0cedb22cee5693d3b01fda25ca02ba537e7db0488ac5215afb07910ca4d35019fa38690021a757cedce185bcb0e7d0c71de584089e77cf49e26928a047fbefb68229d8131f4f3d8730fb26cb12f73902d492b681087ef8c8a6da21c37ac8bc8b64a6b1424df20eac3ef9f440e6e8e9af902d6ff2e87550b1d32de0ef9866f48726421075feceef6dc569045e10c5447998869f7360b395d0d9abbc8cf879ecf4a9f23062ed0c59cba216327561271806f4796324f7567c5d1471dc608c0972f6e602cf9cc51732024a56f70efcd5252d121b92b8e7bef9dfea735d5fe242d8e0a207672485032ad0ebe1e9ff8f68871d498c9d860670f79bd283ef40c88d37680bb9b62b56f5306455e505131aeea0e1db2c821df0887ce0aeabf67d296d2db9aeb30cd3d4934f73142f126453bc70d8098a4347a4ca83ca843423bd4539789e29351a631acd4beea06eda2d5be34be3de6d39c3555e66a6e3096c06d638134f07f0f9901cbcba59bf9444b713313d207413b678aca3a4ac6cb1654de61cb761b072f8d62bd8597ced5ddddf99eff2d5c22cdfc01c236ebd8c6588066af1836f358f47f8d391f246883ab3ecdffa73f6a35c9aa5004f7d7ad06a2be056cefa5f2fad910631d11f95ec9a1bde5e3d6164bf25960208e341fbb6e74b07e33c1d84f761f97fd2748321aae502ecee7b3ca167d8fbea44d19d924b586b9555031da1e38e6aa9c6c50963c462664206e60cdf96f381261175a48333b3a3e302c3be9f21f43a69b6d002742870d27d657ee0bf3db41c57c6fab8854125361f7aaf648118399a201db053a067abdaa82cf9a951e5c629ea96d50bd0fddf71f81da3cf58d09199271ae83217c5bd2e3609908c91ccb83984553d16b56150a0e98a644b3859de13d81f0372818df26e1534b6e3d446357a974efb223be615fe24db88a675fe9a3fff0f59aa9fb9b3309bfea4f35801ec104f77cb599820a9fd2db49c86d79d549fe7980efcbc73c5aa12c83f7e8b8c9e9f797c8282f3c3cd89b44453c488a6cf9a94d0f8510765ba465ccc28b6b60b96d4593267455dcc6771fb66db6fe694973ae8f69d9d3fa97dceccbd6e0a121b47b2610042231dd5a1c2f34b78ddf3e1658f473e4378eeda2bc2a0b927f1d1bab3ac2128b0b0ece785cfb5c03e5f83c6a5d9a25af0caa3662b25c68701cdae0eb6c0a190154c252356eca2356461b40b9cf17fdfc63960b603f38be7be84aa8553af8ab096c8e0c2bb3b58a4364a3a44d88c0d17a4b02be473b5f3a5fb3c54c29c26b7a2a3cef7b5b0afb34eac550c0a6198956499e9c3aac0425907276c84e2385e945d76ff8ea825b906d311f3fb48fa7d2d0c3125192d6460115ff2bdfbea54cd4c8b3dbb686ed912902e80a12efd8575cb52d6fe6f51a1ad23a3372987b48690b6b83fb6de6cedc0b14d5097eb45528fa7eb24adcd97805351f6d9d213422e3d3a3873186da9d55d249bb8ce39c0ac4ee4321fd810b8f17f2130addd9c187768982b7f3e2ed62532a6ddd6ace932b4327f96acd25bd2ea72be31fddfc65bc28f1d74f78316fcd2c17ac9a5a3b03d786086679a7910888a98f2894243f8a88cc302f5834a6d145ae7f64fa55ea59ebfbd665bb30af1519539a1d785f587ef612f5207cf2af2511a9230a20a7c558e5dbc4367f64336a29058dcacf7fe3bd2334b2e6b6f6ae6a31cb85ffdd7803d167c60787c8f8ec44cd75cc2975fa3c0b3817fd26b23e6866acd4eeb75aa2a16d9fd2cec4ffebe485adcee47461255e763781cc4c67512e4854fc688ac49ac2822f385a01063de6f919c89be5640a898d856a2067344bdce7795ae08ed7db16f68e216d54935308c3353e7266419435bd85f26ca66b5139cdd42a5c474f535846cb20c39907c87a4e81c81fece938db77f060d65e6db099fc343e6d899a1e3745d96ab85ba11362c93cb9f7ee9d3b7bef8efda60c98ab84eb14b7de46a6635245e38d302466d722498d7faa01d417619584be1e5160b9ff277204bfadf3608bc2dc8048a43d273911d76e11a316fb98a0c4efe4d58b31b678d8e328e400eac09d8c4b22bf5a5d020ea97a79f1e81820591c506110e45705180873000f9e19ae899408f97771c4ecaf920c1f3e6b2ffecb2ffb5cf901ef574f80a903df49c1e5f49fc0d815daf38bca5c7a9cdb018ce8f608088e3170ff186954ba35cd04a3cf1935584ae37985eea32d8a70dfaab789bc3352ea212049d9e6545e416a7054841e04d2b79a06525643d8a6548fb9d7ce90afd69c478475bf391a9cece4e657ed30a0faef98994a8a11f1695dcb26cb426a29bd1e4f9d37fe001f1f03b36b70d776b46d30d80a19a703f316cad9148034e9cc6d0fe82859c484aca7dd777c92aa9cd8bcb7791e86772dce9de7cf8bffd637fbce57881c7e87064def0aabfd420f6036dd566e7d2c4a3f22580bcd0840755969bc6a8af3f12e57ad18df7457c2721c54f2c62c41837c1e7ba280785ef698a49c9939767a20e9fe58b5063fe63088d4a6f431cc5d354970451e73c34f2d7f193952b79f0c896dbd95d27a6a53056e50bc1f80573a5d43d5ef10e3abc730bf0731228efd11e1fc8b780c31db824c15299f0227ea0d14df87b538d2b28fcedacb9fd11f1eeb24aaab403131292a8c59edd909d792756b6ec901a68240ff7fe572aac15223d46622036cd1f835963db1c08b9701a19295fb233e91854547a12e5d792113ac2943e78b2e4f5e0a3c6cc7001a8ff617b09298565cbc94c6b0580aab0dbf0b2529b882ab5c2c2781ddb335bf92a42a08ab8f37c3b035dda7e779319e6ddce9ef09f2075ee6f0aeb2206a9658d6a9d0c152164aabc7571aa38bc957f6ca635426d640aaee232b5083e8dac96524e53d66ada342c15c6a582d3b7ee15dc49bc9cd0e13be12637df284be1fcb0b546c0211ec1e8807281fd45282735e8ab12d2064ae3f755c58ff1071c565ba43002a99f0b20e818e87874aacfb71174524ebfb29c964545030b9081c7465c36a8c77e6fa1276fef715dd1c32b6137261e6573b48918dd4c383377386f4ce891acae5b4dbb9c3095f8dedb192ed2ff9f52365c831fb7c8c4f817ffbf5a9dbbf333020bb19fe7f97b02182df17e1fb0d76d6b6c77a8d6fcba2e339a18b1ead88ab95ed47a46fb3ca7414b9f75e4d101d6f6ca0e3b730998f56e2b3e94918ceffe5fb9eb4f408a1060a75b1d9b332555452b5e691f91b26aae75394ce9746265620b381ec72bd5d6e798c0aeadc73bf12b5338c7d59e524b980b06716557f4aef182b1afa46e94842d07a6f3b0ac5237924b7cee6f6130a66352ff7843c24f48fb37d774961f82a5de10ed9777f786e0a56ec39910421abfcea339dc730dd8445ce3956b8486f12e4a96ea48c5739f38efccd4406f373703484d990477f3814643e7166ae75a5e563b3d466e33ac7a3c5ba3d49d2d6bda64e816bcfb933eef24988f74b4fc546caf4318854227bb474975f044f4fa64e991ad7f162ac09a44bd8e670ae494ce5fc38dd59758aa0fb0410237ce8112c0a91b737560cef8d8c0ee0a8f66e52765d3bcccdf8780930ea471c79170f3aee37e02c3459c3bc062009656ed2bbfe429ba37cf7a3e86b7eef50d153dfcea7162b4ff8ca95a39cb89fa96ea5595d9518e92cf869b68e0f0ddea0d94cf51509f438f0a739d129116b755b8c4fc"}) r8 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005a680)={0x0, 0x0, "9cdb4ef0b28c327ab3c37876fb4eae8c8b40d6d1618b1d809aef1e1876d469581d20cd45ee8b4a0e9c87c67f55b2d8da4e032968c321003cb872f58c27d8e9769f4e2f5ed7e97b54360e38aa508eed1bfea45a223c4cf12116a29692b8494c7cc55a2c134b19cdd23aa0858a35320a6e4e35ac866307839dfa2d2a2b0a79149e23e7cb4c4b735db4aadafb120eb38cd390a52f4362c65bd54564b13f5dc36b34041646e1e4f38e8839d6181ce4b40bdb84c8f0b98353c742777af18bfcc838625742a78c04ae06552401c18ef40ce5ee3cc028cbc20a1088d0270bb33aab6c1f2e7fab1bb09939b3bd057c268dd8b729e0795f545ac89d55c2f430dae6788ff7", "82059f6090fa1090a3e955bc61156090f29de7e44d82edabdc09173d193d725bcdbe7cd963641f5759b0d9701e2ddbf3f0fc4138f66082cb9fff3e110f3ea95adccd2a9881b63cb43c57ffd482f2c1f44faa8b537080c6af18b7c6b30e2da02947b2a12fb4b34cfaeac2ffa60d9a99ddcc52f5cf28aa16d2ed293598698e4ffbee7f1efce5962cefebdaff23a70a11315c854363a8577b353da9184f283087f3f80615f4e726bc4bb90ea27a31823e37a5104f89bf757c7c0e33f8e37d1893b7197b37b1f35bc7a6c4ab25664c2b0a60c6cb59bbe506547f0379c087415596e4e46d7567f326bc1a2ebcd81e4070235dab9cb162c7b1d94ea4165c68b502829bad871d28270f85ae24113590d1e032d185fec75724a2788f58cd50571759620cc96fcfb182df777871d90ccdddd5f6d3a20516250509d834f7ffb6b301a7fe4ad8d75d542d2a8533e90cff1c9b9ec378e2e48c5a3f327fe308018734705d40b1a6dbdd050734f93cab6665533e4f03728ad3cf22c9a3d16470bf2c57c32d67decb579d036bb07096289f0110e76cb7b7be0f7f5bb4578cb816c3c376c3f53a6f084601979ab68f2586cb96334dcc8baa2f44f7360a89bd4f03025a1e3f8cae5182bede22c45ffa06b2413d6732b2c51a1b20fed5ab2185f3b03dc0c48933f756ac3a290e65bf02678db7059317e685da47abc94aad57d8fb77f1270c2257b605429e2b399c9dcaf532592138ec7ef23c1f014f60a0a20111aaed4998e71488bfd533041d7b2663068364b33f94d7822eced47f5781a9eb2bb21d462cfc5d8012833c3fc9e20b86ffc1d0b7e0947a0752a5a174b216225a5f19629bf6be419b457d81441d554fc322cc5ebee949d0ee334f8dbf2a88f4dfd546c2a47f90b1aad13007ac3287e9fa2b15492f4b859f2158db0d909364ee7c0f9567b0114f91c79385e9a70012f00cc9101597466884e9891a939972186065a8dc4d7ea560eef6d25cd174acea5784a81103a868b9d96a7aa3778d06ccda32e830e8d9a7f581aeb3993a1ce36bd81071cdb06168ce9b6553dbef9ed165e1f53f10a6062ec39fd97de05c9fb0716aa39209196c598e618e5b159128eaae1819d8292b3c9f507f360cb856b343bb6848c5bcd05396c3f1754f8b2fefea23d0a6677f44ebf4942bbc669b443c737e3dc319e88a3b869c1fba2caf349f067abb592a151e386de31715b5dac2c99cc19cd07e714ff26dd7f013204345d869bfcdde1bf01db5d543abddb8a21e3f4209006c50af538f815487844cd7462db13c5f1df22bccfd30f283eaf92f3861bebdea21651c95844baf1209a9781243e73391d414ca984908a3a9369064f799a0a6119d100f41a0bdf4646081a52bf33d4fbcbcf4673e5b6c9520b735d2407bf9b73d715b8732f8c014ac396dc21995d03bf79127349126245d090b6d99dd873887f5067b0ba7da54fb4f4908c1d893aa3a2eb9a6946438ace53cb2111af3b4ed4aa91fcc1a66926e52159a522cb62b5f65405bf8027c95ddcabb472189b43d55aa2638341e85d802db19050312658ee9ca56393b0b10975ede5325fccada6e3ba445b18c83375624ebd65334b72a23693ec3ad7b6bbbe7da825fb0e8534863538f23d4627fa45c4aadc5d9ac8c2175c0ecf42b1f6ef67f8bded49a0889161010bdc25edfc3e2ac92abfad58f9aa4eb78e0174a3bc7b88b428d4a58872abc2f9936f6b4a073888192d992dc851d2421219586e7e3d2b3c0316e9e359088525d7a274ae7d13e9789e00cb779934362d4e0e7334d06c237434752db40be566a19a7c147c1a13cccd78ea947922501334fa098ed9de2c88a4c3b42f121a5d935847d01bed7cba93dccf1854fb75689a7fa81c87d914fb4f30e87ef01c8348c499a973776b229a864e464792f0e23112786a3369f6548da25b49ca1b597e65fb11500536de84255776925bf6daf3a8ef3c51c53bd1ddab7bfd6a6a421e20b8b6a6dded28688694bbf51abcbf7ae3b1843328724368a53a66b99f175692c75f0c994f3feaf0e14aaa97c1cab9901493d281d8bcc16ec74fefb4f8fa9c1b0b0516440ad14b096bb8aba256233a06b9bcc0326ef671412a5be285dc43eb64a7ea45d672a2101d79737623515b9f3eb0cd7b60399da453d129e3bc87c63f6b1a8cca52091cb0899699c4783f35a5b84b8d19a524d39955c8b3986d47b37dfd7f71c9bd4f6b135fdac246947419fa273c7d0cd73d43abdb33e0904aa62123d85899605a1b2bf39d91882acb42234286e8b4d221ad58fc89de7bacf88426d849da800985f0e983c1a70f0b479afebebbe59bef35c4f2f0d147da78d234e62717ec92e43e110c5738a37414a2d28bc3f730fc2b7c9d21f2d7e8be6e19d1c66131838f05598dcad5c6aa8d97e6e740b7b6c3edb7fb25f4a38eb192441075b6fd096cc24ac63c1d07da370ab54203b65fcf667da74ce7e70c12b02767194a8c2e389bfe43056b6123b7692491a730b8a1863d7a01a1d531f4d21458db6ee14ea53fc7523e7c6c15c392500f54acd737639854c4db71d00a9164361222789113eb2e2af7500348843ee36cf14bb19ad0d1465f51b3dbd697c9919d060e59ab5dfd433fb192e489b1f218ff1d592e5b61a8bd0c9ec6be688e60c409c50c6f406fd74e7c5f666c9dc1d506ad9b3925d318affa99fdc5038f8fb351fe3fa3defbca10c90988f42715d0e06d8beba747ea99e1ac7087129c4a98d56c33e2b4fd21d29857300585d4f0148d15727efca45164b7537295f77f8ce7b12a544cd8d1a1029a261ccf0f08006cd327a40908d67c6c81e0b25bfe9c8b77fee585a3082fbc55d480881d14853a005f82b77c2c81d609f701fa10217b77bec9c8f1dfde20ce874b78e54a0350e1c022e62cbee0ad29aadeb9d3a9d407392d749ad23fc45da763426e9d7b08d6432b13fd2ce1b488abcb1a94eafb29bef9c9c5593f4f872805764579209528268df6b5331503396fa53a8cbe10ab21dc822e05c342d2d9e0f48accb349d6e0dfdb2917f76dce3d3b94e62822cb96048b303727adca360880d951162f6c63ab146ea2df9e2444c427e8f5f14d461650216ab1ac144e2c365d791e623a45e0e12dc83e2666f45ebe07206469811c0227333decae5b812f6770db29ae91e38c2bf85910b968395f9473d05fbe7fc1fbf4c40af13e2b022cdb4dcca3847e73a68a1f98e2b092599a55dabb704d157cb399b1a72ce838311585fe48374b8a90ff79af364d75645699c6c571863e1f569d352955854ee47860cf665426a44b7c1e6010243107ab959781d8040732a8ec34c7f0cd4f4dd424840b0f04ca03b6832df095202d713e8dd0f6b7d0a70c72e332370d5882d8c98be0621aae5a7a54005f278de245c055d2a77fb118581321881548c0da6c8d5e198046ce5f7004432a2b994d1f7f1a849f05f79361ba976571203f71ac28447c9422ae7f75e649210ed90ae9d35cdaab31a75a81bf11db7ec90caf49bc2902302c00bdfe66f7b2e5e0727ec4f502f34bf6ca454a997b24488fb88fbb881c62a7a7ed2e904de128c808b6230aa4fb5eba06a964c5e7ae4004f58642d4a87e5ee4851e9777bd53d78d1b028889c634325ab73dc9e7630f9abe20987f0686f767c9b13f6b67c81bbc5ade65a5358628bcf2ed81374bc2e60766977abaeb9813168d5e9db73e2de887cac5f0b9f1f11cd1f5404115d1190bdbfdc6b4996843e9f6731e5c01c54f2c1fe1bcf68318dd8b68f5787c9d9bb58d044dfde45660bb66d0929596f527246ac6a09c80eb9bebee69aa3fde08e2997a14ef3e53da9316e4d849d4262dfd09b733c80aa956cd68616b597fdd8243ba029459dc20a58d07e9201d7e0b884f0c8bd51555b9dc7a62c4206ffe594c52d48f2a8e7be50dbefc1ca0bd81ff4b2e9bafaa90ac3accee6e67aa86fc7c0517863f2e6ede58d78dbc510face64d06ddd449d885e5d6b40b12dee543433315b7ec16d4e39f4235b676749fb37a2eaea50111a18e4a4c80c817306fa12955b34bc7869b7e46c339a036c453bf1fc8def3ef57548b1d218a53ce48b57027b47862be7afe047e6fb2611ee955131ad64f6e1854866cfd3053dfb5c95e4d1cd521734b8d3b768ef21fd89e2c6fe15647d2f1b269d8705c5df47a91c302763a177f092e5713b2e56481b8db29c29e3e4add1dbc9d20981d3ee8fac08813561acaddfe94062a26fa31b6bf50312ae749d1e830ae2456a4a903be87d2d84f02c4fdcca0a72fbd5d2a9e7ab6e6f02239f035279bc2e8d254aa15321d3e16a14fb37982bce933152bb0ebbc7906a2d44eb99aeb8afdcf603d47e932baea86fc415430ceb5efbfc8a18285206034250f114401318cbf9f0cc5660e172ac969b0967dcf694820355a3136ca0808d479e8078e57e5f12cf04e942469ddde9b858e6a68848eb6a22f5c4a11600632c21d3d3a8ebf2c35b68608090706f988a551440c40e4cda26db312b6f56c46ead72d931f8c884ce98f07d809ec2437a6015b1f5d629d83a5d7c9d07ffb07399c9db8406113e1559cf1b621d9b3af5672c5bd2f02df441bf619888ae75cb6a73ce4b70b31b21c801d2ab3f7e71d7d5a844ab926a363e77dadcda26244890f6479eea37ad4a9ca14e10b7dd049de162a66a5509a62080927b105e7d810a884b848f206507565e1669c641d0b1fc517a924da720c441c4bee958d92293c6ded664aa41aa46a5cdc7fdb41b4c51e5b6f0f933454850d7a8054161bea1d78ba63cd03476a173295c8fe04f7cac6066bf3b866708f00d483836f6c205b6f2cfd0bf78a3fab2264a76f5263007ab54220c56b2901b760706da467085c9b69975b3cbd6ffd4514be2aff89deb40f316cf386245e2b36cecc653fc414601a761edd15d46e6a550a3f16419162fd2c44ed91755b07d5432868158c540417efbaa0396610756c1ac049e91eb2345aaff57827a0865d0642f42806d39fdb9a563a76e93d55f8a0baaa8ceb36d930079622cea28d8a063cf129a4fc18d343381f20b5be5fcf059067eed8ace516d45e268fe54f918f78d1156c7b3033d00aa29e3405518bc6f96605594626047c8cc9e436c2401c753922e31d7968198d170aff11ffbcd615e683568e8532922c26feee3eb78dec80fb19e8b9dabc2885d7480ce686e2286ccf1944cdca6f6f0e5d3b8088a7063fc6e2112bfc769576154212d92c47c751359f4e10c8b471af2116a75950cf95626786c9addb928d9447ba041e306826fb9f08d8134e4d144b30e104beaeaa88aaf46fe3e8bf62b3a4f833925976664da7a82d25027db72741b20a8a1ff8c1a732eeb5c6a027112ea6c11fe77d56fae46e9b5d7a995280a053cd1ed3726016ab10d35743c0081d1a6eeca0f9d8061dd5e"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005b680)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r3, r4}, {0x0, r5}, {r7}, {r9}, {}, {r10}], 0xfb, "504d284c2bf7ac"}) [ 2263.733494] ? get_anon_bdev+0x1c0/0x1c0 [ 2263.737542] ? sget+0xd9/0x110 [ 2263.740730] ? fuse_get_root_inode+0xc0/0xc0 [ 2263.745134] mount_nodev+0x4c/0xf0 [ 2263.748668] mount_fs+0x92/0x2a0 [ 2263.752033] vfs_kern_mount.part.0+0x5b/0x470 [ 2263.756524] do_mount+0xe65/0x2a30 [ 2263.760060] ? __do_page_fault+0x159/0xad0 [ 2263.764287] ? retint_kernel+0x2d/0x2d [ 2263.768170] ? copy_mount_string+0x40/0x40 [ 2263.772406] ? memset+0x20/0x40 [ 2263.775686] ? copy_mount_options+0x1fa/0x2f0 [ 2263.780179] ? copy_mnt_ns+0xa30/0xa30 03:06:44 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x6}}, 0x18) (async) r1 = syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c56ed726f6f746d6f64653d3030303030300100000000000000303069", @ANYRESDEC=0x0, @ANYBLOB="2c5d726f63705f69643d7cd08d65d1b81e637d722961fcf390dd8b15abd3e6fc448c71e432879981b311de34847ed76d8afcfe6adfc6ec0eff01d5b215ff10a3799c097bc1f1e2b8a1d98e4eff", @ANYBLOB="c7d75afaac2e4f18add080af4ebb9ef5cbf40d5701c4bb6c836ac4b9f0f7dd452f919f9ee4e0ab74420cc626", @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000280)={0x0, r3, "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", "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"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a280)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005a480)={0x0, ""/256, 0x0, 0x0}) (async) r6 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r6}) (async) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000001380)={0x18, 0x1, 0x0, {0x7}}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000280)={0x0, r7, "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", "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"}) r8 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r8}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005a680)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005b680)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r3, r4}, {0x0, r5}, {r7}, {r9}, {}, {r10}], 0xfb, "504d284c2bf7ac"}) 03:06:44 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x6}}, 0x18) (async) r1 = syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c56ed726f6f746d6f64653d3030303030300100000000000000303069", @ANYRESDEC=0x0, @ANYBLOB="2c5d726f63705f69643d7cd08d65d1b81e637d722961fcf390dd8b15abd3e6fc448c71e432879981b311de34847ed76d8afcfe6adfc6ec0eff01d5b215ff10a3799c097bc1f1e2b8a1d98e4eff", @ANYBLOB="c7d75afaac2e4f18add080af4ebb9ef5cbf40d5701c4bb6c836ac4b9f0f7dd452f919f9ee4e0ab74420cc626", @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000280)={0x0, r3, "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", "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"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005a280)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005a480)={0x0, ""/256, 0x0, 0x0}) (async) r6 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r6}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000001380)={0x18, 0x1, 0x0, {0x7}}, 0x18) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r6, 0xd000943e, &(0x7f0000000280)={0x0, r7, "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", "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"}) r8 = syz_open_dev$dri(&(0x7f0000000000), 0xfff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r8}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r8, 0x81f8943c, &(0x7f0000000080)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005a680)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005b680)={0x1ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {r3, r4}, {0x0, r5}, {r7}, {r9}, {}, {r10}], 0xfb, "504d284c2bf7ac"}) [ 2263.784060] SyS_mount+0xa8/0x120 [ 2263.787507] ? copy_mnt_ns+0xa30/0xa30 [ 2263.791389] do_syscall_64+0x1d5/0x640 [ 2263.795279] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2263.800459] RIP: 0033:0x7f53dd92e73a [ 2263.804160] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2263.811862] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2263.819125] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2263.826386] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:44 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r2, {0x400}}, 0x18) [ 2263.833651] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2263.840922] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) 03:06:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 67) [ 2263.934648] FAULT_INJECTION: forcing a failure. [ 2263.934648] name failslab, interval 1, probability 0, space 0, times 0 [ 2263.946498] CPU: 1 PID: 19538 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2263.954384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2263.963731] Call Trace: [ 2263.966316] dump_stack+0x1b2/0x281 [ 2263.969954] should_fail.cold+0x10a/0x149 [ 2263.974102] should_failslab+0xd6/0x130 [ 2263.978082] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2263.982749] ? fuse_init_file_inode+0x70/0x70 [ 2263.987238] fuse_alloc_inode+0x2ea/0x3f0 [ 2263.991372] ? do_raw_spin_unlock+0x164/0x220 [ 2263.995844] ? fuse_kill_sb_anon+0x50/0x50 [ 2264.000059] alloc_inode+0x5d/0x170 [ 2264.003666] iget5_locked+0x169/0x450 [ 2264.007445] ? fuse_inode_eq+0x70/0x70 [ 2264.011311] fuse_iget+0x1b5/0x790 [ 2264.014834] ? fuse_change_attributes+0x4d0/0x4d0 [ 2264.019671] fuse_get_root_inode+0x99/0xc0 [ 2264.023888] ? fuse_iget+0x790/0x790 [ 2264.027597] ? __local_bh_enable_ip+0x132/0x170 [ 2264.032249] ? bdi_set_max_ratio+0xe5/0x120 [ 2264.036559] fuse_fill_super+0xc18/0x15c0 [ 2264.040686] ? fuse_get_root_inode+0xc0/0xc0 [ 2264.045073] ? up_write+0x17/0x60 [ 2264.048502] ? register_shrinker+0x15f/0x220 [ 2264.052884] ? sget_userns+0x768/0xc10 [ 2264.056768] ? get_anon_bdev+0x1c0/0x1c0 [ 2264.060802] ? sget+0xd9/0x110 [ 2264.063970] ? fuse_get_root_inode+0xc0/0xc0 [ 2264.068352] mount_nodev+0x4c/0xf0 [ 2264.071867] mount_fs+0x92/0x2a0 [ 2264.075231] vfs_kern_mount.part.0+0x5b/0x470 [ 2264.079715] do_mount+0xe65/0x2a30 [ 2264.083235] ? __do_page_fault+0x159/0xad0 [ 2264.087443] ? retint_kernel+0x2d/0x2d [ 2264.091346] ? copy_mount_string+0x40/0x40 [ 2264.095569] ? memset+0x20/0x40 [ 2264.098847] ? copy_mount_options+0x1fa/0x2f0 [ 2264.103333] ? copy_mnt_ns+0xa30/0xa30 [ 2264.107203] SyS_mount+0xa8/0x120 [ 2264.110654] ? copy_mnt_ns+0xa30/0xa30 [ 2264.114525] do_syscall_64+0x1d5/0x640 [ 2264.118394] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2264.123583] RIP: 0033:0x7f53dd92e73a [ 2264.127271] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:44 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="99eb119577f5df7beec32eed118276fb", 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="99eb119577f5df7beec32eed118276fb", 0x10) (async) 03:06:44 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x5455, 0x7, 0x8, 0x36, 0x4, 0x1, 0x1f, 0x7fff}}}, 0x60) 03:06:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 68) [ 2264.134956] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2264.142205] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2264.149459] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2264.156733] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2264.163984] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xffff}}}, 0x90) [ 2264.206157] FAULT_INJECTION: forcing a failure. [ 2264.206157] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.237869] CPU: 0 PID: 19556 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2264.245770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2264.255115] Call Trace: [ 2264.257705] dump_stack+0x1b2/0x281 [ 2264.261329] should_fail.cold+0x10a/0x149 [ 2264.265476] should_failslab+0xd6/0x130 [ 2264.269444] kmem_cache_alloc+0x28e/0x3c0 [ 2264.273586] __d_alloc+0x2a/0xa20 [ 2264.277041] d_make_root+0x3e/0xc0 [ 2264.280572] fuse_fill_super+0xc49/0x15c0 [ 2264.284720] ? fuse_get_root_inode+0xc0/0xc0 [ 2264.289123] ? up_write+0x17/0x60 [ 2264.292569] ? register_shrinker+0x15f/0x220 [ 2264.296969] ? sget_userns+0x768/0xc10 [ 2264.300853] ? get_anon_bdev+0x1c0/0x1c0 [ 2264.304904] ? sget+0xd9/0x110 [ 2264.308082] ? fuse_get_root_inode+0xc0/0xc0 [ 2264.312465] mount_nodev+0x4c/0xf0 [ 2264.315983] mount_fs+0x92/0x2a0 [ 2264.319326] vfs_kern_mount.part.0+0x5b/0x470 [ 2264.323796] do_mount+0xe65/0x2a30 [ 2264.327320] ? __do_page_fault+0x159/0xad0 [ 2264.331559] ? retint_kernel+0x2d/0x2d [ 2264.335427] ? copy_mount_string+0x40/0x40 [ 2264.339659] ? memset+0x20/0x40 [ 2264.342918] ? copy_mount_options+0x1fa/0x2f0 [ 2264.347387] ? copy_mnt_ns+0xa30/0xa30 [ 2264.351247] SyS_mount+0xa8/0x120 [ 2264.354674] ? copy_mnt_ns+0xa30/0xa30 [ 2264.358539] do_syscall_64+0x1d5/0x640 [ 2264.362404] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2264.367571] RIP: 0033:0x7f53dd92e73a [ 2264.371266] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2264.378955] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2264.386225] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2264.393470] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) getuid() (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) (async) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) (async) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) (async) 03:06:45 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x5455, 0x7, 0x8, 0x36, 0x4, 0x1, 0x1f, 0x7fff}}}, 0x60) 03:06:45 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x5455, 0x7, 0x8, 0x36, 0x4, 0x1, 0x1f, 0x7fff}}}, 0x60) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$FUSE_STATFS(r1, &(0x7f0000000080)={0x60, 0x0, 0x0, {{0x5455, 0x7, 0x8, 0x36, 0x4, 0x1, 0x1f, 0x7fff}}}, 0x60) (async) 03:06:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}}, 0x90) 03:06:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 69) [ 2264.400723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2264.407985] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2264.468930] FAULT_INJECTION: forcing a failure. [ 2264.468930] name failslab, interval 1, probability 0, space 0, times 0 [ 2264.489853] CPU: 0 PID: 19588 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2264.497745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2264.507099] Call Trace: [ 2264.509683] dump_stack+0x1b2/0x281 [ 2264.513315] should_fail.cold+0x10a/0x149 [ 2264.517459] should_failslab+0xd6/0x130 [ 2264.521428] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2264.526094] ? fuse_init_file_inode+0x70/0x70 [ 2264.530587] fuse_alloc_inode+0x2ea/0x3f0 [ 2264.534726] ? do_raw_spin_unlock+0x164/0x220 [ 2264.539212] ? fuse_kill_sb_anon+0x50/0x50 [ 2264.543437] alloc_inode+0x5d/0x170 [ 2264.547060] iget5_locked+0x169/0x450 [ 2264.550850] ? trace_hardirqs_on+0x10/0x10 [ 2264.555078] ? fuse_inode_eq+0x70/0x70 [ 2264.558971] fuse_iget+0x1b5/0x790 [ 2264.562506] ? fuse_change_attributes+0x4d0/0x4d0 [ 2264.567335] fuse_get_root_inode+0x99/0xc0 [ 2264.571541] ? fuse_iget+0x790/0x790 [ 2264.575232] ? __local_bh_enable_ip+0xc1/0x170 [ 2264.579788] ? bdi_set_max_ratio+0xe5/0x120 [ 2264.584083] fuse_fill_super+0xc18/0x15c0 [ 2264.588207] ? fuse_get_root_inode+0xc0/0xc0 [ 2264.592591] ? up_write+0x17/0x60 [ 2264.596015] ? register_shrinker+0x15f/0x220 [ 2264.600412] ? sget_userns+0x768/0xc10 [ 2264.604275] ? get_anon_bdev+0x1c0/0x1c0 [ 2264.608308] ? sget+0xd9/0x110 [ 2264.611477] ? fuse_get_root_inode+0xc0/0xc0 [ 2264.615865] mount_nodev+0x4c/0xf0 [ 2264.619382] mount_fs+0x92/0x2a0 [ 2264.622729] vfs_kern_mount.part.0+0x5b/0x470 [ 2264.627206] do_mount+0xe65/0x2a30 [ 2264.630719] ? __do_page_fault+0x159/0xad0 [ 2264.634928] ? retint_kernel+0x2d/0x2d [ 2264.638786] ? copy_mount_string+0x40/0x40 [ 2264.642995] ? memset+0x20/0x40 [ 2264.646249] ? copy_mount_options+0x1fa/0x2f0 [ 2264.650851] ? copy_mnt_ns+0xa30/0xa30 [ 2264.654719] SyS_mount+0xa8/0x120 [ 2264.658154] ? copy_mnt_ns+0xa30/0xa30 [ 2264.662035] do_syscall_64+0x1d5/0x640 [ 2264.665906] entry_SYSCALL_64_after_hwframe+0x46/0xbb 03:06:45 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 03:06:45 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000000000)={0x28, 0x0, r2, [{0x5, 0x3, 0x0, 0xfffff000}]}, 0x28) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1}, 0x90) [ 2264.671073] RIP: 0033:0x7f53dd92e73a [ 2264.674769] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2264.682451] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2264.689698] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2264.696950] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2264.704203] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2264.711446] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:45 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="99eb119577f5df7beec32eed118276fb", 0x10) 03:06:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 70) 03:06:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1}, 0x90) 03:06:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) getuid() (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) (async) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) (async) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) (async) [ 2265.044174] FAULT_INJECTION: forcing a failure. [ 2265.044174] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.064332] CPU: 1 PID: 19654 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2265.072231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2265.081577] Call Trace: [ 2265.084159] dump_stack+0x1b2/0x281 [ 2265.087784] should_fail.cold+0x10a/0x149 [ 2265.091933] should_failslab+0xd6/0x130 [ 2265.095904] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2265.100568] ? fuse_init_file_inode+0x70/0x70 [ 2265.105054] fuse_alloc_inode+0x2ea/0x3f0 [ 2265.109190] ? do_raw_spin_unlock+0x164/0x220 [ 2265.113674] ? fuse_kill_sb_anon+0x50/0x50 [ 2265.117901] alloc_inode+0x5d/0x170 [ 2265.121608] iget5_locked+0x169/0x450 [ 2265.125395] ? trace_hardirqs_on+0x10/0x10 [ 2265.129611] ? fuse_inode_eq+0x70/0x70 [ 2265.133481] fuse_iget+0x1b5/0x790 [ 2265.137000] ? fuse_change_attributes+0x4d0/0x4d0 [ 2265.141831] fuse_get_root_inode+0x99/0xc0 [ 2265.146052] ? fuse_iget+0x790/0x790 [ 2265.149775] ? __local_bh_enable_ip+0xc1/0x170 [ 2265.154331] ? bdi_set_max_ratio+0xe5/0x120 [ 2265.158627] fuse_fill_super+0xc18/0x15c0 [ 2265.162772] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.167174] ? up_write+0x17/0x60 [ 2265.170652] ? register_shrinker+0x15f/0x220 [ 2265.175033] ? sget_userns+0x768/0xc10 [ 2265.178909] ? get_anon_bdev+0x1c0/0x1c0 [ 2265.182950] ? sget+0xd9/0x110 [ 2265.186116] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.190495] mount_nodev+0x4c/0xf0 [ 2265.194009] mount_fs+0x92/0x2a0 [ 2265.197362] vfs_kern_mount.part.0+0x5b/0x470 [ 2265.201851] do_mount+0xe65/0x2a30 [ 2265.205376] ? __do_page_fault+0x159/0xad0 [ 2265.209599] ? retint_kernel+0x2d/0x2d [ 2265.213462] ? copy_mount_string+0x40/0x40 [ 2265.217671] ? memset+0x20/0x40 [ 2265.220941] ? copy_mount_options+0x1fa/0x2f0 [ 2265.225415] ? copy_mnt_ns+0xa30/0xa30 [ 2265.229277] SyS_mount+0xa8/0x120 [ 2265.232704] ? copy_mnt_ns+0xa30/0xa30 [ 2265.236566] do_syscall_64+0x1d5/0x640 03:06:45 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0xd8, 0x0, r2, [{0x6, 0x7f, 0x5, 0x2, 'fuse\x00'}, {0x4, 0x9, 0x2, 0x40, 'fd'}, {0x4, 0x681c, 0x8, 0x2, 'group_id'}, {0x6, 0x2de, 0x5, 0x2, '#*:}!'}, {0x4, 0x20, 0xb, 0x3, '/dev/nvram\x00'}, {0x3, 0x80000001, 0x7, 0xfff, 'user_id'}]}, 0xd8) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ENTRY(r0, &(0x7f0000000000)={0x90, 0x0, r1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}}, 0x90) [ 2265.240438] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2265.245701] RIP: 0033:0x7f53dd92e73a [ 2265.249395] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2265.257167] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2265.264423] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2265.271678] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2265.278926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2265.286180] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 71) [ 2265.353132] FAULT_INJECTION: forcing a failure. [ 2265.353132] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.365197] CPU: 1 PID: 19699 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2265.373088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2265.382435] Call Trace: [ 2265.385020] dump_stack+0x1b2/0x281 [ 2265.388648] should_fail.cold+0x10a/0x149 [ 2265.392797] should_failslab+0xd6/0x130 [ 2265.396766] kmem_cache_alloc+0x28e/0x3c0 [ 2265.400906] __fuse_request_alloc+0x21/0xe0 [ 2265.405240] fuse_fill_super+0xc89/0x15c0 [ 2265.409370] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.413758] ? up_write+0x17/0x60 [ 2265.417195] ? register_shrinker+0x15f/0x220 [ 2265.421601] ? sget_userns+0x768/0xc10 [ 2265.425479] ? get_anon_bdev+0x1c0/0x1c0 [ 2265.429517] ? sget+0xd9/0x110 [ 2265.432697] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.437095] mount_nodev+0x4c/0xf0 [ 2265.440628] mount_fs+0x92/0x2a0 [ 2265.443984] vfs_kern_mount.part.0+0x5b/0x470 [ 2265.448457] do_mount+0xe65/0x2a30 [ 2265.451980] ? __do_page_fault+0x159/0xad0 [ 2265.456202] ? retint_kernel+0x2d/0x2d [ 2265.460078] ? copy_mount_string+0x40/0x40 [ 2265.464296] ? memset+0x20/0x40 [ 2265.467552] ? copy_mount_options+0x1fa/0x2f0 [ 2265.472028] ? copy_mnt_ns+0xa30/0xa30 [ 2265.475901] SyS_mount+0xa8/0x120 [ 2265.479338] ? copy_mnt_ns+0xa30/0xa30 [ 2265.483209] do_syscall_64+0x1d5/0x640 [ 2265.487077] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2265.492239] RIP: 0033:0x7f53dd92e73a [ 2265.495922] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:06:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) 03:06:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 72) [ 2265.503607] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2265.510860] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2265.518109] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2265.525363] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2265.532608] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:46 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 03:06:46 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000000000)={0x28, 0x0, r2, [{0x5, 0x3, 0x0, 0xfffff000}]}, 0x28) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2265.585948] FAULT_INJECTION: forcing a failure. [ 2265.585948] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.603592] CPU: 0 PID: 19714 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2265.611492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2265.620839] Call Trace: [ 2265.623421] dump_stack+0x1b2/0x281 [ 2265.627048] should_fail.cold+0x10a/0x149 [ 2265.631191] should_failslab+0xd6/0x130 [ 2265.635165] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2265.639831] fuse_dentry_init+0x40/0xa0 [ 2265.643793] ? fuse_dentry_release+0x40/0x40 [ 2265.648179] __d_alloc+0x5cf/0xa20 [ 2265.651697] d_make_root+0x3e/0xc0 [ 2265.655210] fuse_fill_super+0xc49/0x15c0 [ 2265.659331] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.663715] ? up_write+0x17/0x60 [ 2265.667159] ? register_shrinker+0x15f/0x220 [ 2265.671540] ? sget_userns+0x768/0xc10 [ 2265.675415] ? get_anon_bdev+0x1c0/0x1c0 [ 2265.679453] ? sget+0xd9/0x110 [ 2265.682629] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.687012] mount_nodev+0x4c/0xf0 [ 2265.690525] mount_fs+0x92/0x2a0 [ 2265.693866] vfs_kern_mount.part.0+0x5b/0x470 [ 2265.698342] do_mount+0xe65/0x2a30 [ 2265.701868] ? __do_page_fault+0x159/0xad0 [ 2265.706093] ? retint_kernel+0x2d/0x2d [ 2265.709961] ? copy_mount_string+0x40/0x40 [ 2265.714174] ? memset+0x20/0x40 [ 2265.717431] ? copy_mount_options+0x1fa/0x2f0 [ 2265.721904] ? copy_mnt_ns+0xa30/0xa30 [ 2265.725786] SyS_mount+0xa8/0x120 [ 2265.729219] ? copy_mnt_ns+0xa30/0xa30 [ 2265.733098] do_syscall_64+0x1d5/0x640 [ 2265.736978] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2265.742149] RIP: 0033:0x7f53dd92e73a [ 2265.745844] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2265.753530] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2265.760791] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2265.768035] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2265.775348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 03:06:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 73) [ 2265.782618] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2265.838066] FAULT_INJECTION: forcing a failure. [ 2265.838066] name failslab, interval 1, probability 0, space 0, times 0 [ 2265.853964] CPU: 0 PID: 19736 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2265.861866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2265.871213] Call Trace: [ 2265.873784] dump_stack+0x1b2/0x281 [ 2265.877406] should_fail.cold+0x10a/0x149 [ 2265.881532] should_failslab+0xd6/0x130 03:06:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x2a, 0x4, 0x0, {0x2, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/178, &(0x7f00000000c0)=0xb2) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030135db3ed303030303030303030303034303030302c757365725f69075d60b525e563643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0x0) [ 2265.885486] kmem_cache_alloc+0x28e/0x3c0 [ 2265.889616] __d_alloc+0x2a/0xa20 [ 2265.893053] d_alloc+0x46/0x240 [ 2265.896338] d_alloc_name+0x70/0x80 [ 2265.899943] ? d_alloc+0x240/0x240 [ 2265.903460] fuse_ctl_add_dentry+0x70/0x410 [ 2265.907764] ? __lockdep_init_map+0x100/0x560 [ 2265.912248] fuse_ctl_add_conn+0x110/0x250 [ 2265.916458] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2265.921107] ? CIFSGetExtAttr+0x7c6/0xda0 [ 2265.925230] fuse_fill_super+0xe0c/0x15c0 [ 2265.929352] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.933740] ? up_write+0x17/0x60 [ 2265.937169] ? register_shrinker+0x15f/0x220 [ 2265.941554] ? sget_userns+0x768/0xc10 [ 2265.945417] ? get_anon_bdev+0x1c0/0x1c0 [ 2265.949447] ? sget+0xd9/0x110 [ 2265.952613] ? fuse_get_root_inode+0xc0/0xc0 [ 2265.956996] mount_nodev+0x4c/0xf0 [ 2265.960523] mount_fs+0x92/0x2a0 [ 2265.963870] vfs_kern_mount.part.0+0x5b/0x470 [ 2265.968352] do_mount+0xe65/0x2a30 [ 2265.971870] ? __do_page_fault+0x159/0xad0 [ 2265.976077] ? retint_kernel+0x2d/0x2d [ 2265.979952] ? copy_mount_string+0x40/0x40 [ 2265.984169] ? memset+0x20/0x40 [ 2265.987420] ? copy_mount_options+0x1fa/0x2f0 [ 2265.991891] ? copy_mnt_ns+0xa30/0xa30 [ 2265.995752] SyS_mount+0xa8/0x120 [ 2265.999177] ? copy_mnt_ns+0xa30/0xa30 [ 2266.003042] do_syscall_64+0x1d5/0x640 [ 2266.006911] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2266.012084] RIP: 0033:0x7f53dd92e73a [ 2266.015775] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2266.023456] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2266.030702] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:46 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 74) [ 2266.037965] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2266.045236] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2266.052480] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x2a, 0x4, 0x0, {0x2, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/178, &(0x7f00000000c0)=0xb2) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030135db3ed303030303030303030303034303030302c757365725f69075d60b525e563643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) read$FUSE(r0, 0x0, 0x0) 03:06:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) (async) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000000)={0x2a, 0x4, 0x0, {0x2, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) (async) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/178, &(0x7f00000000c0)=0xb2) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030135db3ed303030303030303030303034303030302c757365725f69075d60b525e563643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) read$FUSE(r0, 0x0, 0x0) [ 2266.115327] FAULT_INJECTION: forcing a failure. [ 2266.115327] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.126778] CPU: 0 PID: 19751 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2266.134656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2266.144008] Call Trace: [ 2266.146599] dump_stack+0x1b2/0x281 [ 2266.150225] should_fail.cold+0x10a/0x149 [ 2266.154376] should_failslab+0xd6/0x130 [ 2266.158347] kmem_cache_alloc+0x28e/0x3c0 [ 2266.162491] alloc_inode+0xa0/0x170 [ 2266.166110] new_inode+0x1d/0xf0 [ 2266.169482] fuse_ctl_add_dentry+0x8d/0x410 [ 2266.173797] ? __lockdep_init_map+0x100/0x560 [ 2266.178289] fuse_ctl_add_conn+0x110/0x250 [ 2266.182515] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2266.187177] ? CIFSGetExtAttr+0x7c6/0xda0 [ 2266.191322] fuse_fill_super+0xe0c/0x15c0 [ 2266.195465] ? fuse_get_root_inode+0xc0/0xc0 [ 2266.199866] ? up_write+0x17/0x60 [ 2266.203309] ? register_shrinker+0x15f/0x220 [ 2266.207710] ? sget_userns+0x768/0xc10 [ 2266.211600] ? get_anon_bdev+0x1c0/0x1c0 [ 2266.215649] ? sget+0xd9/0x110 [ 2266.218836] ? fuse_get_root_inode+0xc0/0xc0 [ 2266.223226] mount_nodev+0x4c/0xf0 [ 2266.226742] mount_fs+0x92/0x2a0 [ 2266.230086] vfs_kern_mount.part.0+0x5b/0x470 [ 2266.234558] do_mount+0xe65/0x2a30 [ 2266.238074] ? __do_page_fault+0x159/0xad0 [ 2266.242283] ? retint_kernel+0x2d/0x2d [ 2266.246141] ? copy_mount_string+0x40/0x40 [ 2266.250351] ? memset+0x20/0x40 [ 2266.253605] ? copy_mount_options+0x1fa/0x2f0 [ 2266.258198] ? copy_mnt_ns+0xa30/0xa30 [ 2266.262078] SyS_mount+0xa8/0x120 [ 2266.265516] ? copy_mnt_ns+0xa30/0xa30 [ 2266.269542] do_syscall_64+0x1d5/0x640 [ 2266.273412] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2266.278579] RIP: 0033:0x7f53dd92e73a [ 2266.282269] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2266.289956] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2266.297203] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2266.304451] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:46 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0xd8, 0x0, r2, [{0x6, 0x7f, 0x5, 0x2, 'fuse\x00'}, {0x4, 0x9, 0x2, 0x40, 'fd'}, {0x4, 0x681c, 0x8, 0x2, 'group_id'}, {0x6, 0x2de, 0x5, 0x2, '#*:}!'}, {0x4, 0x20, 0xb, 0x3, '/dev/nvram\x00'}, {0x3, 0x80000001, 0x7, 0xfff, 'user_id'}]}, 0xd8) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0xd8, 0x0, r2, [{0x6, 0x7f, 0x5, 0x2, 'fuse\x00'}, {0x4, 0x9, 0x2, 0x40, 'fd'}, {0x4, 0x681c, 0x8, 0x2, 'group_id'}, {0x6, 0x2de, 0x5, 0x2, '#*:}!'}, {0x4, 0x20, 0xb, 0x3, '/dev/nvram\x00'}, {0x3, 0x80000001, 0x7, 0xfff, 'user_id'}]}, 0xd8) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 75) [ 2266.311695] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2266.318938] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2266.389709] FAULT_INJECTION: forcing a failure. [ 2266.389709] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.402626] CPU: 1 PID: 19778 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2266.410518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2266.419860] Call Trace: [ 2266.422425] dump_stack+0x1b2/0x281 [ 2266.426028] should_fail.cold+0x10a/0x149 [ 2266.430159] should_failslab+0xd6/0x130 [ 2266.434109] kmem_cache_alloc+0x28e/0x3c0 [ 2266.438240] __fuse_request_alloc+0x21/0xe0 [ 2266.442556] fuse_fill_super+0xc89/0x15c0 [ 2266.446685] ? fuse_get_root_inode+0xc0/0xc0 [ 2266.451067] ? up_write+0x17/0x60 [ 2266.454492] ? register_shrinker+0x15f/0x220 [ 2266.458875] ? sget_userns+0x768/0xc10 [ 2266.462754] ? get_anon_bdev+0x1c0/0x1c0 [ 2266.466799] ? sget+0xd9/0x110 [ 2266.469974] ? fuse_get_root_inode+0xc0/0xc0 [ 2266.474364] mount_nodev+0x4c/0xf0 [ 2266.477884] mount_fs+0x92/0x2a0 [ 2266.481231] vfs_kern_mount.part.0+0x5b/0x470 [ 2266.485715] do_mount+0xe65/0x2a30 [ 2266.489229] ? __do_page_fault+0x159/0xad0 [ 2266.493437] ? retint_kernel+0x2d/0x2d [ 2266.497299] ? copy_mount_string+0x40/0x40 [ 2266.501511] ? memset+0x20/0x40 [ 2266.504764] ? copy_mount_options+0x1fa/0x2f0 [ 2266.509240] ? copy_mnt_ns+0xa30/0xa30 [ 2266.513123] SyS_mount+0xa8/0x120 [ 2266.516550] ? copy_mnt_ns+0xa30/0xa30 [ 2266.520430] do_syscall_64+0x1d5/0x640 [ 2266.524297] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2266.529459] RIP: 0033:0x7f53dd92e73a 03:06:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) 03:06:47 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async, rerun: 64) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 64) read$FUSE(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000000000)={0x28, 0x0, r2, [{0x5, 0x3, 0x0, 0xfffff000}]}, 0x28) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2266.533146] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2266.540830] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2266.548080] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2266.555322] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2266.562579] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2266.569821] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:47 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, 0x0, 0x0) 03:06:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 76) 03:06:47 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0xd8, 0x0, r2, [{0x6, 0x7f, 0x5, 0x2, 'fuse\x00'}, {0x4, 0x9, 0x2, 0x40, 'fd'}, {0x4, 0x681c, 0x8, 0x2, 'group_id'}, {0x6, 0x2de, 0x5, 0x2, '#*:}!'}, {0x4, 0x20, 0xb, 0x3, '/dev/nvram\x00'}, {0x3, 0x80000001, 0x7, 0xfff, 'user_id'}]}, 0xd8) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0xd8, 0x0, r2, [{0x6, 0x7f, 0x5, 0x2, 'fuse\x00'}, {0x4, 0x9, 0x2, 0x40, 'fd'}, {0x4, 0x681c, 0x8, 0x2, 'group_id'}, {0x6, 0x2de, 0x5, 0x2, '#*:}!'}, {0x4, 0x20, 0xb, 0x3, '/dev/nvram\x00'}, {0x3, 0x80000001, 0x7, 0xfff, 'user_id'}]}, 0xd8) (async) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2266.685564] FAULT_INJECTION: forcing a failure. [ 2266.685564] name failslab, interval 1, probability 0, space 0, times 0 [ 2266.706669] CPU: 0 PID: 19818 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2266.714566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2266.723913] Call Trace: [ 2266.726502] dump_stack+0x1b2/0x281 [ 2266.730131] should_fail.cold+0x10a/0x149 [ 2266.734286] should_failslab+0xd6/0x130 [ 2266.738253] kmem_cache_alloc+0x28e/0x3c0 [ 2266.742385] alloc_inode+0xa0/0x170 [ 2266.745996] new_inode+0x1d/0xf0 [ 2266.749342] fuse_ctl_add_dentry+0x8d/0x410 [ 2266.753640] ? __lockdep_init_map+0x100/0x560 [ 2266.758114] fuse_ctl_add_conn+0x148/0x250 [ 2266.762453] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2266.767110] ? CIFSGetExtAttr+0x7c6/0xda0 [ 2266.771249] fuse_fill_super+0xe0c/0x15c0 [ 2266.775376] ? fuse_get_root_inode+0xc0/0xc0 [ 2266.779765] ? up_write+0x17/0x60 [ 2266.783202] ? register_shrinker+0x15f/0x220 [ 2266.787601] ? sget_userns+0x768/0xc10 [ 2266.791482] ? get_anon_bdev+0x1c0/0x1c0 [ 2266.795523] ? sget+0xd9/0x110 [ 2266.798700] ? fuse_get_root_inode+0xc0/0xc0 [ 2266.803099] mount_nodev+0x4c/0xf0 [ 2266.806623] mount_fs+0x92/0x2a0 [ 2266.809983] vfs_kern_mount.part.0+0x5b/0x470 [ 2266.814454] do_mount+0xe65/0x2a30 [ 2266.817979] ? __do_page_fault+0x159/0xad0 [ 2266.822191] ? retint_kernel+0x2d/0x2d [ 2266.826067] ? copy_mount_string+0x40/0x40 [ 2266.830277] ? memset+0x20/0x40 [ 2266.833549] ? copy_mount_options+0x1fa/0x2f0 [ 2266.838025] ? copy_mnt_ns+0xa30/0xa30 [ 2266.841886] SyS_mount+0xa8/0x120 [ 2266.845312] ? copy_mnt_ns+0xa30/0xa30 [ 2266.849173] do_syscall_64+0x1d5/0x640 [ 2266.853039] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2266.858202] RIP: 0033:0x7f53dd92e73a [ 2266.861897] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2266.869581] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2266.876844] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 77) [ 2266.884107] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2266.891354] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2266.898617] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2266.941263] FAULT_INJECTION: forcing a failure. [ 2266.941263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2266.953075] CPU: 1 PID: 19834 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2266.960943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2266.970284] Call Trace: [ 2266.972846] dump_stack+0x1b2/0x281 [ 2266.976457] should_fail.cold+0x10a/0x149 [ 2266.980583] __alloc_pages_nodemask+0x22c/0x2720 [ 2266.985315] ? fuse_ctl_add_conn+0x148/0x250 [ 2266.989697] ? mount_nodev+0x4c/0xf0 [ 2266.993387] ? mount_fs+0x92/0x2a0 [ 2266.996904] ? __lock_acquire+0x5fc/0x3f20 [ 2267.001115] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2267.005934] ? trace_hardirqs_on+0x10/0x10 [ 2267.010145] ? fs_reclaim_release+0xd0/0x110 [ 2267.014531] ? __d_alloc+0x2a/0xa20 [ 2267.018141] cache_grow_begin+0x91/0x700 [ 2267.022177] ? fs_reclaim_release+0xd0/0x110 [ 2267.026562] ? check_preemption_disabled+0x35/0x240 [ 2267.031557] cache_alloc_refill+0x273/0x350 [ 2267.035869] kmem_cache_alloc+0x333/0x3c0 [ 2267.040002] alloc_inode+0xa0/0x170 [ 2267.043613] new_inode+0x1d/0xf0 [ 2267.046963] fuse_ctl_add_dentry+0x8d/0x410 [ 2267.051260] ? __lockdep_init_map+0x100/0x560 [ 2267.055730] fuse_ctl_add_conn+0x148/0x250 [ 2267.059944] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2267.064593] ? CIFSGetExtAttr+0x7c6/0xda0 [ 2267.068740] fuse_fill_super+0xe0c/0x15c0 [ 2267.072876] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.077264] ? up_write+0x17/0x60 [ 2267.080697] ? register_shrinker+0x15f/0x220 [ 2267.085085] ? sget_userns+0x768/0xc10 [ 2267.088964] ? get_anon_bdev+0x1c0/0x1c0 [ 2267.092995] ? sget+0xd9/0x110 [ 2267.096162] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.100573] mount_nodev+0x4c/0xf0 [ 2267.104099] mount_fs+0x92/0x2a0 [ 2267.107443] vfs_kern_mount.part.0+0x5b/0x470 [ 2267.111915] do_mount+0xe65/0x2a30 [ 2267.115436] ? __do_page_fault+0x159/0xad0 [ 2267.119655] ? retint_kernel+0x2d/0x2d [ 2267.123536] ? copy_mount_string+0x40/0x40 [ 2267.127752] ? memset+0x20/0x40 [ 2267.131012] ? copy_mount_options+0x1fa/0x2f0 [ 2267.135498] ? copy_mnt_ns+0xa30/0xa30 [ 2267.139370] SyS_mount+0xa8/0x120 [ 2267.142808] ? copy_mnt_ns+0xa30/0xa30 [ 2267.146673] do_syscall_64+0x1d5/0x640 [ 2267.150540] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2267.155756] RIP: 0033:0x7f53dd92e73a [ 2267.159443] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2267.167133] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2267.174377] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2267.181635] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:47 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:47 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) 03:06:47 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 78) [ 2267.188978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2267.196220] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2267.259772] FAULT_INJECTION: forcing a failure. [ 2267.259772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2267.271583] CPU: 1 PID: 19860 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2267.279456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2267.288805] Call Trace: [ 2267.291390] dump_stack+0x1b2/0x281 [ 2267.295009] should_fail.cold+0x10a/0x149 [ 2267.299141] __alloc_pages_nodemask+0x22c/0x2720 [ 2267.303895] ? fuse_ctl_add_conn+0x148/0x250 [ 2267.308277] ? mount_nodev+0x4c/0xf0 [ 2267.311962] ? mount_fs+0x92/0x2a0 [ 2267.315477] ? __lock_acquire+0x5fc/0x3f20 [ 2267.319687] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2267.324500] ? trace_hardirqs_on+0x10/0x10 [ 2267.328713] ? fs_reclaim_release+0xd0/0x110 [ 2267.333114] ? __d_alloc+0x2a/0xa20 [ 2267.336717] cache_grow_begin+0x91/0x700 [ 2267.340762] ? fs_reclaim_release+0xd0/0x110 [ 2267.345144] ? check_preemption_disabled+0x35/0x240 [ 2267.350136] cache_alloc_refill+0x273/0x350 [ 2267.354450] kmem_cache_alloc+0x333/0x3c0 [ 2267.358586] alloc_inode+0xa0/0x170 [ 2267.362196] new_inode+0x1d/0xf0 [ 2267.365557] fuse_ctl_add_dentry+0x8d/0x410 [ 2267.369858] ? __lockdep_init_map+0x100/0x560 [ 2267.374333] fuse_ctl_add_conn+0x148/0x250 [ 2267.378546] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2267.383189] ? CIFSGetExtAttr+0x8c6/0xda0 [ 2267.387313] fuse_fill_super+0xe0c/0x15c0 [ 2267.391436] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.395840] ? up_write+0x17/0x60 [ 2267.399272] ? register_shrinker+0x15f/0x220 [ 2267.403656] ? sget_userns+0x768/0xc10 [ 2267.407523] ? get_anon_bdev+0x1c0/0x1c0 [ 2267.411555] ? sget+0xd9/0x110 [ 2267.414742] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.419125] mount_nodev+0x4c/0xf0 [ 2267.422640] mount_fs+0x92/0x2a0 [ 2267.425984] vfs_kern_mount.part.0+0x5b/0x470 [ 2267.430452] do_mount+0xe65/0x2a30 [ 2267.433971] ? __do_page_fault+0x159/0xad0 [ 2267.438181] ? retint_kernel+0x2d/0x2d [ 2267.442042] ? copy_mount_string+0x40/0x40 [ 2267.446257] ? memset+0x20/0x40 [ 2267.449510] ? copy_mount_options+0x1fa/0x2f0 [ 2267.454063] ? copy_mnt_ns+0xa30/0xa30 [ 2267.457922] SyS_mount+0xa8/0x120 [ 2267.461347] ? copy_mnt_ns+0xa30/0xa30 [ 2267.465212] do_syscall_64+0x1d5/0x640 [ 2267.469083] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2267.474244] RIP: 0033:0x7f53dd92e73a [ 2267.477926] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2267.485604] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2267.492847] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2267.500087] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 03:06:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) 03:06:48 executing program 5: r0 = socket(0x22, 0x4, 0x6) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:48 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 79) [ 2267.507330] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2267.514572] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:48 executing program 5: r0 = socket(0x22, 0x4, 0x6) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) socket(0x22, 0x4, 0x6) (async) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2267.596375] FAULT_INJECTION: forcing a failure. [ 2267.596375] name failslab, interval 1, probability 0, space 0, times 0 [ 2267.607949] CPU: 0 PID: 19882 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2267.615832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2267.625177] Call Trace: [ 2267.627761] dump_stack+0x1b2/0x281 [ 2267.631386] should_fail.cold+0x10a/0x149 [ 2267.635528] should_failslab+0xd6/0x130 [ 2267.639506] kmem_cache_alloc+0x28e/0x3c0 [ 2267.643651] __d_alloc+0x2a/0xa20 [ 2267.647104] ? lock_acquire+0x170/0x3f0 [ 2267.651074] d_alloc+0x46/0x240 [ 2267.654352] d_alloc_name+0x70/0x80 [ 2267.657980] ? d_alloc+0x240/0x240 [ 2267.661518] fuse_ctl_add_dentry+0x70/0x410 [ 2267.665838] ? __lockdep_init_map+0x100/0x560 [ 2267.670326] fuse_ctl_add_conn+0x1e0/0x250 [ 2267.674553] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2267.679213] ? CIFSGetExtAttr+0x8c6/0xda0 [ 2267.683347] fuse_fill_super+0xe0c/0x15c0 [ 2267.687470] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.691874] ? up_write+0x17/0x60 [ 2267.695305] ? register_shrinker+0x15f/0x220 [ 2267.699688] ? sget_userns+0x768/0xc10 [ 2267.703550] ? get_anon_bdev+0x1c0/0x1c0 [ 2267.707586] ? sget+0xd9/0x110 [ 2267.710765] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.715159] mount_nodev+0x4c/0xf0 [ 2267.718684] mount_fs+0x92/0x2a0 [ 2267.722036] vfs_kern_mount.part.0+0x5b/0x470 [ 2267.726508] do_mount+0xe65/0x2a30 [ 2267.730028] ? __do_page_fault+0x159/0xad0 [ 2267.734236] ? retint_kernel+0x2d/0x2d [ 2267.738098] ? copy_mount_string+0x40/0x40 [ 2267.742309] ? memset+0x20/0x40 [ 2267.745563] ? copy_mount_options+0x1fa/0x2f0 [ 2267.750033] ? copy_mnt_ns+0xa30/0xa30 [ 2267.753903] SyS_mount+0xa8/0x120 [ 2267.757341] ? copy_mnt_ns+0xa30/0xa30 [ 2267.761203] do_syscall_64+0x1d5/0x640 [ 2267.765070] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2267.770232] RIP: 0033:0x7f53dd92e73a [ 2267.773914] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2267.781597] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2267.788844] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:48 executing program 5: r0 = socket(0x22, 0x4, 0x6) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) socket(0x22, 0x4, 0x6) (async) getsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000000), &(0x7f00000000c0)=0x4) (async) syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, 0x0) (async) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) 03:06:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 80) [ 2267.796087] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2267.803348] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2267.810602] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:48 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0xa104}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:48 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0xa104}}, 0x18) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2267.881152] FAULT_INJECTION: forcing a failure. [ 2267.881152] name failslab, interval 1, probability 0, space 0, times 0 [ 2267.908386] CPU: 1 PID: 19915 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2267.916284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2267.925631] Call Trace: [ 2267.928216] dump_stack+0x1b2/0x281 [ 2267.931839] should_fail.cold+0x10a/0x149 [ 2267.935973] should_failslab+0xd6/0x130 [ 2267.939931] kmem_cache_alloc+0x28e/0x3c0 [ 2267.944073] alloc_inode+0xa0/0x170 [ 2267.947674] new_inode+0x1d/0xf0 [ 2267.951031] fuse_ctl_add_dentry+0x8d/0x410 [ 2267.955328] ? __lockdep_init_map+0x100/0x560 [ 2267.959806] fuse_ctl_add_conn+0x148/0x250 [ 2267.964040] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2267.968694] ? CIFSGetExtAttr+0x8c6/0xda0 [ 2267.972836] fuse_fill_super+0xe0c/0x15c0 [ 2267.976983] ? fuse_get_root_inode+0xc0/0xc0 [ 2267.981378] ? up_write+0x17/0x60 [ 2267.984822] ? register_shrinker+0x15f/0x220 [ 2267.989207] ? sget_userns+0x768/0xc10 [ 2267.993073] ? get_anon_bdev+0x1c0/0x1c0 [ 2267.997109] ? sget+0xd9/0x110 [ 2268.000286] ? fuse_get_root_inode+0xc0/0xc0 [ 2268.004683] mount_nodev+0x4c/0xf0 [ 2268.008208] mount_fs+0x92/0x2a0 [ 2268.011558] vfs_kern_mount.part.0+0x5b/0x470 [ 2268.016027] do_mount+0xe65/0x2a30 [ 2268.019555] ? __do_page_fault+0x159/0xad0 [ 2268.023773] ? retint_kernel+0x2d/0x2d [ 2268.027640] ? copy_mount_string+0x40/0x40 [ 2268.031850] ? memset+0x20/0x40 [ 2268.035103] ? copy_mount_options+0x1fa/0x2f0 [ 2268.039578] ? copy_mnt_ns+0xa30/0xa30 [ 2268.043467] SyS_mount+0xa8/0x120 [ 2268.046898] ? copy_mnt_ns+0xa30/0xa30 [ 2268.050766] do_syscall_64+0x1d5/0x640 [ 2268.054631] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2268.059806] RIP: 0033:0x7f53dd92e73a [ 2268.063499] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2268.071191] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:48 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:48 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18, 0x1, 0x0, {0xa104}}, 0x18) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}]}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:48 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) read$FUSE(r0, 0x0, 0x0) (async) [ 2268.078447] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2268.085700] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2268.092950] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2268.100204] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) 03:06:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 81) 03:06:49 executing program 5: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:49 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) [ 2268.417080] FAULT_INJECTION: forcing a failure. [ 2268.417080] name failslab, interval 1, probability 0, space 0, times 0 [ 2268.438111] CPU: 0 PID: 19957 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2268.446012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2268.455364] Call Trace: [ 2268.457953] dump_stack+0x1b2/0x281 [ 2268.461583] should_fail.cold+0x10a/0x149 [ 2268.465736] should_failslab+0xd6/0x130 [ 2268.469715] kmem_cache_alloc+0x28e/0x3c0 [ 2268.473871] alloc_inode+0xa0/0x170 [ 2268.477504] new_inode+0x1d/0xf0 [ 2268.480879] fuse_ctl_add_dentry+0x8d/0x410 [ 2268.485195] ? __lockdep_init_map+0x100/0x560 [ 2268.489691] fuse_ctl_add_conn+0x1b0/0x250 [ 2268.493925] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2268.498605] ? SMBQueryInformation+0x125/0x910 [ 2268.503192] fuse_fill_super+0xe0c/0x15c0 [ 2268.507340] ? fuse_get_root_inode+0xc0/0xc0 [ 2268.511744] ? up_write+0x17/0x60 [ 2268.515189] ? register_shrinker+0x15f/0x220 [ 2268.519592] ? sget_userns+0x768/0xc10 [ 2268.523474] ? get_anon_bdev+0x1c0/0x1c0 [ 2268.527519] ? sget+0xd9/0x110 [ 2268.530706] ? fuse_get_root_inode+0xc0/0xc0 [ 2268.535105] mount_nodev+0x4c/0xf0 [ 2268.538637] mount_fs+0x92/0x2a0 [ 2268.541999] vfs_kern_mount.part.0+0x5b/0x470 [ 2268.546489] do_mount+0xe65/0x2a30 [ 2268.550019] ? __do_page_fault+0x159/0xad0 [ 2268.554249] ? retint_kernel+0x2d/0x2d [ 2268.558129] ? copy_mount_string+0x40/0x40 [ 2268.562361] ? memset+0x20/0x40 [ 2268.565622] ? copy_mount_options+0x1fa/0x2f0 [ 2268.570101] ? copy_mnt_ns+0xa30/0xa30 [ 2268.573972] SyS_mount+0xa8/0x120 [ 2268.577401] ? copy_mnt_ns+0xa30/0xa30 [ 2268.581268] do_syscall_64+0x1d5/0x640 [ 2268.585136] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2268.590306] RIP: 0033:0x7f53dd92e73a [ 2268.594001] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2268.601687] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2268.608935] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 03:06:49 executing program 5: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 82) 03:06:49 executing program 5: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 2268.616189] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2268.623433] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2268.630687] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2268.685236] FAULT_INJECTION: forcing a failure. [ 2268.685236] name failslab, interval 1, probability 0, space 0, times 0 [ 2268.706833] CPU: 0 PID: 19983 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2268.714767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2268.724110] Call Trace: [ 2268.726694] dump_stack+0x1b2/0x281 [ 2268.730321] should_fail.cold+0x10a/0x149 [ 2268.734469] should_failslab+0xd6/0x130 [ 2268.738440] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2268.743105] get_mountpoint+0xc3/0x320 [ 2268.746988] lock_mount+0x106/0x450 [ 2268.750612] ? lookup_mnt+0x3b0/0x3b0 [ 2268.754413] ? do_mount+0x1693/0x2a30 [ 2268.758204] do_add_mount+0x63/0x4f0 [ 2268.761909] ? graft_tree+0x1c0/0x1c0 [ 2268.765707] do_mount+0x1540/0x2a30 [ 2268.769332] ? __do_page_fault+0x159/0xad0 [ 2268.773556] ? retint_kernel+0x2d/0x2d [ 2268.777441] ? copy_mount_string+0x40/0x40 [ 2268.781666] ? memset+0x20/0x40 03:06:49 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = getuid() read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() r4 = getuid() write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x4, 0x7, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) r5 = getuid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002700)={0x5b8, 0x0, 0x0, [{{0x3, 0x3, 0x10000, 0xfffffffffffffff7, 0x8, 0xa3, {0x6, 0x20, 0xad3, 0x6, 0xffffffff, 0x2, 0x80000000, 0x4, 0x9, 0x8000, 0x7, r1, 0xee00, 0xd2, 0x6}}, {0x5, 0xa76, 0x6, 0x1f, '^-(@)a'}}, {{0x6, 0x3, 0x5, 0x1, 0x8, 0x9, {0x3, 0x8, 0x4a2, 0x7ff, 0x0, 0x7, 0x80000000, 0x400, 0x0, 0x4000, 0x9, 0xee00, 0x0, 0x9, 0x7}}, {0x3, 0x7, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x1, 0x10000, 0x0, 0x7, 0x5, {0x5, 0x6, 0xfffffffffffff801, 0x5, 0x0, 0x5, 0x7fff, 0x3f, 0x8, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff, 0x10000, 0x7}}, {0x4, 0x5000000000000, 0x1, 0x8, '&'}}, {{0x2, 0x1, 0x8000000000000000, 0x4, 0x3ff, 0x4b7b0470, {0x0, 0x2, 0xfffffffffffffff8, 0x4ed40e6b, 0x3, 0x3, 0x800, 0x7, 0x48, 0xc000, 0x3, 0xee01, r2, 0x2, 0xb10}}, {0x6, 0x8, 0x0, 0x7}}, {{0x6, 0x3, 0x9, 0x3ff, 0x0, 0x401, {0x2, 0x3, 0x1, 0x8, 0x7fffffffffffffff, 0xfffffffffffeffff, 0x2, 0xb6, 0x74b, 0x8000, 0xfffffffa, 0xee01, 0xee01, 0xb1, 0x800}}, {0x5, 0x7f, 0x5, 0x3, 'fuse\x00'}}, {{0x0, 0x0, 0x7fffffffffffffff, 0xc362, 0x4, 0x0, {0x2, 0x32, 0x6, 0x2, 0x6ef23317, 0x115, 0x3ff, 0x1f, 0x74b5, 0x1000, 0x1, r3, 0xee00, 0x20000000, 0x80000000}}, {0x0, 0x9, 0xa, 0x5, '/dev/fuse\x00'}}, {{0x4, 0x3, 0x0, 0x3, 0x80000000, 0x0, {0x0, 0x63, 0x4c6, 0x8000000000000000, 0x0, 0x4, 0x400, 0x59, 0x9ed, 0x1000, 0x9, 0x0, 0xee01, 0x3ff, 0x2}}, {0x2, 0x24000000, 0x5, 0xbf, 'fuse\x00'}}, {{0x4, 0x1, 0x40, 0x80000001, 0x10000, 0x8, {0x5, 0x101, 0xff, 0x6, 0x7, 0x800000000000, 0x8001, 0x3, 0x6, 0x18000, 0x8, r4, 0xee01, 0x1, 0x9}}, {0x4, 0x29c, 0x5, 0x4, 'fuse\x00'}}, {{0x4, 0x0, 0x40, 0x7, 0x1, 0x3, {0x0, 0x1, 0x100, 0x7, 0x15, 0xffffffffffffffff, 0x7fffffff, 0x2, 0x3, 0x2000, 0x400, r5, 0xee01, 0x1d, 0x1f}}, {0x0, 0x1, 0x5, 0x5, 'fuse\x00'}}]}, 0x5b8) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000p000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:49 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = getuid() read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() r4 = getuid() write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x4, 0x7, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) r5 = getuid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002700)={0x5b8, 0x0, 0x0, [{{0x3, 0x3, 0x10000, 0xfffffffffffffff7, 0x8, 0xa3, {0x6, 0x20, 0xad3, 0x6, 0xffffffff, 0x2, 0x80000000, 0x4, 0x9, 0x8000, 0x7, r1, 0xee00, 0xd2, 0x6}}, {0x5, 0xa76, 0x6, 0x1f, '^-(@)a'}}, {{0x6, 0x3, 0x5, 0x1, 0x8, 0x9, {0x3, 0x8, 0x4a2, 0x7ff, 0x0, 0x7, 0x80000000, 0x400, 0x0, 0x4000, 0x9, 0xee00, 0x0, 0x9, 0x7}}, {0x3, 0x7, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x1, 0x10000, 0x0, 0x7, 0x5, {0x5, 0x6, 0xfffffffffffff801, 0x5, 0x0, 0x5, 0x7fff, 0x3f, 0x8, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff, 0x10000, 0x7}}, {0x4, 0x5000000000000, 0x1, 0x8, '&'}}, {{0x2, 0x1, 0x8000000000000000, 0x4, 0x3ff, 0x4b7b0470, {0x0, 0x2, 0xfffffffffffffff8, 0x4ed40e6b, 0x3, 0x3, 0x800, 0x7, 0x48, 0xc000, 0x3, 0xee01, r2, 0x2, 0xb10}}, {0x6, 0x8, 0x0, 0x7}}, {{0x6, 0x3, 0x9, 0x3ff, 0x0, 0x401, {0x2, 0x3, 0x1, 0x8, 0x7fffffffffffffff, 0xfffffffffffeffff, 0x2, 0xb6, 0x74b, 0x8000, 0xfffffffa, 0xee01, 0xee01, 0xb1, 0x800}}, {0x5, 0x7f, 0x5, 0x3, 'fuse\x00'}}, {{0x0, 0x0, 0x7fffffffffffffff, 0xc362, 0x4, 0x0, {0x2, 0x32, 0x6, 0x2, 0x6ef23317, 0x115, 0x3ff, 0x1f, 0x74b5, 0x1000, 0x1, r3, 0xee00, 0x20000000, 0x80000000}}, {0x0, 0x9, 0xa, 0x5, '/dev/fuse\x00'}}, {{0x4, 0x3, 0x0, 0x3, 0x80000000, 0x0, {0x0, 0x63, 0x4c6, 0x8000000000000000, 0x0, 0x4, 0x400, 0x59, 0x9ed, 0x1000, 0x9, 0x0, 0xee01, 0x3ff, 0x2}}, {0x2, 0x24000000, 0x5, 0xbf, 'fuse\x00'}}, {{0x4, 0x1, 0x40, 0x80000001, 0x10000, 0x8, {0x5, 0x101, 0xff, 0x6, 0x7, 0x800000000000, 0x8001, 0x3, 0x6, 0x18000, 0x8, r4, 0xee01, 0x1, 0x9}}, {0x4, 0x29c, 0x5, 0x4, 'fuse\x00'}}, {{0x4, 0x0, 0x40, 0x7, 0x1, 0x3, {0x0, 0x1, 0x100, 0x7, 0x15, 0xffffffffffffffff, 0x7fffffff, 0x2, 0x3, 0x2000, 0x400, r5, 0xee01, 0x1d, 0x1f}}, {0x0, 0x1, 0x5, 0x5, 'fuse\x00'}}]}, 0x5b8) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000p000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) getuid() (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) (async) getuid() (async) getuid() (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x4, 0x7, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) (async) getuid() (async) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002700)={0x5b8, 0x0, 0x0, [{{0x3, 0x3, 0x10000, 0xfffffffffffffff7, 0x8, 0xa3, {0x6, 0x20, 0xad3, 0x6, 0xffffffff, 0x2, 0x80000000, 0x4, 0x9, 0x8000, 0x7, r1, 0xee00, 0xd2, 0x6}}, {0x5, 0xa76, 0x6, 0x1f, '^-(@)a'}}, {{0x6, 0x3, 0x5, 0x1, 0x8, 0x9, {0x3, 0x8, 0x4a2, 0x7ff, 0x0, 0x7, 0x80000000, 0x400, 0x0, 0x4000, 0x9, 0xee00, 0x0, 0x9, 0x7}}, {0x3, 0x7, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x1, 0x10000, 0x0, 0x7, 0x5, {0x5, 0x6, 0xfffffffffffff801, 0x5, 0x0, 0x5, 0x7fff, 0x3f, 0x8, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff, 0x10000, 0x7}}, {0x4, 0x5000000000000, 0x1, 0x8, '&'}}, {{0x2, 0x1, 0x8000000000000000, 0x4, 0x3ff, 0x4b7b0470, {0x0, 0x2, 0xfffffffffffffff8, 0x4ed40e6b, 0x3, 0x3, 0x800, 0x7, 0x48, 0xc000, 0x3, 0xee01, r2, 0x2, 0xb10}}, {0x6, 0x8, 0x0, 0x7}}, {{0x6, 0x3, 0x9, 0x3ff, 0x0, 0x401, {0x2, 0x3, 0x1, 0x8, 0x7fffffffffffffff, 0xfffffffffffeffff, 0x2, 0xb6, 0x74b, 0x8000, 0xfffffffa, 0xee01, 0xee01, 0xb1, 0x800}}, {0x5, 0x7f, 0x5, 0x3, 'fuse\x00'}}, {{0x0, 0x0, 0x7fffffffffffffff, 0xc362, 0x4, 0x0, {0x2, 0x32, 0x6, 0x2, 0x6ef23317, 0x115, 0x3ff, 0x1f, 0x74b5, 0x1000, 0x1, r3, 0xee00, 0x20000000, 0x80000000}}, {0x0, 0x9, 0xa, 0x5, '/dev/fuse\x00'}}, {{0x4, 0x3, 0x0, 0x3, 0x80000000, 0x0, {0x0, 0x63, 0x4c6, 0x8000000000000000, 0x0, 0x4, 0x400, 0x59, 0x9ed, 0x1000, 0x9, 0x0, 0xee01, 0x3ff, 0x2}}, {0x2, 0x24000000, 0x5, 0xbf, 'fuse\x00'}}, {{0x4, 0x1, 0x40, 0x80000001, 0x10000, 0x8, {0x5, 0x101, 0xff, 0x6, 0x7, 0x800000000000, 0x8001, 0x3, 0x6, 0x18000, 0x8, r4, 0xee01, 0x1, 0x9}}, {0x4, 0x29c, 0x5, 0x4, 'fuse\x00'}}, {{0x4, 0x0, 0x40, 0x7, 0x1, 0x3, {0x0, 0x1, 0x100, 0x7, 0x15, 0xffffffffffffffff, 0x7fffffff, 0x2, 0x3, 0x2000, 0x400, r5, 0xee01, 0x1d, 0x1f}}, {0x0, 0x1, 0x5, 0x5, 'fuse\x00'}}]}, 0x5b8) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000p000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) (async) [ 2268.784934] ? copy_mount_options+0x1fa/0x2f0 [ 2268.789420] ? copy_mnt_ns+0xa30/0xa30 [ 2268.793297] SyS_mount+0xa8/0x120 [ 2268.796739] ? copy_mnt_ns+0xa30/0xa30 [ 2268.800622] do_syscall_64+0x1d5/0x640 [ 2268.804506] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2268.809679] RIP: 0033:0x7f53dd92e73a [ 2268.813377] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2268.821076] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2268.828334] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2268.835597] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2268.842859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2268.850122] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:49 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="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"]) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:49 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = getuid() (async) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r3 = getuid() r4 = getuid() (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000000)={0x2f, 0x4, 0x0, {0x4, 0x7, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) (async, rerun: 32) r5 = getuid() (rerun: 32) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002700)={0x5b8, 0x0, 0x0, [{{0x3, 0x3, 0x10000, 0xfffffffffffffff7, 0x8, 0xa3, {0x6, 0x20, 0xad3, 0x6, 0xffffffff, 0x2, 0x80000000, 0x4, 0x9, 0x8000, 0x7, r1, 0xee00, 0xd2, 0x6}}, {0x5, 0xa76, 0x6, 0x1f, '^-(@)a'}}, {{0x6, 0x3, 0x5, 0x1, 0x8, 0x9, {0x3, 0x8, 0x4a2, 0x7ff, 0x0, 0x7, 0x80000000, 0x400, 0x0, 0x4000, 0x9, 0xee00, 0x0, 0x9, 0x7}}, {0x3, 0x7, 0xa, 0x1, '/dev/fuse\x00'}}, {{0x6, 0x1, 0x10000, 0x0, 0x7, 0x5, {0x5, 0x6, 0xfffffffffffff801, 0x5, 0x0, 0x5, 0x7fff, 0x3f, 0x8, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff, 0x10000, 0x7}}, {0x4, 0x5000000000000, 0x1, 0x8, '&'}}, {{0x2, 0x1, 0x8000000000000000, 0x4, 0x3ff, 0x4b7b0470, {0x0, 0x2, 0xfffffffffffffff8, 0x4ed40e6b, 0x3, 0x3, 0x800, 0x7, 0x48, 0xc000, 0x3, 0xee01, r2, 0x2, 0xb10}}, {0x6, 0x8, 0x0, 0x7}}, {{0x6, 0x3, 0x9, 0x3ff, 0x0, 0x401, {0x2, 0x3, 0x1, 0x8, 0x7fffffffffffffff, 0xfffffffffffeffff, 0x2, 0xb6, 0x74b, 0x8000, 0xfffffffa, 0xee01, 0xee01, 0xb1, 0x800}}, {0x5, 0x7f, 0x5, 0x3, 'fuse\x00'}}, {{0x0, 0x0, 0x7fffffffffffffff, 0xc362, 0x4, 0x0, {0x2, 0x32, 0x6, 0x2, 0x6ef23317, 0x115, 0x3ff, 0x1f, 0x74b5, 0x1000, 0x1, r3, 0xee00, 0x20000000, 0x80000000}}, {0x0, 0x9, 0xa, 0x5, '/dev/fuse\x00'}}, {{0x4, 0x3, 0x0, 0x3, 0x80000000, 0x0, {0x0, 0x63, 0x4c6, 0x8000000000000000, 0x0, 0x4, 0x400, 0x59, 0x9ed, 0x1000, 0x9, 0x0, 0xee01, 0x3ff, 0x2}}, {0x2, 0x24000000, 0x5, 0xbf, 'fuse\x00'}}, {{0x4, 0x1, 0x40, 0x80000001, 0x10000, 0x8, {0x5, 0x101, 0xff, 0x6, 0x7, 0x800000000000, 0x8001, 0x3, 0x6, 0x18000, 0x8, r4, 0xee01, 0x1, 0x9}}, {0x4, 0x29c, 0x5, 0x4, 'fuse\x00'}}, {{0x4, 0x0, 0x40, 0x7, 0x1, 0x3, {0x0, 0x1, 0x100, 0x7, 0x15, 0xffffffffffffffff, 0x7fffffff, 0x2, 0x3, 0x2000, 0x400, r5, 0xee01, 0x1d, 0x1f}}, {0x0, 0x1, 0x5, 0x5, 'fuse\x00'}}]}, 0x5b8) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000p000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) 03:06:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 83) [ 2269.066444] FAULT_INJECTION: forcing a failure. [ 2269.066444] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.095290] CPU: 0 PID: 20024 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2269.103182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2269.112528] Call Trace: [ 2269.115113] dump_stack+0x1b2/0x281 [ 2269.118734] should_fail.cold+0x10a/0x149 [ 2269.122876] should_failslab+0xd6/0x130 [ 2269.126842] kmem_cache_alloc+0x28e/0x3c0 [ 2269.130980] alloc_inode+0xa0/0x170 [ 2269.134600] new_inode+0x1d/0xf0 [ 2269.137962] fuse_ctl_add_dentry+0x8d/0x410 [ 2269.142271] ? __lockdep_init_map+0x100/0x560 [ 2269.146761] fuse_ctl_add_conn+0x1b0/0x250 [ 2269.150980] ? fuse_ctl_remove_conn+0x1a0/0x1a0 [ 2269.155630] ? CIFSGetExtAttr+0x5c6/0xda0 [ 2269.159762] fuse_fill_super+0xe0c/0x15c0 [ 2269.163891] ? fuse_get_root_inode+0xc0/0xc0 [ 2269.168273] ? up_write+0x17/0x60 [ 2269.171702] ? register_shrinker+0x15f/0x220 [ 2269.176086] ? sget_userns+0x768/0xc10 [ 2269.179961] ? get_anon_bdev+0x1c0/0x1c0 [ 2269.184063] ? sget+0xd9/0x110 [ 2269.187243] ? fuse_get_root_inode+0xc0/0xc0 [ 2269.191630] mount_nodev+0x4c/0xf0 [ 2269.195152] mount_fs+0x92/0x2a0 [ 2269.198502] vfs_kern_mount.part.0+0x5b/0x470 [ 2269.202997] do_mount+0xe65/0x2a30 [ 2269.206537] ? __do_page_fault+0x159/0xad0 [ 2269.210768] ? retint_kernel+0x2d/0x2d [ 2269.214645] ? copy_mount_string+0x40/0x40 [ 2269.218874] ? memset+0x20/0x40 [ 2269.222129] ? copy_mount_options+0x1fa/0x2f0 [ 2269.226605] ? copy_mnt_ns+0xa30/0xa30 [ 2269.230480] SyS_mount+0xa8/0x120 [ 2269.233920] ? copy_mnt_ns+0xa30/0xa30 [ 2269.237788] do_syscall_64+0x1d5/0x640 [ 2269.241659] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2269.246823] RIP: 0033:0x7f53dd92e73a [ 2269.250511] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2269.258220] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a 03:06:49 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_GETXATTR(r1, &(0x7f0000000000)={0x18, 0x0, r3, {0x4}}, 0x18) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000800,default_perw_other,allow_other,\x00']) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r5, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r6, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r7 = getuid() write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, r6, {{0x1, 0x1, 0x4, 0x1, 0x10000, 0x8, {0x4, 0x0, 0x9, 0x0, 0x8, 0x8, 0x3, 0x904d, 0x7f, 0x4000, 0x5, r7, r4, 0x101, 0x96a5}}, {0x0, 0x18}}}, 0xa0) read$FUSE(r0, 0x0, 0x0) 03:06:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000240)={0x1f, @none}, 0x8) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = getuid() r4 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x90081, 0x0) write$FUSE_NOTIFY_POLL(r5, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x1}}, 0x18) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c04000000756c745f7065726d697373696f6e732c6d61785f726561643d3078303030303030303030303030303030372c6d61736b3d5e4d41595f415050454e442c6f626a5f757365723d6b3d5e4d41595f455845432c666f776e65723d", @ANYRESDEC, @ANYBLOB=',\x00']) 03:06:49 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = getegid() syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, r1}}) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x3}}, 0x18) 03:06:49 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000004180)={0x2020}, 0x2020) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x400}}, 0x18) 03:06:49 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) (fail_nth: 84) [ 2269.265465] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2269.272715] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2269.279964] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2269.287209] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2269.345634] FAULT_INJECTION: forcing a failure. [ 2269.345634] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.360690] CPU: 0 PID: 20039 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2269.368620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2269.377967] Call Trace: [ 2269.380549] dump_stack+0x1b2/0x281 [ 2269.384174] should_fail.cold+0x10a/0x149 [ 2269.388317] should_failslab+0xd6/0x130 [ 2269.392295] __kmalloc_track_caller+0x2bc/0x400 [ 2269.396957] ? do_mount+0x1e41/0x2a30 [ 2269.400762] kstrdup+0x36/0x70 [ 2269.403945] do_mount+0x1e41/0x2a30 [ 2269.407579] ? __do_page_fault+0x159/0xad0 [ 2269.411806] ? retint_kernel+0x2d/0x2d [ 2269.415688] ? copy_mount_string+0x40/0x40 [ 2269.419921] ? memset+0x20/0x40 [ 2269.423194] ? copy_mount_options+0x1fa/0x2f0 [ 2269.427682] ? copy_mnt_ns+0xa30/0xa30 [ 2269.431562] SyS_mount+0xa8/0x120 [ 2269.435013] ? copy_mnt_ns+0xa30/0xa30 [ 2269.438895] do_syscall_64+0x1d5/0x640 [ 2269.442778] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2269.447948] RIP: 0033:0x7f53dd92e73a [ 2269.451633] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2269.459322] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2269.466576] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2269.473839] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2269.481084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2269.488332] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 03:06:50 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_GETXATTR(r1, &(0x7f0000000000)={0x18, 0x0, r3, {0x4}}, 0x18) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000800,default_perw_other,allow_other,\x00']) (async) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r5, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r6, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r7 = getuid() write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, r6, {{0x1, 0x1, 0x4, 0x1, 0x10000, 0x8, {0x4, 0x0, 0x9, 0x0, 0x8, 0x8, 0x3, 0x904d, 0x7f, 0x4000, 0x5, r7, r4, 0x101, 0x96a5}}, {0x0, 0x18}}}, 0xa0) read$FUSE(r0, 0x0, 0x0) 03:06:50 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$FUSE(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r2, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_GETXATTR(r1, &(0x7f0000000000)={0x18, 0x0, r3, {0x4}}, 0x18) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000800,default_perw_other,allow_other,\x00']) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r5, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r5, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r6, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) r7 = getuid() write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, r6, {{0x1, 0x1, 0x4, 0x1, 0x10000, 0x8, {0x4, 0x0, 0x9, 0x0, 0x8, 0x8, 0x3, 0x904d, 0x7f, 0x4000, 0x5, r7, r4, 0x101, 0x96a5}}, {0x0, 0x18}}}, 0xa0) read$FUSE(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) read$FUSE(r1, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r3, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_GETXATTR(r1, &(0x7f0000000000)={0x18, 0x0, r3, {0x4}}, 0x18) (async) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',blksize=0x0000000000000800,default_perw_other,allow_other,\x00']) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r5, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r5, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r6, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) getuid() (async) write$FUSE_CREATE_OPEN(r1, &(0x7f00000001c0)={0xa0, 0x0, r6, {{0x1, 0x1, 0x4, 0x1, 0x10000, 0x8, {0x4, 0x0, 0x9, 0x0, 0x8, 0x8, 0x3, 0x904d, 0x7f, 0x4000, 0x5, r7, r4, 0x101, 0x96a5}}, {0x0, 0x18}}}, 0xa0) (async) read$FUSE(r0, 0x0, 0x0) (async) [ 2269.497458] BUG: unable to handle kernel paging request at fffffffffffffffc [ 2269.504580] IP: do_mount+0x1ef2/0x2a30 [ 2269.508451] PGD 8e6b067 P4D 8e6b067 PUD 8e6d067 PMD 0 [ 2269.513726] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2269.518201] Modules linked in: [ 2269.521392] CPU: 0 PID: 20039 Comm: syz-executor.0 Not tainted 4.14.289-syzkaller #0 [ 2269.529256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 2269.538602] task: ffff888085fb8340 task.stack: ffff888097310000 03:06:50 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d300e30303030303030303030d7ee06f7293030303030305d689a815ab84418d534303130302c757365", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x2b, 0x4, 0x0, {0x3, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, r2, {0x6}}, 0x18) 03:06:50 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d300e30303030303030303030d7ee06f7293030303030305d689a815ab84418d534303130302c757365", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x2b, 0x4, 0x0, {0x3, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) read$FUSE(r0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, r2, {0x6}}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d300e30303030303030303030d7ee06f7293030303030305d689a815ab84418d534303130302c757365", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) (async) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x2b, 0x4, 0x0, {0x3, 0x5, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) (async) read$FUSE(r0, 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f0000002140)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r1, &(0x7f00000020c0)={0x78, 0xfffffffffffffff5, r2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01, 0xee00}}}, 0x78) (async) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, r2, {0x6}}, 0x18) (async) [ 2269.544653] RIP: 0010:do_mount+0x1ef2/0x2a30 [ 2269.549045] RSP: 0018:ffff888097317d90 EFLAGS: 00010246 [ 2269.554398] RAX: dffffc0000000000 RBX: 00000000fffffff4 RCX: ffffc90005fea000 [ 2269.561655] RDX: 1fffffffffffffff RSI: ffffffff818e94c4 RDI: fffffffffffffffc [ 2269.568910] RBP: fffffffffffffff4 R08: ffffffff8b9a89d8 R09: 0000000000000001 [ 2269.576167] R10: 0000000000000000 R11: ffff888085fb8340 R12: ffff8880a3026428 [ 2269.583430] R13: ffffffff891ea400 R14: 0000000000000000 R15: 0000000000000020 [ 2269.590687] FS: 00007f53dc2a2700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 2269.598901] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2269.604770] CR2: fffffffffffffffc CR3: 000000009f389000 CR4: 00000000003406f0 [ 2269.612045] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2269.619304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2269.626559] Call Trace: [ 2269.629140] ? __do_page_fault+0x159/0xad0 [ 2269.633364] ? retint_kernel+0x2d/0x2d [ 2269.637246] ? copy_mount_string+0x40/0x40 [ 2269.641474] ? memset+0x20/0x40 [ 2269.644743] ? copy_mount_options+0x1fa/0x2f0 [ 2269.649223] ? copy_mnt_ns+0xa30/0xa30 [ 2269.653089] SyS_mount+0xa8/0x120 [ 2269.656517] ? copy_mnt_ns+0xa30/0xa30 [ 2269.660380] do_syscall_64+0x1d5/0x640 [ 2269.664242] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 2269.669406] RIP: 0033:0x7f53dd92e73a [ 2269.673094] RSP: 002b:00007f53dc2a1f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2269.680773] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f53dd92e73a [ 2269.688013] RDX: 0000000020000440 RSI: 0000000020000000 RDI: 0000000000000000 [ 2269.695256] RBP: 00007f53dc2a2020 R08: 00007f53dc2a2020 R09: 0000000020000440 [ 2269.702498] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000440 [ 2269.709747] R13: 0000000020000000 R14: 00007f53dc2a1fe0 R15: 00000000200000c0 [ 2269.716998] Code: c6 ff 48 89 ef 48 63 eb e8 7c 61 ff ff 48 8d 7d 08 b8 ff ff 37 00 48 89 fa 48 c1 e0 2a 48 c1 ea 03 80 3c 02 00 0f 85 4b 08 00 00 <48> 8b 5d 08 e8 35 b2 c6 ff 48 8d 7b 70 e8 8c 49 b2 ff 4c 89 ef [ 2269.736083] RIP: do_mount+0x1ef2/0x2a30 RSP: ffff888097317d90 [ 2269.741949] CR2: fffffffffffffffc [ 2269.745381] ---[ end trace adfd650d3323b85e ]--- [ 2269.750105] Kernel panic - not syncing: Fatal exception [ 2269.755609] Kernel Offset: disabled [ 2269.759212] Rebooting in 86400 seconds..