ffffffffff, 0xc0189374, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000001000000180000009937fcc9cd6c8bc8ad1e690b0b354e96c656", @ANYRES32, @ANYBLOB="ff0100000000df002e2f66696c653000"]) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000080)=""/67) chdir(&(0x7f0000000200)='./file0\x00') 19:45:05 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r1 = accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) 19:45:05 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40140, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x7, 0x80, "599cbbf00bfb4e4a28e8a2746ff0e42a", "e5076d6a1bc02f515d32d1c884f209bd19d76a660d662f371a35a7d22974cda5b53440a6"}, 0x39, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) linkat(r2, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x0) renameat2(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0/file0\x00', 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) 19:45:05 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x210001, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x82, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2c00}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x2600}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x10001}}], [{@euid_lt={'euid<', 0xee00}}, {@permit_directio}, {@fowner_lt={'fowner<', r6}}, {@measure}, {@uid_eq}]}}, 0x1, 0x0, &(0x7f0000000240)="43a6652449e0896d2056d59b2a86592e1c9d49769977ed382fa2766911d85205869fa4387d2dd0e4a8ffc7c6949d2c2e61a2bc0181100b5cd1224f4137b9b14e13e46aae6e6ea10e0d96bc846e5b1aeec01027e9cb4e2d7a35a49f551f82a48806d8845522b4519d09ced65830bb068026da09f4f4349f651ac0993e31074c773db42ff3f588ec9d985ceded4c389907c75aae58f835298d780bda348b563506aa38e4e665776614640a5148875b1102f7f871f6b9569a03a48d8dc791c8eb14704b761963994e1a737c8b7961") (async, rerun: 32) r7 = accept4$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x100800) (rerun: 32) accept4$llc(r7, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r7, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async, rerun: 64) getpeername(r7, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) (rerun: 64) 19:45:05 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '\x00'}, &(0x7f00000001c0)=""/133, 0x85) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000140)='\xfcF\x15\x85\x88\xd1\fKvz%\xaa\x1cz.\x99\xd7F)\xf8J\x9a\xa3x\x05h1\xb9\xd0\x05p7\xe8\xaf\x8bc\xa3H\x9f\xe4\xd0\xb8\xef\x15\x18\xd1\xebV\xb5\x9f\x81\xd4\xd4\xce\xc0\xc4\xee\x06\xbf\xc64\xb7\x03\xa7\xa8U\xee\n\xee\xbe;\x1aBZ\xf00\x818\xa2~\x8eR\x19\fY\x8b\a5\xb0\xf0w\x13uo:1\x12\xf4\xa4D') chroot(&(0x7f0000000080)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '\x00'}, &(0x7f00000001c0)=""/133, 0x85) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000140)='\xfcF\x15\x85\x88\xd1\fKvz%\xaa\x1cz.\x99\xd7F)\xf8J\x9a\xa3x\x05h1\xb9\xd0\x05p7\xe8\xaf\x8bc\xa3H\x9f\xe4\xd0\xb8\xef\x15\x18\xd1\xebV\xb5\x9f\x81\xd4\xd4\xce\xc0\xc4\xee\x06\xbf\xc64\xb7\x03\xa7\xa8U\xee\n\xee\xbe;\x1aBZ\xf00\x818\xa2~\x8eR\x19\fY\x8b\a5\xb0\xf0w\x13uo:1\x12\xf4\xa4D') (async) chroot(&(0x7f0000000080)='./file0\x00') (async) 19:45:05 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) (async) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000001000000180000009937fcc9cd6c8bc8ad1e690b0b354e96c656", @ANYRES32, @ANYBLOB="ff0100000000df002e2f66696c653000"]) (async) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000080)=""/67) (async) chdir(&(0x7f0000000200)='./file0\x00') 19:45:05 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80000, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) getpgrp(r1) 19:45:05 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40140, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x7, 0x80, "599cbbf00bfb4e4a28e8a2746ff0e42a", "e5076d6a1bc02f515d32d1c884f209bd19d76a660d662f371a35a7d22974cda5b53440a6"}, 0x39, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) linkat(r2, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x0) renameat2(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0/file0\x00', 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40140, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x7, 0x80, "599cbbf00bfb4e4a28e8a2746ff0e42a", "e5076d6a1bc02f515d32d1c884f209bd19d76a660d662f371a35a7d22974cda5b53440a6"}, 0x39, 0x2) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) linkat(r2, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x0) (async) renameat2(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0/file0\x00', 0x2) (async) getsockname(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) (async) 19:45:05 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '\x00'}, &(0x7f00000001c0)=""/133, 0x85) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000140)='\xfcF\x15\x85\x88\xd1\fKvz%\xaa\x1cz.\x99\xd7F)\xf8J\x9a\xa3x\x05h1\xb9\xd0\x05p7\xe8\xaf\x8bc\xa3H\x9f\xe4\xd0\xb8\xef\x15\x18\xd1\xebV\xb5\x9f\x81\xd4\xd4\xce\xc0\xc4\xee\x06\xbf\xc64\xb7\x03\xa7\xa8U\xee\n\xee\xbe;\x1aBZ\xf00\x818\xa2~\x8eR\x19\fY\x8b\a5\xb0\xf0w\x13uo:1\x12\xf4\xa4D') (async) chroot(&(0x7f0000000080)='./file0\x00') 19:45:05 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x1) (async, rerun: 64) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000080015d9d13ea1913ac533827df808005eb99cc4a6f54dd50c7e85f9b8826e556335fb17a4c90dc55ebe0c5c3ea89f833dfe1e0b4d2874561ccbd5698124fd127e8696ad68118ae27e4620f61ec4a14fbf2be632f9b0389523d57f6f8db37e3e0a9911a13ea166f8bd7de4b60053b9078f38a0e4af84bbe6c64019c08506999033883ed61421878e6f0d35d7cbde7483fb08997e72944a6c4610e126fb61eac82ab60896e692b5ae3e9458a91541a30929651c8538173056fcf6eac72d0ff465d5312d68566b7129c3a567ecff14b351bcfa9b4f36d23cc7673ab4748450e8755bda70b366bc91630150e0a9ba66efc5d736f6e7"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000001000000180000009937fcc9cd6c8bc8ad1e690b0b354e96c656", @ANYRES32, @ANYBLOB="ff0100000000df002e2f66696c653000"]) (async) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000080)=""/67) (async) chdir(&(0x7f0000000200)='./file0\x00') 19:45:05 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80000, 0x0, 0x1, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async, rerun: 64) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async, rerun: 64) getpeername(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) getpgrp(r1) 19:45:06 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f0000000600)=""/186, 0xba}, {&(0x7f0000000340)=""/78, 0x4e}], 0x4, &(0x7f0000000400)=""/97, 0x61}, 0x100) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$kcm(0x29, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) (async) recvmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f0000000600)=""/186, 0xba}, {&(0x7f0000000340)=""/78, 0x4e}], 0x4, &(0x7f0000000400)=""/97, 0x61}, 0x100) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:06 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x210001, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x82, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2c00}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x2600}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x10001}}], [{@euid_lt={'euid<', 0xee00}}, {@permit_directio}, {@fowner_lt={'fowner<', r6}}, {@measure}, {@uid_eq}]}}, 0x1, 0x0, &(0x7f0000000240)="43a6652449e0896d2056d59b2a86592e1c9d49769977ed382fa2766911d85205869fa4387d2dd0e4a8ffc7c6949d2c2e61a2bc0181100b5cd1224f4137b9b14e13e46aae6e6ea10e0d96bc846e5b1aeec01027e9cb4e2d7a35a49f551f82a48806d8845522b4519d09ced65830bb068026da09f4f4349f651ac0993e31074c773db42ff3f588ec9d985ceded4c389907c75aae58f835298d780bda348b563506aa38e4e665776614640a5148875b1102f7f871f6b9569a03a48d8dc791c8eb14704b761963994e1a737c8b7961") r7 = accept4$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x100800) accept4$llc(r7, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r7, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername(r7, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x210001, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) getuid() (async) write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x82, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2c00}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x2600}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x10001}}], [{@euid_lt={'euid<', 0xee00}}, {@permit_directio}, {@fowner_lt={'fowner<', r6}}, {@measure}, {@uid_eq}]}}, 0x1, 0x0, &(0x7f0000000240)="43a6652449e0896d2056d59b2a86592e1c9d49769977ed382fa2766911d85205869fa4387d2dd0e4a8ffc7c6949d2c2e61a2bc0181100b5cd1224f4137b9b14e13e46aae6e6ea10e0d96bc846e5b1aeec01027e9cb4e2d7a35a49f551f82a48806d8845522b4519d09ced65830bb068026da09f4f4349f651ac0993e31074c773db42ff3f588ec9d985ceded4c389907c75aae58f835298d780bda348b563506aa38e4e665776614640a5148875b1102f7f871f6b9569a03a48d8dc791c8eb14704b761963994e1a737c8b7961") (async) accept4$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x100800) (async) accept4$llc(r7, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r7, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) getpeername(r7, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) (async) 19:45:06 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40140, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x7, 0x80, "599cbbf00bfb4e4a28e8a2746ff0e42a", "e5076d6a1bc02f515d32d1c884f209bd19d76a660d662f371a35a7d22974cda5b53440a6"}, 0x39, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) linkat(r2, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x0) renameat2(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0/file0\x00', 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x40140, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)={0x0, 0xfb, 0x39, 0x7, 0x80, "599cbbf00bfb4e4a28e8a2746ff0e42a", "e5076d6a1bc02f515d32d1c884f209bd19d76a660d662f371a35a7d22974cda5b53440a6"}, 0x39, 0x2) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) linkat(r2, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x0) (async) renameat2(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0/file0\x00', 0x2) (async) getsockname(0xffffffffffffffff, &(0x7f0000000040), &(0x7f00000000c0)=0x80) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) (async) 19:45:06 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000640)={&(0x7f0000000180)=ANY=[@ANYBLOB="90040000", @ANYRES16=0x0, @ANYBLOB="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"], 0x490}, 0x1, 0x0, 0x0, 0x40000}, 0x1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00#-@0\'+\x00'}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:06 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) mount(&(0x7f0000000140)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='./file1\x00', 0x0, 0x800c0a, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1) 19:45:06 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80000, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) getpgrp(r1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80000, 0x0, 0x1, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) getpeername(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80) (async) gettid() (async) syz_open_procfs$namespace(r1, 0x0) (async) getpgrp(r1) (async) 19:45:06 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) (async) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) mount(&(0x7f0000000140)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='./file1\x00', 0x0, 0x800c0a, 0x0) (async) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1) 19:45:06 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x80000d, 0x0) 19:45:06 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000640)={&(0x7f0000000180)=ANY=[@ANYBLOB="90040000", @ANYRES16=0x0, @ANYBLOB="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"], 0x490}, 0x1, 0x0, 0x0, 0x40000}, 0x1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00#-@0\'+\x00'}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000640)={&(0x7f0000000180)=ANY=[@ANYBLOB="90040000", @ANYRES16=0x0, @ANYBLOB="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"], 0x490}, 0x1, 0x0, 0x0, 0x40000}, 0x1) (async) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00#-@0\'+\x00'}) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:06 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2000408, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x10001, 0x2, 0x84, 0x1080, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x2}, 0x48) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) 19:45:06 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x20, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='pstore\x00', 0x80, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@phonet, &(0x7f00000001c0)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@caif=@rfm, &(0x7f0000000280)=0x80) 19:45:06 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x80000d, 0x0) (rerun: 64) 19:45:06 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) (async) recvmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/137, 0x89}, {&(0x7f0000000240)=""/26, 0x1a}, {&(0x7f0000000600)=""/186, 0xba}, {&(0x7f0000000340)=""/78, 0x4e}], 0x4, &(0x7f0000000400)=""/97, 0x61}, 0x100) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1ff}}, './file0\x00'}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:06 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2000408, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x10001, 0x2, 0x84, 0x1080, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x2}, 0x48) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2000408, 0x0) (async) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x10001, 0x2, 0x84, 0x1080, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x2}, 0x48) (async) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) (async) 19:45:06 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) mount(&(0x7f0000000140)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='./file1\x00', 0x0, 0x800c0a, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) (async) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) (async) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) (async) mount(&(0x7f0000000140)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='./file1\x00', 0x0, 0x800c0a, 0x0) (async) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1) (async) 19:45:06 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x20, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='pstore\x00', 0x80, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@phonet, &(0x7f00000001c0)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@caif=@rfm, &(0x7f0000000280)=0x80) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x20, 0x0, 0x1, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='pstore\x00', 0x80, 0x0) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) (async) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@phonet, &(0x7f00000001c0)=0x80) (async) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@caif=@rfm, &(0x7f0000000280)=0x80) (async) 19:45:06 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='anon_inodefs\x00', 0x80000d, 0x0) 19:45:06 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000640)={&(0x7f0000000180)=ANY=[@ANYBLOB="90040000", @ANYRES16=0x0, @ANYBLOB="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"], 0x490}, 0x1, 0x0, 0x0, 0x40000}, 0x1) (async) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00#-@0\'+\x00'}) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:06 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x20, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='pstore\x00', 0x80, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@phonet, &(0x7f00000001c0)=0x80) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@caif=@rfm, &(0x7f0000000280)=0x80) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x20, 0x0, 0x1, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='pstore\x00', 0x80, 0x0) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x2) (async) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@phonet, &(0x7f00000001c0)=0x80) (async) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@caif=@rfm, &(0x7f0000000280)=0x80) (async) 19:45:06 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x2000408, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x80) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x10001, 0x2, 0x84, 0x1080, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x2}, 0x48) (async) mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x400, 0x1) 19:45:06 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000080, 0x0, 0x1, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101500, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$KVM_CAP_VM_COPY_ENC_CONTEXT_FROM(r1, 0x4068aea3, &(0x7f0000000080)={0xc5, 0x0, r0}) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:06 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x108400, 0x0) 19:45:06 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x8189f323fe628073, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x2000408, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') 19:45:06 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) 19:45:07 executing program 1: connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x0, @any, 0x5}, 0xe) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:45:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000080, 0x0, 0x1, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101500, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$KVM_CAP_VM_COPY_ENC_CONTEXT_FROM(r1, 0x4068aea3, &(0x7f0000000080)={0xc5, 0x0, r0}) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000080, 0x0, 0x1, 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101500, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) ioctl$KVM_CAP_VM_COPY_ENC_CONTEXT_FROM(r1, 0x4068aea3, &(0x7f0000000080)={0xc5, 0x0, r0}) (async) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x8189f323fe628073, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x2000408, 0x0) (async) chdir(&(0x7f0000000080)='./file0/file0\x00') 19:45:07 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:07 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x108400, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x108400, 0x0) (async) 19:45:07 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='v7\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:07 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x108400, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='bfs\x00', 0x108400, 0x0) (async) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x8189f323fe628073, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x2000408, 0x0) chdir(&(0x7f0000000080)='./file0/file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/file0\x00', 0x8189f323fe628073, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x2000408, 0x0) (async) chdir(&(0x7f0000000080)='./file0/file0\x00') (async) 19:45:07 executing program 1: connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x0, @any, 0x5}, 0xe) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 19:45:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) 19:45:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000080, 0x0, 0x1, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101500, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) ioctl$KVM_CAP_VM_COPY_ENC_CONTEXT_FROM(r1, 0x4068aea3, &(0x7f0000000080)={0xc5, 0x0, r0}) (async) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:07 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file1\x00', r1, &(0x7f0000000180)='./file0/file1\x00', 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x5400, &(0x7f0000000140)=')\'(\x00') 19:45:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x20, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5}, 0x67) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='romfs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) 19:45:07 executing program 1: connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x0, @any, 0x5}, 0xe) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0x0, @any, 0x5}, 0xe) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') (async) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = semget(0x2, 0x1, 0x1) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000000)=""/180) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000180)=""/85) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000400)=""/215) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)=[0x80, 0x20, 0x200]) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/213) 19:45:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/$ev/sr0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0xd2, 0x6, 0xe, "9932540b0532a1fe3fa55c23dba870dd", "1855f8fd8dead33910e28811a3b7e7b89a00239c27fe48b10bc68fe6a487450ceaf2ece2d72dcf5af64be6894252d62e65efa31007511292375f51750a4cc9c51dfab9932900e4b35c01af6c9cbf0913ae6393f49027146fe62ad848c73a75339ff3476a2b101f633f01ec14e1fd0c96ea88f3fe77df96da365462ac0c114a55c70a8370f4ec2d264060f287c96a54f049d866191e642880f4d8ac8e910d5ef22ae4b2e7b756151a3363160e717fdafe1b8152ada65e5dc7361ae61eb1"}, 0xd2, 0x1) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000001c0)={0x3, r1}) 19:45:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) 19:45:07 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async, rerun: 32) renameat2(r0, &(0x7f0000000080)='./file1\x00', r1, &(0x7f0000000180)='./file0/file1\x00', 0x3) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x5400, &(0x7f0000000140)=')\'(\x00') 19:45:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/$ev/sr0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0xd2, 0x6, 0xe, "9932540b0532a1fe3fa55c23dba870dd", "1855f8fd8dead33910e28811a3b7e7b89a00239c27fe48b10bc68fe6a487450ceaf2ece2d72dcf5af64be6894252d62e65efa31007511292375f51750a4cc9c51dfab9932900e4b35c01af6c9cbf0913ae6393f49027146fe62ad848c73a75339ff3476a2b101f633f01ec14e1fd0c96ea88f3fe77df96da365462ac0c114a55c70a8370f4ec2d264060f287c96a54f049d866191e642880f4d8ac8e910d5ef22ae4b2e7b756151a3363160e717fdafe1b8152ada65e5dc7361ae61eb1"}, 0xd2, 0x1) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000001c0)={0x3, r1}) 19:45:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x20, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5}, 0x67) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='romfs\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) 19:45:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x100000001, 0x100) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5dc}}, './file0\x00'}) getpeername$llc(r1, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x10) bind$llc(r1, &(0x7f00000003c0)={0x1a, 0x310, 0x8, 0x6, 0xee, 0x40, @remote}, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000580), r1) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x48, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8091}, 0x4000) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), r1) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x2c, r3, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x24000010) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}]}]}, 0x54}}, 0x8000) 19:45:07 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) (async, rerun: 64) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async, rerun: 64) r0 = semget(0x2, 0x1, 0x1) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000000)=""/180) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000180)=""/85) (async) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000400)=""/215) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)=[0x80, 0x20, 0x200]) (async) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/213) 19:45:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/$ev/sr0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0xd2, 0x6, 0xe, "9932540b0532a1fe3fa55c23dba870dd", "1855f8fd8dead33910e28811a3b7e7b89a00239c27fe48b10bc68fe6a487450ceaf2ece2d72dcf5af64be6894252d62e65efa31007511292375f51750a4cc9c51dfab9932900e4b35c01af6c9cbf0913ae6393f49027146fe62ad848c73a75339ff3476a2b101f633f01ec14e1fd0c96ea88f3fe77df96da365462ac0c114a55c70a8370f4ec2d264060f287c96a54f049d866191e642880f4d8ac8e910d5ef22ae4b2e7b756151a3363160e717fdafe1b8152ada65e5dc7361ae61eb1"}, 0xd2, 0x1) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f00000001c0)={0x3, r1}) 19:45:07 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) renameat2(r0, &(0x7f0000000080)='./file1\x00', r1, &(0x7f0000000180)='./file0/file1\x00', 0x3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) (async, rerun: 32) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x5400, &(0x7f0000000140)=')\'(\x00') (rerun: 32) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = semget(0x2, 0x1, 0x1) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000000)=""/180) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000180)=""/85) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000400)=""/215) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)=[0x80, 0x20, 0x200]) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/213) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) semget(0x2, 0x1, 0x1) (async) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000000)=""/180) (async) semctl$GETPID(r0, 0x0, 0xb, &(0x7f0000000180)=""/85) (async) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000400)=""/215) (async) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000500)=[0x80, 0x20, 0x200]) (async) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000000c0)=""/213) (async) 19:45:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async, rerun: 64) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async, rerun: 64) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x100000001, 0x100) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5dc}}, './file0\x00'}) getpeername$llc(r1, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x10) (async) bind$llc(r1, &(0x7f00000003c0)={0x1a, 0x310, 0x8, 0x6, 0xee, 0x40, @remote}, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000580), r1) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x48, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8091}, 0x4000) (async) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), r1) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x2c, r3, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x24000010) (async) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}]}]}, 0x54}}, 0x8000) 19:45:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x20, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5}, 0x67) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='romfs\x00', 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) 19:45:07 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') 19:45:07 executing program 3: ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:07 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80002, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='gadgetfs\x00', 0x88, &(0x7f0000000180)=')\'(\x00\xd1\x1f*\x80\xcf\xdd\xea\xec\\\xee\x19z\xb9\a\x82=-\x97\xad\xe0 v\xc9<<%~\x82Um\xbc\xc7M\xfcb]\xcdhtm\x041T\xd5\xba\xa8\xf5\x1d0Rh\x00\x97e\xfex,)\x8b\x99\x93Tp\xa8\xf6r\x1b\xab\x9c\xc2]\x9fJ?\xa6\xf2\xb3\x91\x9e[.\xfd\x12\x86\xc1x\x040\xfe\x97\xe7\x83\"\xfb\xc8w:T\xacz\xcf\x1a\xfb\xe6L\xb6\xb1\xd7\t\xce\xa4\x16\xa6S\xe6\xc8\x86Dv\x87\x92[)o\x85\xe1f\xec;\xc7y\xc1|\xce\xf8\xf2\x8e\x0f\x14\xf5\x1a\x87\xa6\xf0\xe7\xad^\x9fL\"\xd6\xcb\x90\x1c2\xf4\xbe\xab\xa5') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x106881, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x6b0e40, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x200018, 0x0) 19:45:07 executing program 3: ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) (async, rerun: 32) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:07 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x84, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='romfs\x00', 0x1a00009, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000001580)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/186, 0xba}, {&(0x7f0000001480)=""/215, 0xd7}], 0x9, &(0x7f0000001640)=""/246, 0xf6}, 0x2001) 19:45:07 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) chdir(&(0x7f0000000080)='./file0\x00') (async) 19:45:07 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80002, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='gadgetfs\x00', 0x88, &(0x7f0000000180)=')\'(\x00\xd1\x1f*\x80\xcf\xdd\xea\xec\\\xee\x19z\xb9\a\x82=-\x97\xad\xe0 v\xc9<<%~\x82Um\xbc\xc7M\xfcb]\xcdhtm\x041T\xd5\xba\xa8\xf5\x1d0Rh\x00\x97e\xfex,)\x8b\x99\x93Tp\xa8\xf6r\x1b\xab\x9c\xc2]\x9fJ?\xa6\xf2\xb3\x91\x9e[.\xfd\x12\x86\xc1x\x040\xfe\x97\xe7\x83\"\xfb\xc8w:T\xacz\xcf\x1a\xfb\xe6L\xb6\xb1\xd7\t\xce\xa4\x16\xa6S\xe6\xc8\x86Dv\x87\x92[)o\x85\xe1f\xec;\xc7y\xc1|\xce\xf8\xf2\x8e\x0f\x14\xf5\x1a\x87\xa6\xf0\xe7\xad^\x9fL\"\xd6\xcb\x90\x1c2\xf4\xbe\xab\xa5') (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:45:07 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x100000001, 0x100) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5dc}}, './file0\x00'}) getpeername$llc(r1, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x10) bind$llc(r1, &(0x7f00000003c0)={0x1a, 0x310, 0x8, 0x6, 0xee, 0x40, @remote}, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000580), r1) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x48, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8091}, 0x4000) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), r1) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x2c, r3, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x24000010) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}]}]}, 0x54}}, 0x8000) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x100000001, 0x100) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5dc}}, './file0\x00'}) (async) getpeername$llc(r1, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x10) (async) bind$llc(r1, &(0x7f00000003c0)={0x1a, 0x310, 0x8, 0x6, 0xee, 0x40, @remote}, 0x10) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000580), r1) (async) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x48, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8091}, 0x4000) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000780), r1) (async) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x2c, r3, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x24000010) (async) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x54, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}]}]}, 0x54}}, 0x8000) (async) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x106881, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x6b0e40, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x200018, 0x0) 19:45:07 executing program 1: sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="53c3d99784a717a4f239e05d937c9d07aad7aec06d73e7d34574de972ac241ff911c3dcdc83b18f66a042517919a475df38670ed96466769dce89dfa5705b078c386f3e564773ca4464ca14c79e2a151cabd989a464d6380a7469515b691ac42f82974e9c6ee442b0de7ff4edd79ab162aa3fc3b51c3b0de5bfbf7691638539282a69b198a5ee4e5c61497ec7e945bd452abbcc6e0a870270e04d57ff4afa0ce530a0f182fa34db93e9050474a2b280810ebd6e57d3bfa355103c05bcc4296462ca5581678a88b0e75310aa9606a69593d9d5d759449abdbabd28227942a158267885b1816ede616c1ac46dc8916c997208bd0b7cfb66ce2a3e8e2261b2d896aa3f6d616265b9bd7b48ae80be52b6b7ccdb9de9a30c3d91ef16a76948c867125f347700aae5ac01f6d4c3b384683bb76291e9449a7fcc66e2b70ae5dfc7800bec307ea7b3edecdc27bdee0956b4ebf0712c62b81722b09058f5bbdecc392463b9fe4301425c0af7b1806097d0c003bbea13881aefc3c285f1c779c806a2ed94bc0c755aed0efe7253151512bd3e1c1ebb86911c651df264012f330881b16404d69f07bfdb60135baa78ab325a4ee976f6eea01c49255cd503c71ec9b54dc5f9d2af902bb5a45184f7b8ceef29ab2ca0f553149a6193a3fb18d864fc4c22b4813b492472a665f58e26d84610d7e82f4b27028e1633b49d2484a6baefb6b1a397d3e6392a2a02cb56a1d5f10eb4034884a1abba7b80d97a49e80bb2e51f32e5dad0820fde60d52bd5d8d3494f23ba04ceb7375a1da8268017fa539ae68378f76cc103b4df59507fc264b790886c4b2ca598b0b57ede65a8dd684acbb170cb37c12caec5eb02989d0fb3e70b85068609af0124ea59d880d93f4eff69e34404d00ccdbde0549ea15329263418f2d1bb28bccd130b4ecf43858c30ece4ba83183598572ac4e753d8e836d8db340a96bbc670b0a018ac24a1981dd013ca069b751318f99e3d3c7b2d681da373cc0c91500f289412634537f0a23744b72f5052bee444db6f04bd405fd1f05c52472ce581eff9abf705827d3d78667e7420356bd1e5048bc7f401106890311d89ab2f82693234a68154810dd9b62076ddebbdd2dd77ab4f073d2206199a61acf8a648fbc5d889a4b6695912fb82e6930105c291d5023b374ce8eb7c7687fc32beb16377f01279658e1f21dac01ea9f0f2da023b44e1c6e4f62227e49813241616db7a143782f49cba9868e7402a7c166b50445d6da858d37835953f8482d00412b2fe5b8fbc329eb6f28ad46b1845d03129f8ba61b714fd4bcabf2cbc2fad4a2ee63b7f7f08a6b4c9d2dc0a1469313c84aa0033cb1f807f03b16b082f99499e30abaac6af210d3c71a91d003db359d52d3bc2af8ef4bb35097d40542662f55c59d9ec9e6eddafdb6c7b69db42b3e31f9f6ad8ee4986b698a3b6d0e2808922df29a68a845548dbf33be44d366d3d93f83c43607d585314d436bd1a255f5ebdd945bd0568ff8e6d0e63a19eb5aa14a34a01f4e27bb04703c2d9290fcf0889b9ced921ddaac110294dc5632c9019ab1c92ed9e78252b87e66faeb839349626b08ff1f19e0583d99372af71a3016ee1fb2fd8fbeaad0a0263869c98f93e1326034f5faa740e623c6f802d85ddcbcfac7d23aef9366742ec8d4653965bdb442d8cfd70b99633d7074fc5a2caa914d58997f805d05706a73035558aa4d56497142d284819a0964d6a20a5595d89ebd16ed848f823ffafa6abfebb2cd647ce6366d99dfe101d7dd84bc1de40583c93d9b293d231146d04c3f724ca9053cf42c3898cbe53a9f194b4ba3766b15fdb728a9e5936a93041ffa77e327a20685f7aae7ad107b438e4c07c80e737378be50ad796a36508961fc44d4459dc0320e1ee97aa7105813eda645ba9e2fac86ba64d376f082def1e8daf8fd5abf141d67385204ac8963e1d20d167503e77b42fb602eac69d9e6bbfd47b7d3f289aafc177cc9bc08ee3d611f7a07593b719eff5abf4c0f9b90455124c49009d63ac7909025453bbdf3be512712689cc521b5575612bf9fe2e7fd772f4db25adfc35f7daaf312809afaed37ff48e89abdcffede38c259f132a88788c671e4e964da8eafe9d1e7eb162eafbe67f8f6be94aa5bda7aab2d6a9371ab7e6da7f34ed391da8ff84f8b3870cb2b86c93dc0d6abbeead7c6de3abf4c6115863edccb435393b181c67fb1bd43c99e243f6f110a4aab4234d789d2e085ffe4386e873b537b5f0a487d01b7ddce2fd4ef5347e91ed1fc6477cfc34a27aba00606a1d13fb123296b1a95e26c66a4e21d479a2e2f86bc8d7d58f0cd0c2c442f4e9ae8a79348c347524ce551561a8afd34b7118c3f9ea3d8c3c4e8711e14f0a90e8c88da7f789569042ffb4b47e7ab8923632cd0d6939db391f95a92bff604eccda5d379cbe702bf0c39eba0742ba7e2061658878a4b9209bb7aadc1e13232978aace1cfe90fd227988d7219f4b92628a32fc9ac95abe267b3eb8ba5ccafbe511e4325dc27bf92f9e4c1982fee05396a7c44e2ab18684b2ebd842145a724b8f02931f733b1c42b0468382e104f7d92d0e2b090a2b36d4ea8298a2083969e41d24bde1f3adad1f6fc78a7b0bdbf407964e1e5104b0bf8705f648e11bb9de01bf2411abf9f875c6b7b02a16bfbfbe3f391dba61fec1de3288e3f68d2bd8c52f90e75226694a612ad5e9403509bb5b93cc073dce6ef70a1bb36bf119d92cac051da8795b35661853b640ad2e2d2ecc52449bcfb33ce951da842efbe93cfc238698a7a0c3e24cd3152b2d0f832ad976b7f68cea0b3e9efcfce7e02089a1a4cde048d9d045d105b7cd53c06d2f6767eea2170f9a927e92825807127f34cbe298f4a6b7ac7f35ab66ce5a9f84310d0e18aa37ca245568d78ece048513ad357ced0ec36e2ab919406f82caaab687834c5421ea528287adfce6f9329e2a1fa870182251958a822758b1847dc57125c086faccdf191b3d616f86e7b51d6f252de2753b125e34f8d039adf894bef5cdd9df30dac46780a578075331b5552c87fa6bb474409181983eb2f7077d91005e8837bcf1c9733b591789ef0beef926b8c227b3ab921f9e2632242eb01c67e3c12546f99f025cadadd9d753282a0dbda952cf998652b505ecc7280b947135d84a10035661a87d2153a6daa89bed00ac1c63ed9db9bcd03b6484631b21620cae759f034d6db3945af909daeff559900ef44158a6f942ffc8284a661be8e85a0223e94a5d5196dcea698caed541f77a252d6d0c6e577702275bf22757baced823cda488376b2f34d3a331ce09802e724592a5a67f8d9a8510af864efa1962cb754bbee4127abc9482255b8206d7ffac7e3b728b82dfeeb34b78ffdd58b685f136e2140e361be2d69c5faa66be50e47d011a285c1abfed6786f3e0945a137838d80d8cf234e1727b9a9bb37587d18a06431897e22bca2687552f06b4995ed369643294c63f59e9b06092d6f1ab34b665590f7b0358a8b323f8a7964fae0ad844247d6910fec2941d2704ae956a948867b2f422d522f7590a938a9e08057e853d35b5d7bf8159c0eaae9a6b8e8ede9d531687a24b185b163cff805f223ea63606be3c130daafb8502a2f5119c409017d4333f201cc0f6094790ccb65fb4006f06fd5ff6d3b464e4511d55faff143f9aef51c562726880450f7aa4a8f99b5d508b91bcfa8458869d35278f320896f12bd1f0412e47e8b9325903c7c0c240617773ed8b398b35baaa0318b4508e9b6d4b99ae6c6f011d098a0d9fb5a009e9790bab0494668c7e05127fef34f0d78d8cb19258808da52496770d0dc1e474fa05a70b2c039f82befae341b4b68e8dac5e6c329e92151a0141a81ea940dc84ea3fe3bc2322debbde1d1043d970bef971536004dc1ee92d854f6425a555b7959cd82588b63b2bdfd6fc6a8463bb148d13e477abf607ed8b6b13795f00d0be8a4e9b4681244bceabda2aa7b3eac967a24a58b3f3b0110bbc840da09aef7a2d1d20b1c5e02e4342868e79632a9b47a75efba1011b13613d849d61351fb591c91610763c4964f0d8bfd02c149ff8847f98eef4ed6f7fe305a17d9b76555d71f55df18f4b3e05e98b8ba97f861cc29076961437dbac914a87a7e2acccc16f1adba8396a457f5752f4a67c4c4e5da0d183a99a07fb513daa3ad61a189a231f6573eae0f05826ee0774901fd12b09225943eb4ce9b21536ae9f12529dbe3ebab493e744225f9324b2a05b35e428447e43a79ad5ceacf4c65b7ef97bcb84a747ca05091cf99c481259111e0f07bafeb158cb4f7726de78a14e1d47a9fd73cfb36a7fbddbe75debee8ade1ce554d3d9f1e7d269cef4f09f80af5f27549d4ea06b811905ad22acd8611921fa8f281ac79f9e0f87a1b91988d44118757de78406b5294facdd70ee46c0eb20beee5e5bd3ba112047e4add952c1173bf10ae669142047a6ae4f24fbab9b82e0a09d02ae295a6f0e35ee09638e7d25f64c71a2b726e978e03aa6733ec8fc981e4c0cc6fdda276a09ffd7c459a734c9c56d26b14bc90259cb1ef6ea938d1e282e935ca74dc1b2517e0aec1cd248680c5f6d49523a3ed0f32b844cc45dafa07039c4dcfca0d6e30b432f549fcc0e0f93c3bd64bfe1c7fa1e5d9113e169b1892cd7fd0e8e3b63dc48919295de8be4c8900e45b48604b8c095ddb5551e320a7c30d0dc428d4f387641f82c0c4829fc8df394df6e8d637d2ace6cbc99a2a123b25f5b3d4474d128112a8a9a690d2778f75a46b749e34db02d5733ac5fd731dfb40010ff61d86be7b1d9b65381552cd44ebe768bd257bd6cb468ab6ee32b2efdae9fb3161bb2aa43ed87e9f106f318abbc974f74ae4d9d9d93778c3ee7b3e981c1bfbc84c5e4dd526e80d7ebebb79e523a2a2cbbbd41e6b37be0702a66141dbe981d89a5994b51345d81e2ba03e44a037013d99c3ed30c9b33a7af6f9a374ad831f397f8ecdf6f0ccf57893fcc1860fefa38181c7199ce1ff1ceb38c999a0f2350f43a3ff9b31d92997dc7e7a90f32a75bc402f205a8a15ad940338282fe0569ec3d301e26df9f371214712aaf073378b91b53336a00bbf9fd0a394c4e6bdb5eaf2e5ecab396c1e1b0c259428b46a7777f3158c6f8c91c28e226339783f55539d2186845bf04e20f18f896bad33e4fd32dd147cafce5982f523187924aef310b5f1ccb5bd0b631af4486d26a63d3babf9cfdb707b36a5305d4f69d9713a3cb89c4ee91ce9cb9153d2b92ff2de8013cbdd2ea252a6c49eb828bae2da56cc9fe6f3d5ae91b0a092590c49c3864d83f76dec5d40e848bf25f717c043021df0f8fd59650c476aedcfc56fa41ed9d68fdb5b80e384009aba4065885bf823fb2fae15d97187414e37f73f57a0bbe8b50e33143ed266160f1457c1fec649cced23c9c40cf8a576f99436a63ac575b2f9f55367d763baa8970510e602a4d98cdef0cb6e3e8e2e030201ad79f0540398ddc0a69eae272ebc38aa55ecc001e636d23f50820a4573e5745342ce86173c8c9661fda1dd9d05e1ccbc3bda294e6adebc90548cc13fead9a483c2e1e615a5d93da64dbcf0ef3ec39e944235c6db1437c1d15077d1ef82afb8c848274305f90f6a44b2cc2d40b95dba1ea7942846f4f4f0529d0f0bdf3d98702d821ad5c3201befa899e3d1db3d6cb72c775da097ffb1b90073d156e88fa2a4726464d0965f53724f7ab4c7ce5d572c43c7a9fce7680c551527f8767babd05fe78f664e95d9b6de7414d1b87c3c42156da22efe5fa2614af6e91c", 0x1000, 0xc800, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:45:07 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x84, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='romfs\x00', 0x1a00009, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000001580)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/186, 0xba}, {&(0x7f0000001480)=""/215, 0xd7}], 0x9, &(0x7f0000001640)=""/246, 0xf6}, 0x2001) 19:45:07 executing program 3: ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) 19:45:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x106881, 0x0, 0x0, 0x0, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x6b0e40, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x200018, 0x0) 19:45:07 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80002, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='gadgetfs\x00', 0x88, &(0x7f0000000180)=')\'(\x00\xd1\x1f*\x80\xcf\xdd\xea\xec\\\xee\x19z\xb9\a\x82=-\x97\xad\xe0 v\xc9<<%~\x82Um\xbc\xc7M\xfcb]\xcdhtm\x041T\xd5\xba\xa8\xf5\x1d0Rh\x00\x97e\xfex,)\x8b\x99\x93Tp\xa8\xf6r\x1b\xab\x9c\xc2]\x9fJ?\xa6\xf2\xb3\x91\x9e[.\xfd\x12\x86\xc1x\x040\xfe\x97\xe7\x83\"\xfb\xc8w:T\xacz\xcf\x1a\xfb\xe6L\xb6\xb1\xd7\t\xce\xa4\x16\xa6S\xe6\xc8\x86Dv\x87\x92[)o\x85\xe1f\xec;\xc7y\xc1|\xce\xf8\xf2\x8e\x0f\x14\xf5\x1a\x87\xa6\xf0\xe7\xad^\x9fL\"\xd6\xcb\x90\x1c2\xf4\xbe\xab\xa5') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:45:07 executing program 1: sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="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", 0x1000, 0xc800, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="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", 0x1000, 0xc800, 0x0, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x84, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='romfs\x00', 0x1a00009, 0x0) (async, rerun: 32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001740)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000001580)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000100)=""/120, 0x78}, {&(0x7f0000000180)=""/237, 0xed}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000280)=""/63, 0x3f}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/186, 0xba}, {&(0x7f0000001480)=""/215, 0xd7}], 0x9, &(0x7f0000001640)=""/246, 0xf6}, 0x2001) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x4, 0xa, 0xfffb, 0x3, 0x2, 0x0, 0x6}, 0xc) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)='G\'(\x00*\x1f)\\\xa7\x80\x117\xc37\xc2\xe2\xa5g\xb1k\x18{\xc1\xe2\xc8z\x01\x1f\xac\x95:\xbb\xf5WHy3>d5\x11\xc6\xec\xa2\xd7\"\xb1\xab-\x15\xaf_\x1e[\xeb\x0e\xf3\x83\xfc\x96M\xcc\x86\xb2\xaa\x11\xf7\xc0\x04Y\xff\xf8\xa0n\xe6l\xae\x9c\xf9n\a\x00\xf5\a\xab\xa7f\x9f=G\xfc\xb5n\x7f\xaa\xb4CJ\r\xf4\xf8\xbb\xaf]\x13u\x10\xf4\x1do*10n\x92\x7f\xd4\xe8\xd2<\x0e\x17') 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='ceph\x00', 0x1a00001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 19:45:08 executing program 1: sendto$llc(0xffffffffffffffff, &(0x7f0000000140)="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", 0x1000, 0xc800, 0x0, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x0) (async, rerun: 32) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x419050, 0x0, 0xff, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000001c0)) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x108, 0x7, 0x2, "565a00bd8000cd9c48cb326bad125e46", "798bc40ed010a47c69e2e9bf7719c7804b520895e97c9fe56985b45418f2aea7b915bdbdefbb06e8edba7604c04d7d10cad8abf5a891ad577f2423f9ea8afab55bdd7e4015f01d3712f31ce102b7e66672eeff038707273613fe7a11659a58593d2559a18d377fcb81f5a1e154d50a7941028e6eff92febc71ea8b32675fd049ea96eaf6121110de8e10861469a3c1d7ce11d194472c5dd66db33cdaa7a74fb4845c08e501c96de17d774d559bce6dfd20913e3bebab2e18033d97b32aa82c660dfb66bbb3aae40023813ffd25a7bb0a310a971516542133a02391f3d247f8ad41efc68411dc004e08c7faee00713c53186ccf"}, 0x108, 0x2) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x4, 0xa, 0xfffb, 0x3, 0x2, 0x0, 0x6}, 0xc) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x4, 0xa, 0xfffb, 0x3, 0x2, 0x0, 0x6}, 0xc) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='ceph\x00', 0x1a00001, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)='G\'(\x00*\x1f)\\\xa7\x80\x117\xc37\xc2\xe2\xa5g\xb1k\x18{\xc1\xe2\xc8z\x01\x1f\xac\x95:\xbb\xf5WHy3>d5\x11\xc6\xec\xa2\xd7\"\xb1\xab-\x15\xaf_\x1e[\xeb\x0e\xf3\x83\xfc\x96M\xcc\x86\xb2\xaa\x11\xf7\xc0\x04Y\xff\xf8\xa0n\xe6l\xae\x9c\xf9n\a\x00\xf5\a\xab\xa7f\x9f=G\xfc\xb5n\x7f\xaa\xb4CJ\r\xf4\xf8\xbb\xaf]\x13u\x10\xf4\x1do*10n\x92\x7f\xd4\xe8\xd2<\x0e\x17') 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 19:45:08 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000100)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) [ 2495.343940] FAT-fs (loop2): Unrecognized mount option "ramfs" or missing value 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x419050, 0x0, 0xff, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000001c0)) (async) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x108, 0x7, 0x2, "565a00bd8000cd9c48cb326bad125e46", "798bc40ed010a47c69e2e9bf7719c7804b520895e97c9fe56985b45418f2aea7b915bdbdefbb06e8edba7604c04d7d10cad8abf5a891ad577f2423f9ea8afab55bdd7e4015f01d3712f31ce102b7e66672eeff038707273613fe7a11659a58593d2559a18d377fcb81f5a1e154d50a7941028e6eff92febc71ea8b32675fd049ea96eaf6121110de8e10861469a3c1d7ce11d194472c5dd66db33cdaa7a74fb4845c08e501c96de17d774d559bce6dfd20913e3bebab2e18033d97b32aa82c660dfb66bbb3aae40023813ffd25a7bb0a310a971516542133a02391f3d247f8ad41efc68411dc004e08c7faee00713c53186ccf"}, 0x108, 0x2) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)='G\'(\x00*\x1f)\\\xa7\x80\x117\xc37\xc2\xe2\xa5g\xb1k\x18{\xc1\xe2\xc8z\x01\x1f\xac\x95:\xbb\xf5WHy3>d5\x11\xc6\xec\xa2\xd7\"\xb1\xab-\x15\xaf_\x1e[\xeb\x0e\xf3\x83\xfc\x96M\xcc\x86\xb2\xaa\x11\xf7\xc0\x04Y\xff\xf8\xa0n\xe6l\xae\x9c\xf9n\a\x00\xf5\a\xab\xa7f\x9f=G\xfc\xb5n\x7f\xaa\xb4CJ\r\xf4\xf8\xbb\xaf]\x13u\x10\xf4\x1do*10n\x92\x7f\xd4\xe8\xd2<\x0e\x17') 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x4, 0xa, 0xfffb, 0x3, 0x2, 0x0, 0x6}, 0xc) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)={0x4, 0xa, 0xfffb, 0x3, 0x2, 0x0, 0x6}, 0xc) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) 19:45:08 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000100)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000100)=0x80) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='ceph\x00', 0x1a00001, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x2) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='ceph\x00', 0x1a00001, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x2) (async) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x419050, 0x0, 0xff, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000001c0)) (async) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x108, 0x7, 0x2, "565a00bd8000cd9c48cb326bad125e46", "798bc40ed010a47c69e2e9bf7719c7804b520895e97c9fe56985b45418f2aea7b915bdbdefbb06e8edba7604c04d7d10cad8abf5a891ad577f2423f9ea8afab55bdd7e4015f01d3712f31ce102b7e66672eeff038707273613fe7a11659a58593d2559a18d377fcb81f5a1e154d50a7941028e6eff92febc71ea8b32675fd049ea96eaf6121110de8e10861469a3c1d7ce11d194472c5dd66db33cdaa7a74fb4845c08e501c96de17d774d559bce6dfd20913e3bebab2e18033d97b32aa82c660dfb66bbb3aae40023813ffd25a7bb0a310a971516542133a02391f3d247f8ad41efc68411dc004e08c7faee00713c53186ccf"}, 0x108, 0x2) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5009, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='cgroup2\x00', 0x2002401, 0x0) 19:45:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000000)=""/78) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)={0x40, 0x9}) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:08 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000100)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000100)=0x80) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='cgroup2\x00', 0x2002401, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='cgroup2\x00', 0x2002401, 0x0) (async) 19:45:08 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="551d53db6298f8d9271e77175e9bd32ccb2be4dfd2d8ad1bc86e41a98d992ed75c3d3a6a5df24eceedb1b34af3", 0x2d, 0xfffffffffffffff9) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000080), &(0x7f0000000240)={0x0, 0xfb, 0xeb, 0x0, 0x68, "2b9e439b70a43277e77f2376e9d0a442", "dc4e80e620e06f38ed9ec670d48c87c93b8314d6bdfc68d036b64a00a1b2f603e3c2375db90a192e9b0ad9584c32db7e31bef3a93b766150f0f59b0a2d3b5ee27c1d53e3becaf36f3e18b9f54f3f8a4d4d8369d17d5c14ee44468cd1dfbf934c3f0d4f8f7b6644337eccb809fec6b9efe0ff68399aa9747c3b463a56e840969249f5cfa10148572cf07fa698b27bd0fea2a412c16620697c981b14167124e11af812542a6b72bbe3f251ed01dd99af86295844894132abc3095baf1c0b586c5eefe6d88bf4fb07ee83e2c3cb29fd7be8f1725e2028c1"}, 0xeb, 0x3) umount2(&(0x7f0000000380)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file1\x00') mknodat$loop(r0, &(0x7f0000000340)='./file0\x00', 0x6000, 0x1) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5009, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5009, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) (async) 19:45:08 executing program 1: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x701000, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) umount2(&(0x7f0000000000)='./file0\x00', 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 19:45:08 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="551d53db6298f8d9271e77175e9bd32ccb2be4dfd2d8ad1bc86e41a98d992ed75c3d3a6a5df24eceedb1b34af3", 0x2d, 0xfffffffffffffff9) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000080), &(0x7f0000000240)={0x0, 0xfb, 0xeb, 0x0, 0x68, "2b9e439b70a43277e77f2376e9d0a442", "dc4e80e620e06f38ed9ec670d48c87c93b8314d6bdfc68d036b64a00a1b2f603e3c2375db90a192e9b0ad9584c32db7e31bef3a93b766150f0f59b0a2d3b5ee27c1d53e3becaf36f3e18b9f54f3f8a4d4d8369d17d5c14ee44468cd1dfbf934c3f0d4f8f7b6644337eccb809fec6b9efe0ff68399aa9747c3b463a56e840969249f5cfa10148572cf07fa698b27bd0fea2a412c16620697c981b14167124e11af812542a6b72bbe3f251ed01dd99af86295844894132abc3095baf1c0b586c5eefe6d88bf4fb07ee83e2c3cb29fd7be8f1725e2028c1"}, 0xeb, 0x3) (async, rerun: 32) umount2(&(0x7f0000000380)='./file0\x00', 0x0) (rerun: 32) chdir(&(0x7f00000000c0)='./file1\x00') mknodat$loop(r0, &(0x7f0000000340)='./file0\x00', 0x6000, 0x1) 19:45:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000000)=""/78) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)={0x40, 0x9}) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='cgroup2\x00', 0x2002401, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000040)='cgroup2\x00', 0x2002401, 0x0) (async) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5009, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x5009, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000)=0x1, 0x4) (async) 19:45:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000000)=""/78) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000080)={0x40, 0x9}) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:08 executing program 1: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x701000, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x3b40449, 0x0) 19:45:08 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="551d53db6298f8d9271e77175e9bd32ccb2be4dfd2d8ad1bc86e41a98d992ed75c3d3a6a5df24eceedb1b34af3", 0x2d, 0xfffffffffffffff9) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000080), &(0x7f0000000240)={0x0, 0xfb, 0xeb, 0x0, 0x68, "2b9e439b70a43277e77f2376e9d0a442", "dc4e80e620e06f38ed9ec670d48c87c93b8314d6bdfc68d036b64a00a1b2f603e3c2375db90a192e9b0ad9584c32db7e31bef3a93b766150f0f59b0a2d3b5ee27c1d53e3becaf36f3e18b9f54f3f8a4d4d8369d17d5c14ee44468cd1dfbf934c3f0d4f8f7b6644337eccb809fec6b9efe0ff68399aa9747c3b463a56e840969249f5cfa10148572cf07fa698b27bd0fea2a412c16620697c981b14167124e11af812542a6b72bbe3f251ed01dd99af86295844894132abc3095baf1c0b586c5eefe6d88bf4fb07ee83e2c3cb29fd7be8f1725e2028c1"}, 0xeb, 0x3) (async) umount2(&(0x7f0000000380)='./file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file1\x00') mknodat$loop(r0, &(0x7f0000000340)='./file0\x00', 0x6000, 0x1) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) umount2(&(0x7f0000000000)='./file0\x00', 0x2) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 19:45:08 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB='bd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfshat=*,fsuuid=ucff234e-7ecc-7fb\x00-n895-\x0019fa48c,dont_measure,fsmagic=0x0000000000000004,dont_hash,smackfshat=/dev/sr0\x00,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',audit,euid<', @ANYRESDEC=0x0, @ANYBLOB=',func=KEXEC_INITRAMFS_CHECK,\x00'], 0x0, 0x0, &(0x7f0000000280)="97f3b4ed9227d277ea39") linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00', 0x1400) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0xb}}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '\f'}}]}}, 0x0, 0x0, &(0x7f00000001c0)="b7f89d75ad652600451597d6bf00158de37530cbb8787e7f3e4d0c8efe5f30ede97dc920d5163ea453d8bba831480a7d22805317c91516f07c8c0749a896a9fb0344e8b0c262bd") mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x3b40449, 0x0) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000000)='./file0\x00') removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') 19:45:08 executing program 1: getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x701000, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:08 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB='bd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfshat=*,fsuuid=ucff234e-7ecc-7fb\x00-n895-\x0019fa48c,dont_measure,fsmagic=0x0000000000000004,dont_hash,smackfshat=/dev/sr0\x00,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',audit,euid<', @ANYRESDEC=0x0, @ANYBLOB=',func=KEXEC_INITRAMFS_CHECK,\x00'], 0x0, 0x0, &(0x7f0000000280)="97f3b4ed9227d277ea39") linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00', 0x1400) 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @fixed}, &(0x7f0000000080)=0xe, 0x100800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x8001, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,dont_apxraise,fscontext=unconfined_u,rootcontext=user_u,\x00'], 0x0, 0x0, &(0x7f0000000340)="03524dac547414a93497df5a84f55315361e99d5599cdb8d3c15cc031b606fcfd0e1f2e17fa3fe90fc1d43ccc0a94e82e51677c5c96e8c0489e83cce32ba84607548706fa5b8d0c492fb839e11e1f95ec3dc08") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0xb}}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '\f'}}]}}, 0x0, 0x0, &(0x7f00000001c0)="b7f89d75ad652600451597d6bf00158de37530cbb8787e7f3e4d0c8efe5f30ede97dc920d5163ea453d8bba831480a7d22805317c91516f07c8c0749a896a9fb0344e8b0c262bd") (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000000)='./file0\x00') removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) chroot(&(0x7f0000000000)='./file0\x00') (async) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') (async) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x3b40449, 0x0) 19:45:08 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:08 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) (async, rerun: 64) r1 = syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x10000, &(0x7f0000000100)=ANY=[@ANYBLOB='bd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,smackfshat=*,fsuuid=ucff234e-7ecc-7fb\x00-n895-\x0019fa48c,dont_measure,fsmagic=0x0000000000000004,dont_hash,smackfshat=/dev/sr0\x00,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',audit,euid<', @ANYRESDEC=0x0, @ANYBLOB=',func=KEXEC_INITRAMFS_CHECK,\x00'], 0x0, 0x0, &(0x7f0000000280)="97f3b4ed9227d277ea39") linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000300)='./file0\x00', 0x1400) 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) (async) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @fixed}, &(0x7f0000000080)=0xe, 0x100800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x8001, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,dont_apxraise,fscontext=unconfined_u,rootcontext=user_u,\x00'], 0x0, 0x0, &(0x7f0000000340)="03524dac547414a93497df5a84f55315361e99d5599cdb8d3c15cc031b606fcfd0e1f2e17fa3fe90fc1d43ccc0a94e82e51677c5c96e8c0489e83cce32ba84607548706fa5b8d0c492fb839e11e1f95ec3dc08") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x800, 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000008, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}, {@blksize}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x3f}}, {@euid_eq={'euid', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@appraise}]}}, 0x0, 0x0, &(0x7f0000000200)="ccc8891e1e0fc329045e38504d61a3c2588c689ec5b81ed917d094b97be73b879aa8486c6dc9c4ffcd39eeb9f162940131ab801e7e20542dc898508f") mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0xb}}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '\f'}}]}}, 0x0, 0x0, &(0x7f00000001c0)="b7f89d75ad652600451597d6bf00158de37530cbb8787e7f3e4d0c8efe5f30ede97dc920d5163ea453d8bba831480a7d22805317c91516f07c8c0749a896a9fb0344e8b0c262bd") mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r0}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@default_permissions}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0xb}}, {@fowner_lt={'fowner<', 0xee01}}, {@subj_user={'subj_user', 0x3d, '\f'}}]}}, 0x0, 0x0, &(0x7f00000001c0)="b7f89d75ad652600451597d6bf00158de37530cbb8787e7f3e4d0c8efe5f30ede97dc920d5163ea453d8bba831480a7d22805317c91516f07c8c0749a896a9fb0344e8b0c262bd") (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) 19:45:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000000)='./file0\x00') removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) chroot(&(0x7f0000000000)='./file0\x00') (async) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') (async) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f00000003c0)='./file0\x00', 0x0) (async) r0 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0x0, @fixed}, &(0x7f0000000080)=0xe, 0x100800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x200}}, './file0\x00'}) (async, rerun: 32) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async, rerun: 32) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x8001, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,dont_apxraise,fscontext=unconfined_u,rootcontext=user_u,\x00'], 0x0, 0x0, &(0x7f0000000340)="03524dac547414a93497df5a84f55315361e99d5599cdb8d3c15cc031b606fcfd0e1f2e17fa3fe90fc1d43ccc0a94e82e51677c5c96e8c0489e83cce32ba84607548706fa5b8d0c492fb839e11e1f95ec3dc08") (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:08 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x800, 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f0000004280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000008, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}, {@blksize}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x3f}}, {@euid_eq={'euid', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@appraise}]}}, 0x0, 0x0, &(0x7f0000000200)="ccc8891e1e0fc329045e38504d61a3c2588c689ec5b81ed917d094b97be73b879aa8486c6dc9c4ffcd39eeb9f162940131ab801e7e20542dc898508f") mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000240), 0x80) (async) mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x800, 0x1) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000004280)={0x2020}, 0x2020) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000008, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}, {@blksize}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x3f}}, {@euid_eq={'euid', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@appraise}]}}, 0x0, 0x0, &(0x7f0000000200)="ccc8891e1e0fc329045e38504d61a3c2588c689ec5b81ed917d094b97be73b879aa8486c6dc9c4ffcd39eeb9f162940131ab801e7e20542dc898508f") (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:45:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x998c4, 0x0, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:08 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:08 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:45:08 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:09 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mknodat$loop(r0, &(0x7f0000000280)='./file0\x00', 0x800, 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000004280)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000008, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}, {@blksize}, {@default_permissions}], [{@pcr={'pcr', 0x3d, 0x3f}}, {@euid_eq={'euid', 0x3d, r2}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@appraise}]}}, 0x0, 0x0, &(0x7f0000000200)="ccc8891e1e0fc329045e38504d61a3c2588c689ec5b81ed917d094b97be73b879aa8486c6dc9c4ffcd39eeb9f162940131ab801e7e20542dc898508f") (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:09 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0xffffffffffffff46) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) 19:45:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) (async, rerun: 64) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) (rerun: 64) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x998c4, 0x0, 0x0, 0x0, 0x0) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:09 executing program 5: ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f00000000c0)={0x2000, 0x100000}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@ax25={{0x3, @bcast}, [@default, @null, @netrom, @remote, @remote, @bcast, @bcast, @rose]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001480)=""/196, 0xc4}, {&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)=""/105, 0x69}], 0x3, &(0x7f0000000300)=""/4096, 0x1000}, 0x0) 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='\x00', &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) 19:45:09 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0xffffffffffffff46) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2020040, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other}, {@default_permissions}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt}, {@dont_measure}, {@context={'context', 0x3d, 'sysadm_u'}}, {@hash}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor}, {@subj_user={'subj_user', 0x3d, '/dev/sr0\x00'}}]}}, 0x1, 0x0, &(0x7f0000000300)="21eaec924fc698aa338ef84e8106d29e5223cf9e38c2dec506a951423a955f721b8ef135009be9f25defc0954e28322e08b93c430181c665cf8b238675d747d15308a55c0cb48ec7e2bbcec88f572cf24f610a72e93d3b8be59e8242d485d6e6359b7149a1817038a89b179725941cdfc2c0e0ad55318eb957cd71b951326985ac8569822f135ec6488431718a9d2d7fce314d80dc14137eb7f51360ad46afeab6575f2685bd9b039905e58885255617f4e96e7fdaf883af1689b196dd8b0850d0c823a308e6495f22b8c3") ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 19:45:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x998c4, 0x0, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) (async) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x998c4, 0x0, 0x0, 0x0, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r1) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:09 executing program 5: ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f00000000c0)={0x2000, 0x100000}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@ax25={{0x3, @bcast}, [@default, @null, @netrom, @remote, @remote, @bcast, @bcast, @rose]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001480)=""/196, 0xc4}, {&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)=""/105, 0x69}], 0x3, &(0x7f0000000300)=""/4096, 0x1000}, 0x0) 19:45:09 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0xffffffffffffff46) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000100)={0x2020}, 0xffffffffffffff46) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='pstore\x00', 0x0, 0x0) (async) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x400, 0x0) (async) 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='\x00', &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) chroot(&(0x7f0000000000)='./file0\x00') (async, rerun: 32) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2020040, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other}, {@default_permissions}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt}, {@dont_measure}, {@context={'context', 0x3d, 'sysadm_u'}}, {@hash}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor}, {@subj_user={'subj_user', 0x3d, '/dev/sr0\x00'}}]}}, 0x1, 0x0, &(0x7f0000000300)="21eaec924fc698aa338ef84e8106d29e5223cf9e38c2dec506a951423a955f721b8ef135009be9f25defc0954e28322e08b93c430181c665cf8b238675d747d15308a55c0cb48ec7e2bbcec88f572cf24f610a72e93d3b8be59e8242d485d6e6359b7149a1817038a89b179725941cdfc2c0e0ad55318eb957cd71b951326985ac8569822f135ec6488431718a9d2d7fce314d80dc14137eb7f51360ad46afeab6575f2685bd9b039905e58885255617f4e96e7fdaf883af1689b196dd8b0850d0c823a308e6495f22b8c3") ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='\x00', &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='\x00', &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) (async) 19:45:09 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000080)={0x4, 0x1, 0xd3e2, 0x9, 0x8000}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:09 executing program 5: ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f00000000c0)={0x2000, 0x100000}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@ax25={{0x3, @bcast}, [@default, @null, @netrom, @remote, @remote, @bcast, @bcast, @rose]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001480)=""/196, 0xc4}, {&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)=""/105, 0x69}], 0x3, &(0x7f0000000300)=""/4096, 0x1000}, 0x0) 19:45:09 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') getpeername(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xa) 19:45:09 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000080)={0x4, 0x1, 0xd3e2, 0x9, 0x8000}) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:09 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2020040, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other}, {@default_permissions}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt}, {@dont_measure}, {@context={'context', 0x3d, 'sysadm_u'}}, {@hash}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor}, {@subj_user={'subj_user', 0x3d, '/dev/sr0\x00'}}]}}, 0x1, 0x0, &(0x7f0000000300)="21eaec924fc698aa338ef84e8106d29e5223cf9e38c2dec506a951423a955f721b8ef135009be9f25defc0954e28322e08b93c430181c665cf8b238675d747d15308a55c0cb48ec7e2bbcec88f572cf24f610a72e93d3b8be59e8242d485d6e6359b7149a1817038a89b179725941cdfc2c0e0ad55318eb957cd71b951326985ac8569822f135ec6488431718a9d2d7fce314d80dc14137eb7f51360ad46afeab6575f2685bd9b039905e58885255617f4e96e7fdaf883af1689b196dd8b0850d0c823a308e6495f22b8c3") ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) getuid() (async) write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2020040, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other}, {@default_permissions}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt}, {@dont_measure}, {@context={'context', 0x3d, 'sysadm_u'}}, {@hash}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor}, {@subj_user={'subj_user', 0x3d, '/dev/sr0\x00'}}]}}, 0x1, 0x0, &(0x7f0000000300)="21eaec924fc698aa338ef84e8106d29e5223cf9e38c2dec506a951423a955f721b8ef135009be9f25defc0954e28322e08b93c430181c665cf8b238675d747d15308a55c0cb48ec7e2bbcec88f572cf24f610a72e93d3b8be59e8242d485d6e6359b7149a1817038a89b179725941cdfc2c0e0ad55318eb957cd71b951326985ac8569822f135ec6488431718a9d2d7fce314d80dc14137eb7f51360ad46afeab6575f2685bd9b039905e58885255617f4e96e7fdaf883af1689b196dd8b0850d0c823a308e6495f22b8c3") (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)) (async) 19:45:09 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:09 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') getpeername(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) 19:45:09 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (rerun: 32) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:09 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000080)={0x4, 0x1, 0xd3e2, 0x9, 0x8000}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000080)={0x4, 0x1, 0xd3e2, 0x9, 0x8000}) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) [ 2496.666463] autofs4:pid:18885:autofs4_fill_super: called with bogus options 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xa) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0xa) (async) 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0/file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x3) 19:45:09 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x2004000, &(0x7f0000000140)=')\'(\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x104, 0x6, 0x0, 0x1, 0x9}, 0x10) 19:45:09 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async, rerun: 32) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') (rerun: 32) 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) (async) 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async, rerun: 32) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 32) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async, rerun: 64) renameat2(r0, &(0x7f0000000000)='./file0/file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x3) (rerun: 64) 19:45:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_CAP_SPLIT_IRQCHIP(r0, 0x4068aea3, &(0x7f0000000080)) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0xa) 19:45:09 executing program 0: mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x20, 0x1) [ 2496.860803] devpts: called with bogus options 19:45:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_CAP_SPLIT_IRQCHIP(r0, 0x4068aea3, &(0x7f0000000080)) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:09 executing program 0: mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x20, 0x1) 19:45:09 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) renameat2(r0, &(0x7f0000000000)='./file0/file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x3) 19:45:09 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x2004000, &(0x7f0000000140)=')\'(\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x104, 0x6, 0x0, 0x1, 0x9}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x2004000, &(0x7f0000000140)=')\'(\x00') (async) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x104, 0x6, 0x0, 0x1, 0x9}, 0x10) (async) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') [ 2496.892835] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2496.903260] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2496.933219] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2496.955500] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2496.976410] autofs4:pid:18935:autofs4_fill_super: called with bogus options 19:45:09 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async, rerun: 32) ioctl$KVM_CAP_SPLIT_IRQCHIP(r0, 0x4068aea3, &(0x7f0000000080)) (async, rerun: 32) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) [ 2496.986876] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2496.989895] devpts: called with bogus options [ 2496.998708] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2497.010338] devpts: called with bogus options [ 2497.027947] autofs4:pid:18935:autofs4_fill_super: called with bogus options 19:45:09 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x28c007c, 0x0, 0x1, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f0000000180)=""/25, 0x19}, {&(0x7f00000001c0)=""/166, 0xa6}], 0x3}, 0x1) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:09 executing program 0: mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 32) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x20, 0x1) 19:45:09 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) linkat(r2, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x400) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') (async) 19:45:09 executing program 2: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x2004000, &(0x7f0000000140)=')\'(\x00') (async) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x104, 0x6, 0x0, 0x1, 0x9}, 0x10) 19:45:09 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x10) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) [ 2497.039820] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2497.047371] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2497.056998] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2497.065313] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2497.072897] autofs4:pid:18935:autofs4_fill_super: called with bogus options [ 2497.080355] autofs4:pid:18935:autofs4_fill_super: called with bogus options 19:45:09 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x40, 0x1) (async) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) linkat(r2, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x400) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:09 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') 19:45:09 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:09 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x28c007c, 0x0, 0x1, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f0000000180)=""/25, 0x19}, {&(0x7f00000001c0)=""/166, 0xa6}], 0x3}, 0x1) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x28c007c, 0x0, 0x1, 0x0, 0x0) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f0000000180)=""/25, 0x19}, {&(0x7f00000001c0)=""/166, 0xa6}], 0x3}, 0x1) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) 19:45:09 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async, rerun: 32) getpeername$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x10) (async, rerun: 32) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1000) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:09 executing program 2: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)=""/55, 0x37) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000180)='$\'(\x001\x91\b\xe1\xd1\a\xfb\x8f\r\x11\x1f}\xa0b\x89-\xff\x9c\xb7.\xc2\x93/\x8b\xb6\xbb\a\xb1e\xf1,Q\xc6\xbc\xa6\xb6l\x97\x9c#\xa3\xac\xb14+[u91\x8a\xd8\xd8\xf3j') 19:45:10 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x2) (async, rerun: 32) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x82, 0x0) (rerun: 32) mknodat$loop(r1, &(0x7f0000000180)='./file0\x00', 0x40, 0x1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) (async) linkat(r2, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x400) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:10 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername$llc(0xffffffffffffffff, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x10) (async) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1000) (async, rerun: 64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (rerun: 64) 19:45:10 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x28c007c, 0x0, 0x1, 0x0, 0x0) (async, rerun: 64) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/152, 0x98}, {&(0x7f0000000180)=""/25, 0x19}, {&(0x7f00000001c0)=""/166, 0xa6}], 0x3}, 0x1) (rerun: 64) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:10 executing program 2: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)=""/55, 0x37) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000180)='$\'(\x001\x91\b\xe1\xd1\a\xfb\x8f\r\x11\x1f}\xa0b\x89-\xff\x9c\xb7.\xc2\x93/\x8b\xb6\xbb\a\xb1e\xf1,Q\xc6\xbc\xa6\xb6l\x97\x9c#\xa3\xac\xb14+[u91\x8a\xd8\xd8\xf3j') 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:10 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 19:45:10 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:10 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x8, 0x0) 19:45:10 executing program 2: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)=""/55, 0x37) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000180)='$\'(\x001\x91\b\xe1\xd1\a\xfb\x8f\r\x11\x1f}\xa0b\x89-\xff\x9c\xb7.\xc2\x93/\x8b\xb6\xbb\a\xb1e\xf1,Q\xc6\xbc\xa6\xb6l\x97\x9c#\xa3\xac\xb14+[u91\x8a\xd8\xd8\xf3j') 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:10 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) chdir(&(0x7f0000000000)='./file0\x00') (async) 19:45:10 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x8, 0x0) 19:45:10 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getgid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2801, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030986b07adb6534593263b0864f774303030303030303030303030303134303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',default_permissions,blksize=0x0000000000001400,max_read=0x0000000000008000,mask=MAY_WRITE,fscontext=sysadm_u,lazytime,euid<', @ANYRESDEC, @ANYBLOB="090064e1a6f067770266e535a3aed6c3f927f4937e8056bcab18a24e340232760c8d5e1c116cb24b022d2d156051a079fad5197e4fe2b66dd46a433a22d121492948e90942"], 0x1, 0x0, &(0x7f0000000240)="a2de1f5c118cf1f6c4482463c4a74a9b880bf7a7bbd93db2ccc2") r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x40800) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getsockname(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000180)=0x80) bind$bt_l2cap(r4, &(0x7f00000001c0)={0x1f, 0xff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7fff}, 0xe) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r5, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000000280)=""/153) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r6, 0x0, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r6, 0x65, 0x4, &(0x7f0000000200), &(0x7f00000004c0)=0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r7, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r7, 0x4010ae68, &(0x7f0000000340)={0x2000}) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xffffece8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') 19:45:10 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1002, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) chdir(&(0x7f0000000000)='./file0\x00') (async) 19:45:10 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:10 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getgid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2801, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030986b07adb6534593263b0864f774303030303030303030303030303134303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',default_permissions,blksize=0x0000000000001400,max_read=0x0000000000008000,mask=MAY_WRITE,fscontext=sysadm_u,lazytime,euid<', @ANYRESDEC, @ANYBLOB="090064e1a6f067770266e535a3aed6c3f927f4937e8056bcab18a24e340232760c8d5e1c116cb24b022d2d156051a079fad5197e4fe2b66dd46a433a22d121492948e90942"], 0x1, 0x0, &(0x7f0000000240)="a2de1f5c118cf1f6c4482463c4a74a9b880bf7a7bbd93db2ccc2") (async) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x40800) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) getsockname(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000180)=0x80) bind$bt_l2cap(r4, &(0x7f00000001c0)={0x1f, 0xff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7fff}, 0xe) (async) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r5, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000000280)=""/153) (async) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r6, 0x0, 0x0) (async) getsockopt$CAN_RAW_RECV_OWN_MSGS(r6, 0x65, 0x4, &(0x7f0000000200), &(0x7f00000004c0)=0x4) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r7, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r7, 0x4010ae68, &(0x7f0000000340)={0x2000}) (async) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xffffece8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 19:45:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@canfd={{0x2}, 0x29, 0x1, 0x0, 0x0, "234c649a1db2d961fcdf71c5e2cbf0fcfa8560a5fbd83170640000000000000000000000000000000000001000000000fb00"}, 0x48}, 0x1, 0x0, 0x0, 0x24000044}, 0xa001) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39c}}, './file0\x00'}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') 19:45:10 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6454762f7372307c113e24ea00a996c5d0050f0092de497d0efe8fe63fa240c50800000096db922d67deaecd21e733829bc809d354849ed47f5420363045d807575358c76f498da1e77123d56396ba0b1006cade5597579db712467d2cb9c4e6129bbc60ab8229261128b9d64d90534b1fd15de1807469362796d8502964b1ff82c974c9cca4dc804c6462cefc8c01868384885661a8ee6f6c29872179387e54348de69c0b3cec5448f1a6a0503bfe791c73433782d73eaaa4553e6cc68d0753947e72d5f615f592485fb2387eb5e5da49"], &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 19:45:10 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x8, 0x0) 19:45:10 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@canfd={{0x2}, 0x29, 0x1, 0x0, 0x0, "234c649a1db2d961fcdf71c5e2cbf0fcfa8560a5fbd83170640000000000000000000000000000000000001000000000fb00"}, 0x48}, 0x1, 0x0, 0x0, 0x24000044}, 0xa001) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39c}}, './file0\x00'}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@canfd={{0x2}, 0x29, 0x1, 0x0, 0x0, "234c649a1db2d961fcdf71c5e2cbf0fcfa8560a5fbd83170640000000000000000000000000000000000001000000000fb00"}, 0x48}, 0x1, 0x0, 0x0, 0x24000044}, 0xa001) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39c}}, './file0\x00'}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') (async) 19:45:10 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getgid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2801, &(0x7f0000000900)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030986b07adb6534593263b0864f774303030303030303030303030303134303030302c757365725f69643d", @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',default_permissions,blksize=0x0000000000001400,max_read=0x0000000000008000,mask=MAY_WRITE,fscontext=sysadm_u,lazytime,euid<', @ANYRESDEC, @ANYBLOB="090064e1a6f067770266e535a3aed6c3f927f4937e8056bcab18a24e340232760c8d5e1c116cb24b022d2d156051a079fad5197e4fe2b66dd46a433a22d121492948e90942"], 0x1, 0x0, &(0x7f0000000240)="a2de1f5c118cf1f6c4482463c4a74a9b880bf7a7bbd93db2ccc2") (async) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) accept4$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x40800) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async, rerun: 32) getsockname(r2, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000180)=0x80) (rerun: 32) bind$bt_l2cap(r4, &(0x7f00000001c0)={0x1f, 0xff, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7fff}, 0xe) (async) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r5, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000000280)=""/153) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r6, 0x0, 0x0) (async) getsockopt$CAN_RAW_RECV_OWN_MSGS(r6, 0x65, 0x4, &(0x7f0000000200), &(0x7f00000004c0)=0x4) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r7, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r7, 0x4010ae68, &(0x7f0000000340)={0x2000}) (async) sendmsg$BATADV_CMD_GET_VLAN(r6, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x0, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xffffece8}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 19:45:10 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6454762f7372307c113e24ea00a996c5d0050f0092de497d0efe8fe63fa240c50800000096db922d67deaecd21e733829bc809d354849ed47f5420363045d807575358c76f498da1e77123d56396ba0b1006cade5597579db712467d2cb9c4e6129bbc60ab8229261128b9d64d90534b1fd15de1807469362796d8502964b1ff82c974c9cca4dc804c6462cefc8c01868384885661a8ee6f6c29872179387e54348de69c0b3cec5448f1a6a0503bfe791c73433782d73eaaa4553e6cc68d0753947e72d5f615f592485fb2387eb5e5da49"], &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 19:45:10 executing program 5: recvfrom$llc(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99, 0x10040, &(0x7f0000000000)={0x1a, 0x2, 0x40, 0x7, 0x7, 0x40, @local}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:10 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:10 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f0000000080)=@canfd={{0x2}, 0x29, 0x1, 0x0, 0x0, "234c649a1db2d961fcdf71c5e2cbf0fcfa8560a5fbd83170640000000000000000000000000000000000001000000000fb00"}, 0x48}, 0x1, 0x0, 0x0, 0x24000044}, 0xa001) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x39c}}, './file0\x00'}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6454762f7372307c113e24ea00a996c5d0050f0092de497d0efe8fe63fa240c50800000096db922d67deaecd21e733829bc809d354849ed47f5420363045d807575358c76f498da1e77123d56396ba0b1006cade5597579db712467d2cb9c4e6129bbc60ab8229261128b9d64d90534b1fd15de1807469362796d8502964b1ff82c974c9cca4dc804c6462cefc8c01868384885661a8ee6f6c29872179387e54348de69c0b3cec5448f1a6a0503bfe791c73433782d73eaaa4553e6cc68d0753947e72d5f615f592485fb2387eb5e5da49"], &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6454762f7372307c113e24ea00a996c5d0050f0092de497d0efe8fe63fa240c50800000096db922d67deaecd21e733829bc809d354849ed47f5420363045d807575358c76f498da1e77123d56396ba0b1006cade5597579db712467d2cb9c4e6129bbc60ab8229261128b9d64d90534b1fd15de1807469362796d8502964b1ff82c974c9cca4dc804c6462cefc8c01868384885661a8ee6f6c29872179387e54348de69c0b3cec5448f1a6a0503bfe791c73433782d73eaaa4553e6cc68d0753947e72d5f615f592485fb2387eb5e5da49"], &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) (async) 19:45:10 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000400)='romfs\x00', 0xa480, 0x0) 19:45:10 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1800) 19:45:10 executing program 4: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 5: recvfrom$llc(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99, 0x10040, &(0x7f0000000000)={0x1a, 0x2, 0x40, 0x7, 0x7, 0x40, @local}, 0x10) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:10 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) 19:45:10 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) (async) 19:45:10 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1800) 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000400)='romfs\x00', 0xa480, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000400)='romfs\x00', 0xa480, 0x0) (async) 19:45:10 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) (async) 19:45:10 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1800) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1800) (async) 19:45:10 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) (async) 19:45:10 executing program 5: recvfrom$llc(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99, 0x10040, &(0x7f0000000000)={0x1a, 0x2, 0x40, 0x7, 0x7, 0x40, @local}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99, 0x10040, &(0x7f0000000000)={0x1a, 0x2, 0x40, 0x7, 0x7, 0x40, @local}, 0x10) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) 19:45:10 executing program 4: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:10 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) (async, rerun: 32) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0) (rerun: 32) 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000400)='romfs\x00', 0xa480, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000400)='romfs\x00', 0xa480, 0x0) (async) 19:45:10 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x60c080, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1400) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:10 executing program 4: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:10 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2420000c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x58, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast2}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8000}, 0x20004090) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:10 executing program 5: semget$private(0x0, 0x4, 0x124) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x43000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '))+&\x00'}, &(0x7f0000000100)=""/146, 0x92) symlink(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00') 19:45:10 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="b2f765762f00"/19], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000000c0)=""/119, 0x77, 0x40002121, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x40) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0xb, r3}, 0x10) 19:45:10 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x60c080, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1400) (async, rerun: 64) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x1) (async, rerun: 64) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:10 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:10 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2420000c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x58, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast2}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8000}, 0x20004090) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:10 executing program 5: semget$private(0x0, 0x4, 0x124) (async) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x43000, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '))+&\x00'}, &(0x7f0000000100)=""/146, 0x92) (async) symlink(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00') 19:45:10 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:10 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="b2f765762f00"/19], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000000c0)=""/119, 0x77, 0x40002121, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x40) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r2, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0xb, r3}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="b2f765762f00"/19], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) recvfrom$rose(r2, &(0x7f00000000c0)=""/119, 0x77, 0x40002121, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x40) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) (async) read$FUSE(r2, &(0x7f0000002240)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0xb, r3}, 0x10) (async) 19:45:10 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x60c080, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1400) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x60c080, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) (async) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1400) (async) mknodat$loop(r0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x1) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2420000c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x58, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast2}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8000}, 0x20004090) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2420000c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa0, r0, 0x8, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_ADDR={0x58, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast2}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8000}, 0x20004090) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:11 executing program 5: semget$private(0x0, 0x4, 0x124) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x43000, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', '))+&\x00'}, &(0x7f0000000100)=""/146, 0x92) (async) symlink(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00') 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x1) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x5) 19:45:11 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="b2f765762f00"/19], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) setsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000040)=0x1, 0x4) (async) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000000c0)=""/119, 0x77, 0x40002121, &(0x7f0000000140)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x40) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x0) (async) read$FUSE(r2, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r2, &(0x7f00000001c0)={0x10, 0xb, r3}, 0x10) 19:45:11 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x5) 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:11 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) (async) 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000080)=""/4, 0x4}], 0x3, &(0x7f0000000100)=""/184, 0xb8}, 0x41) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x7fffffff}) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x5) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) renameat2(r0, &(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x5) (async) 19:45:11 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000080)=""/4, 0x4}], 0x3, &(0x7f0000000100)=""/184, 0xb8}, 0x41) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x7fffffff}) syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) socket$kcm(0x29, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) (async) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000080)=""/4, 0x4}], 0x3, &(0x7f0000000100)=""/184, 0xb8}, 0x41) (async) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x7fffffff}) (async) 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) (async) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000180)=""/157, 0x9d) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000040)=""/7, 0x7}, {&(0x7f0000000080)=""/4, 0x4}], 0x3, &(0x7f0000000100)=""/184, 0xb8}, 0x41) (async) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000000)={0x7fffffff}) 19:45:11 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x20, 0x0) 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x8}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x202a00) symlink(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00') recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000080)=@caif=@util, 0x80, &(0x7f0000001400)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f0000001300)=""/209, 0xd1}], 0x8, &(0x7f0000001480)=""/180, 0xb4}, 0x40010040) 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='vfat\x00', 0x240406, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000180)=""/157, 0x9d) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000180)=""/157, 0x9d) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:11 executing program 0: ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000040)={0x200, 0x7, 0xa3, 0x4, 0x200}) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000000)=0x9) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x20000, 0x0) 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x8}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x202a00) symlink(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00') (async) recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000080)=@caif=@util, 0x80, &(0x7f0000001400)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f0000001300)=""/209, 0xd1}], 0x8, &(0x7f0000001480)=""/180, 0xb4}, 0x40010040) 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='vfat\x00', 0x240406, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='vfat\x00', 0x240406, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:11 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) (async) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x20, 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x8}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x202a00) symlink(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00') recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000080)=@caif=@util, 0x80, &(0x7f0000001400)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f0000001300)=""/209, 0xd1}], 0x8, &(0x7f0000001480)=""/180, 0xb4}, 0x40010040) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x8}, 0x10) (async) syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x202a00) (async) symlink(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00') (async) recvmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000080)=@caif=@util, 0x80, &(0x7f0000001400)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000000200)=""/51, 0x33}, {&(0x7f0000000240)=""/54, 0x36}, {&(0x7f0000000280)=""/5, 0x5}, {&(0x7f0000001300)=""/209, 0xd1}], 0x8, &(0x7f0000001480)=""/180, 0xb4}, 0x40010040) (async) 19:45:11 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) (async) mknodat$loop(r0, &(0x7f0000000080)='./file0\x00', 0x20, 0x0) 19:45:11 executing program 0: ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000040)={0x200, 0x7, 0xa3, 0x4, 0x200}) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000000)=0x9) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x20000, 0x0) 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000000180)=""/157, 0x9d) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:11 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='vfat\x00', 0x240406, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000000)='vfat\x00', 0x240406, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:11 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x27cc654880eb6375) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000000)='./file0\x00') 19:45:11 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:45:11 executing program 0: ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000040)={0x200, 0x7, 0xa3, 0x4, 0x200}) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000000)=0x9) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x20000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f0000000040)={0x200, 0x7, 0xa3, 0x4, 0x200}) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000000)=0x9) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x20000, 0x0) (async) 19:45:11 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x27cc654880eb6375) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) (async) 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000000)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) chroot(&(0x7f0000000000)='./file0\x00') (async) 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x208c, 0x0, 0x3, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7ff}, 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:11 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:45:11 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) (async) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x27cc654880eb6375) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:11 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) (rerun: 32) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, r2}, 0x10) 19:45:11 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:11 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) (async) 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) chroot(&(0x7f0000000000)='./file0\x00') 19:45:11 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x208c, 0x0, 0x3, 0x0, 0x0) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7ff}, 0x8) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:11 executing program 1: keyctl$invalidate(0x15, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:11 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = getuid() write$FUSE_ATTR(r3, &(0x7f00000000c0)={0x78, 0x0, r1, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r4, r2, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0x1250480, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000008,blksize=0x0000000000000c00,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',appraise_type=imasig,fowner=', @ANYRESDEC=r4, @ANYBLOB="2c646f6e745f686173682c657569643c746623bcf09f4154f1521314c3367f43ca7de2fa926397e0d608202ece6af7956141d1022d7b4c5053b76756aca7531b564afa26c431d3ae5c9b89cd2f8e2aadfa01ffff5f39c11a0c3789bb879ffeba91187d314346719d00c02a0992f0929503167ea3d969523e4e876dc5da17d5a009d12c25e045736a053f62ce4d7995af3ee44a6c0545b29d344db1424dce633508a81ad05d1833e59eb2bcdfd8a563d0cee5c3239f764194a4a3ef78494fc1de3df58f8f0573b7616ebb37f40eda684c2151b2cf4f0ab2f0", @ANYRESDEC=0xee01, @ANYBLOB=',\x00'], 0x1, 0x0, &(0x7f0000000200)="a8e413984f6f034b68a8a04cb9cd41abd4ce43be465f5cb6e371125f3e9cf67cb5f2b929ca71c3b6ee6325e0114d42d8d7fd8f04bb5d6415b18ec96a4a982af11958d7eba9299d1b00f4c2a97e6d68c4e6a0b210a06c386292df2e145ac8188957a13857acd24d3272606deea24d86f97b32740cc1c9b0dc87cb37fff887224f515cbe88e847e35500bc2d325f4fc481") 19:45:11 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x208c, 0x0, 0x3, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7ff}, 0x8) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f0000000040)=""/18) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 1: keyctl$invalidate(0x15, 0x0) (async, rerun: 32) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r1, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f0000000040)=""/18) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f0000000040)=""/18) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) 19:45:12 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = getuid() write$FUSE_ATTR(r3, &(0x7f00000000c0)={0x78, 0x0, r1, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r4, r2, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0x1250480, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000008,blksize=0x0000000000000c00,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',appraise_type=imasig,fowner=', @ANYRESDEC=r4, @ANYBLOB="2c646f6e745f686173682c657569643c746623bcf09f4154f1521314c3367f43ca7de2fa926397e0d608202ece6af7956141d1022d7b4c5053b76756aca7531b564afa26c431d3ae5c9b89cd2f8e2aadfa01ffff5f39c11a0c3789bb879ffeba91187d314346719d00c02a0992f0929503167ea3d969523e4e876dc5da17d5a009d12c25e045736a053f62ce4d7995af3ee44a6c0545b29d344db1424dce633508a81ad05d1833e59eb2bcdfd8a563d0cee5c3239f764194a4a3ef78494fc1de3df58f8f0573b7616ebb37f40eda684c2151b2cf4f0ab2f0", @ANYRESDEC=0xee01, @ANYBLOB=',\x00'], 0x1, 0x0, &(0x7f0000000200)="a8e413984f6f034b68a8a04cb9cd41abd4ce43be465f5cb6e371125f3e9cf67cb5f2b929ca71c3b6ee6325e0114d42d8d7fd8f04bb5d6415b18ec96a4a982af11958d7eba9299d1b00f4c2a97e6d68c4e6a0b210a06c386292df2e145ac8188957a13857acd24d3272606deea24d86f97b32740cc1c9b0dc87cb37fff887224f515cbe88e847e35500bc2d325f4fc481") 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') (async) 19:45:12 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r1, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r1, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:12 executing program 1: keyctl$invalidate(0x15, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) keyctl$invalidate(0x15, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) semctl$GETPID(0x0, 0x3, 0xb, &(0x7f0000000040)=""/18) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = geteuid() r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x20cd000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other}, {@default_permissions}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '%'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}, 0x1, 0x0, &(0x7f0000000300)="2ac935b93adda686eb3d24f201eb0b81b8245827e6c33aed752089b751100508a8f311f9439ea878cee3e5e533b9c50776467265661995554e057c296e471c08a014edff5b73908d00e05c39f81f15af31059d1ab94bb7fd3778a22b12c6cfd86369ab42c33b8e819413373bda9aadbff0ddd640ef35b38c66f4f185398126a0f82e") r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) getsockname(r8, &(0x7f0000002240)=@rc={0x1f, @fixed}, &(0x7f00000022c0)=0x80) 19:45:12 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r1, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r4 = getuid() write$FUSE_ATTR(r3, &(0x7f00000000c0)={0x78, 0x0, r1, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r4, r2, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0x1250480, &(0x7f0000002240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB=',max_read=0x0000000000000008,blksize=0x0000000000000c00,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',appraise_type=imasig,fowner=', @ANYRESDEC=r4, @ANYBLOB="2c646f6e745f686173682c657569643c746623bcf09f4154f1521314c3367f43ca7de2fa926397e0d608202ece6af7956141d1022d7b4c5053b76756aca7531b564afa26c431d3ae5c9b89cd2f8e2aadfa01ffff5f39c11a0c3789bb879ffeba91187d314346719d00c02a0992f0929503167ea3d969523e4e876dc5da17d5a009d12c25e045736a053f62ce4d7995af3ee44a6c0545b29d344db1424dce633508a81ad05d1833e59eb2bcdfd8a563d0cee5c3239f764194a4a3ef78494fc1de3df58f8f0573b7616ebb37f40eda684c2151b2cf4f0ab2f0", @ANYRESDEC=0xee01, @ANYBLOB=',\x00'], 0x1, 0x0, &(0x7f0000000200)="a8e413984f6f034b68a8a04cb9cd41abd4ce43be465f5cb6e371125f3e9cf67cb5f2b929ca71c3b6ee6325e0114d42d8d7fd8f04bb5d6415b18ec96a4a982af11958d7eba9299d1b00f4c2a97e6d68c4e6a0b210a06c386292df2e145ac8188957a13857acd24d3272606deea24d86f97b32740cc1c9b0dc87cb37fff887224f515cbe88e847e35500bc2d325f4fc481") 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r1, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r1, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r1, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:12 executing program 5: semctl$GETNCNT(0xffffffffffffffff, 0x0, 0xe, &(0x7f00000001c0)=""/238) r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$FUSE_ATTR(r1, &(0x7f0000002240)={0x78, 0xfffffffffffffffe, r3, {0x8, 0x9, 0x0, {0x1, 0x100, 0x10000000000, 0x3, 0x101, 0xa85, 0x6, 0x1ff, 0x400, 0x2000, 0xfa, r4, r5, 0x7, 0x3}}}, 0x78) r7 = getuid() r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r8, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r8, 0xae47, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000022c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r6, &(0x7f0000000140)={0x10, 0x0, r9}, 0x10) write$FUSE_ATTR(r6, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r7, r5, 0x6, 0x4}}}, 0x78) r10 = getgid() write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, 0x0, {0x80000000, 0x80000000, 0x0, {0x2, 0x2, 0xb27, 0x7ff, 0x7fffffff, 0xd046, 0x4, 0x5, 0x2, 0x1000, 0x6, r7, r10, 0x8, 0x800}}}, 0x78) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2008, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = geteuid() r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x20cd000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other}, {@default_permissions}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '%'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}, 0x1, 0x0, &(0x7f0000000300)="2ac935b93adda686eb3d24f201eb0b81b8245827e6c33aed752089b751100508a8f311f9439ea878cee3e5e533b9c50776467265661995554e057c296e471c08a014edff5b73908d00e05c39f81f15af31059d1ab94bb7fd3778a22b12c6cfd86369ab42c33b8e819413373bda9aadbff0ddd640ef35b38c66f4f185398126a0f82e") r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) getsockname(r8, &(0x7f0000002240)=@rc={0x1f, @fixed}, &(0x7f00000022c0)=0x80) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) geteuid() (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) getuid() (async) write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x20cd000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other}, {@default_permissions}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '%'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}, 0x1, 0x0, &(0x7f0000000300)="2ac935b93adda686eb3d24f201eb0b81b8245827e6c33aed752089b751100508a8f311f9439ea878cee3e5e533b9c50776467265661995554e057c296e471c08a014edff5b73908d00e05c39f81f15af31059d1ab94bb7fd3778a22b12c6cfd86369ab42c33b8e819413373bda9aadbff0ddd640ef35b38c66f4f185398126a0f82e") (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) (async) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) (async) getsockname(r8, &(0x7f0000002240)=@rc={0x1f, @fixed}, &(0x7f00000022c0)=0x80) (async) 19:45:12 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='?dev/|r0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/222, 0xde) 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x981020, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:12 executing program 5: semctl$GETNCNT(0xffffffffffffffff, 0x0, 0xe, &(0x7f00000001c0)=""/238) (async) r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) write$FUSE_ATTR(r1, &(0x7f0000002240)={0x78, 0xfffffffffffffffe, r3, {0x8, 0x9, 0x0, {0x1, 0x100, 0x10000000000, 0x3, 0x101, 0xa85, 0x6, 0x1ff, 0x400, 0x2000, 0xfa, r4, r5, 0x7, 0x3}}}, 0x78) (async) r7 = getuid() r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r8, 0x0, 0x0) (async, rerun: 64) ioctl$KVM_SET_TSS_ADDR(r8, 0xae47, 0x0) (async, rerun: 64) read$FUSE(0xffffffffffffffff, &(0x7f00000022c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r6, &(0x7f0000000140)={0x10, 0x0, r9}, 0x10) write$FUSE_ATTR(r6, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r7, r5, 0x6, 0x4}}}, 0x78) (async) r10 = getgid() write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, 0x0, {0x80000000, 0x80000000, 0x0, {0x2, 0x2, 0xb27, 0x7ff, 0x7fffffff, 0xd046, 0x4, 0x5, 0x2, 0x1000, 0x6, r7, r10, 0x8, 0x800}}}, 0x78) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2008, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x981020, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2008, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2008, 0x0, 0x1, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:12 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 5: semctl$GETNCNT(0xffffffffffffffff, 0x0, 0xe, &(0x7f00000001c0)=""/238) (async) r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 64) write$FUSE_ATTR(r1, &(0x7f0000002240)={0x78, 0xfffffffffffffffe, r3, {0x8, 0x9, 0x0, {0x1, 0x100, 0x10000000000, 0x3, 0x101, 0xa85, 0x6, 0x1ff, 0x400, 0x2000, 0xfa, r4, r5, 0x7, 0x3}}}, 0x78) (rerun: 64) r7 = getuid() r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r8, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r8, 0xae47, 0x0) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f00000022c0)={0x2020, 0x0, 0x0}, 0x2020) (rerun: 32) write$FUSE_INTERRUPT(r6, &(0x7f0000000140)={0x10, 0x0, r9}, 0x10) (async, rerun: 64) write$FUSE_ATTR(r6, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r7, r5, 0x6, 0x4}}}, 0x78) (rerun: 64) r10 = getgid() write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, 0x0, {0x80000000, 0x80000000, 0x0, {0x2, 0x2, 0xb27, 0x7ff, 0x7fffffff, 0xd046, 0x4, 0x5, 0x2, 0x1000, 0x6, r7, r10, 0x8, 0x800}}}, 0x78) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x981020, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:12 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@ieee802154={0x24, @long}, &(0x7f0000000180)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = geteuid() r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x20cd000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other}, {@default_permissions}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '%'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}, 0x1, 0x0, &(0x7f0000000300)="2ac935b93adda686eb3d24f201eb0b81b8245827e6c33aed752089b751100508a8f311f9439ea878cee3e5e533b9c50776467265661995554e057c296e471c08a014edff5b73908d00e05c39f81f15af31059d1ab94bb7fd3778a22b12c6cfd86369ab42c33b8e819413373bda9aadbff0ddd640ef35b38c66f4f185398126a0f82e") r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) (async) getsockname(r8, &(0x7f0000002240)=@rc={0x1f, @fixed}, &(0x7f00000022c0)=0x80) 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x0) (async, rerun: 64) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='?dev/|r0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/222, 0xde) 19:45:12 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@ieee802154={0x24, @long}, &(0x7f0000000180)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) (async) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@ieee802154={0x24, @long}, &(0x7f0000000180)=0x80) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:12 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00') 19:45:12 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:12 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), &(0x7f0000000240), 0x2, 0x0) (async) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='?dev/|r0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000000c0)=""/222, 0xde) 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) 19:45:12 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00') (async) 19:45:12 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) (async) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@ieee802154={0x24, @long}, &(0x7f0000000180)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:12 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) (async) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') (async) 19:45:12 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="d976472f6465762f73723000"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x10001, 0x400500) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000380), &(0x7f0000000400)=0x4) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) symlink(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f00000000c0)=""/172, 0xac) 19:45:12 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) (async) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00') 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', ')!-\x00'}, &(0x7f0000000100)=""/80, 0x50) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:12 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="d976472f6465762f73723000"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x10001, 0x400500) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000380), &(0x7f0000000400)=0x4) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) symlink(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f00000000c0)=""/172, 0xac) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="d976472f6465762f73723000"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000240), 0x10001, 0x400500) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000380), &(0x7f0000000400)=0x4) (async) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f00000000c0)=""/172, 0xac) (async) 19:45:12 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xc0000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x86b56d8eb3d40f2c}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'\':'}}, {@fsname={'fsname', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}, 0x1, 0x0, &(0x7f0000000200)="7266258c5ea749d6f339eeaad166b60ccdc9b81f4b81db3f4ac24bec0ea949b032de85d9795a2a8b39842f2893d8adb0ed6d413ac13499d455195afed904048dd980a585cb7dda2cef65e92dcd5e3aec2d8c37f75f81fac7cc560d25bed3c5bd4ceac81bf918ec2c") mknodat$loop(r1, &(0x7f0000000400)='./file0\x00', 0x208, 0x1) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) mknodat$loop(r2, &(0x7f0000000140)='./file0\x00', 0x800, 0x1) add_key$user(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="96256d3f5d1aed743a50053cf16224a20e03fa31ea5b664280eadaf4bc308d14f273fdf497deb23674180f8bcdd0", 0x2e, 0xfffffffffffffffc) 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', ')!-\x00'}, &(0x7f0000000100)=""/80, 0x50) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:12 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="d976472f6465762f73723000"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240), 0x10001, 0x400500) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000380), &(0x7f0000000400)=0x4) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) symlink(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f00000000c0)=""/172, 0xac) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="d976472f6465762f73723000"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) (async) linkat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000240), 0x10001, 0x400500) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000380), &(0x7f0000000400)=0x4) (async) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00') (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.apparmor\x00', &(0x7f00000000c0)=""/172, 0xac) (async) 19:45:12 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, r0}, 0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=""/109, 0x6d) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x3, 0x0, 0x1, 0x1}, 0x6, 0x2, 0x0, 0x0, "bc5828e56b584e68"}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0x40440c1) 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (rerun: 32) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) (async) r1 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xc0000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x86b56d8eb3d40f2c}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'\':'}}, {@fsname={'fsname', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}, 0x1, 0x0, &(0x7f0000000200)="7266258c5ea749d6f339eeaad166b60ccdc9b81f4b81db3f4ac24bec0ea949b032de85d9795a2a8b39842f2893d8adb0ed6d413ac13499d455195afed904048dd980a585cb7dda2cef65e92dcd5e3aec2d8c37f75f81fac7cc560d25bed3c5bd4ceac81bf918ec2c") mknodat$loop(r1, &(0x7f0000000400)='./file0\x00', 0x208, 0x1) (async, rerun: 64) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async, rerun: 64) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) mknodat$loop(r2, &(0x7f0000000140)='./file0\x00', 0x800, 0x1) (async, rerun: 32) add_key$user(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="96256d3f5d1aed743a50053cf16224a20e03fa31ea5b664280eadaf4bc308d14f273fdf497deb23674180f8bcdd0", 0x2e, 0xfffffffffffffffc) (rerun: 32) 19:45:12 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', ')!-\x00'}, &(0x7f0000000100)=""/80, 0x50) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:12 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000040)='./file0\x00', 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, r0}, 0x10) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=""/109, 0x6d) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x3, 0x0, 0x1, 0x1}, 0x6, 0x2, 0x0, 0x0, "bc5828e56b584e68"}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0x40440c1) 19:45:12 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', ')!-\x00'}, &(0x7f0000000100)=""/80, 0x50) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:12 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) chdir(&(0x7f0000000000)='./file0\x00') (async) 19:45:12 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x882800, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@pcr={'pcr', 0x3d, 0x29}}]}}, 0x0, 0x0, &(0x7f0000000280)="ebdc51853a96fdba6be1f75ced07435bb12e7cf433c682e81d863a658fa9b63fc421632ac8cea1f8cb98396a003020814f93d1d45be2b8e5fcfc4ce421ad84f97fed798e24c8c4a06c970225a8bca2eea0") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:12 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:12 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x8000, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x0) r1 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xc0000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x86b56d8eb3d40f2c}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8000}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\'\':'}}, {@fsname={'fsname', 0x3d, '/'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}, 0x1, 0x0, &(0x7f0000000200)="7266258c5ea749d6f339eeaad166b60ccdc9b81f4b81db3f4ac24bec0ea949b032de85d9795a2a8b39842f2893d8adb0ed6d413ac13499d455195afed904048dd980a585cb7dda2cef65e92dcd5e3aec2d8c37f75f81fac7cc560d25bed3c5bd4ceac81bf918ec2c") mknodat$loop(r1, &(0x7f0000000400)='./file0\x00', 0x208, 0x1) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) (async) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) mknodat$loop(r2, &(0x7f0000000140)='./file0\x00', 0x800, 0x1) (async) add_key$user(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="96256d3f5d1aed743a50053cf16224a20e03fa31ea5b664280eadaf4bc308d14f273fdf497deb23674180f8bcdd0", 0x2e, 0xfffffffffffffffc) 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, r0}, 0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)=""/109, 0x6d) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x3, 0x0, 0x1, 0x1}, 0x6, 0x2, 0x0, 0x0, "bc5828e56b584e68"}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0x40440c1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000040)='./file0\x00', 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x0, r0}, 0x10) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="8abea8579ef03c34c377b3ed8fe05997642e09000ff0f677e808e2d57b6d91ca2002a5aed5d66bb56e4565bda71436f114e856eb9003e24b1fedb8c7d2ff8fe8ec653cb607000000004000006a8e83beae31ffb5b68f9b8e3af06ae9bfd57e5bd76d3611ad4f7ac7f22a6e746f28d881cfd7924442c2121f03df39dc03562942235a193f53376e191510ecedecc65c107eb8bb5cb41b2d35a3c0c592227c5e863d52a709bd2affff5372387920c0c4d5c68732f6276758d788824f54a46dbb7c1655ed8fb5d8f9cb302ac28a2899c4cf26d8c6923c485c9824c32641385cb59d8600790c63b9572c71dd65285aa14209c92455a6ba96a8f3b4998872c9f7f9fbaed84e3e98a0f85b9d"], &(0x7f0000000180)=""/109, 0x6d) (async) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f0000000200)=@can={{0x3, 0x0, 0x1, 0x1}, 0x6, 0x2, 0x0, 0x0, "bc5828e56b584e68"}, 0x10}, 0x1, 0x0, 0x0, 0x20000800}, 0x40440c1) (async) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', ')!-\x00'}, &(0x7f0000000100)=""/80, 0x50) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x882800, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@pcr={'pcr', 0x3d, 0x29}}]}}, 0x0, 0x0, &(0x7f0000000280)="ebdc51853a96fdba6be1f75ced07435bb12e7cf433c682e81d863a658fa9b63fc421632ac8cea1f8cb98396a003020814f93d1d45be2b8e5fcfc4ce421ad84f97fed798e24c8c4a06c970225a8bca2eea0") (async, rerun: 64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (rerun: 64) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:13 executing program 5: ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x7ff, 0x1}) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, 0x11}) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x2040408, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0x4, 0x0, 0x7ff, 0xbb88, 0x88}) 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80000, 0x6) getsockname(r0, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000080)=0x80) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:13 executing program 5: ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x7ff, 0x1}) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, 0x11}) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x2040408, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0x4, 0x0, 0x7ff, 0xbb88, 0x88}) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', ')!-\x00'}, &(0x7f0000000100)=""/80, 0x50) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x882800, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions}, {@allow_other}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@pcr={'pcr', 0x3d, 0x29}}]}}, 0x0, 0x0, &(0x7f0000000280)="ebdc51853a96fdba6be1f75ced07435bb12e7cf433c682e81d863a658fa9b63fc421632ac8cea1f8cb98396a003020814f93d1d45be2b8e5fcfc4ce421ad84f97fed798e24c8c4a06c970225a8bca2eea0") (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='iso9660\x00', 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:13 executing program 5: ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000000)={0x7ff, 0x1}) (async) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000000c0)={0x74, 0x0, 0x11}) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='ubifs\x00', 0x2040408, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000040)={0x4, 0x0, 0x7ff, 0xbb88, 0x88}) 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$inet6(0xa, 0x80000, 0x6) getsockname(r0, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000080)=0x80) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)={0x0, 0xfb, 0x10d, 0x0, 0x1, "22a0cb39fd017544a118e3e1fa7e7d7e", "71eae20800f27a72bbf07e9794d2f9c0c0e6229a0724414905631053007526888f042fe6ad81eeda665f432c199bad6fb540100f8b3c7710e48a145be297797de1c080fab365aba3535559d8954717f57d0a9b6498083d94183b6d224d5f69fbc192e4a2e3ca10a93ad3456423bb7c6e06f903168315104e26be6428bf3db19c47f37895f43a58ac56fe3f133e3b6fb58bc52f6fb292704f4f240c4a5deab764df6e209a3020271ce99e0243a29d494d335c74a39bb981fe84cc6aad363f84218ffe607101eada1ecc29477b3534b58f30fe046b43b4c5426def41d0fb51b52e4521c8b0339d9ce2017d85702ea1f4251b755d68a8b58d14"}, 0x10d, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x200}}, './file0\x00'}) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000380)=@known='system.posix_acl_default\x00') r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r1, &(0x7f0000000440)=@nl=@unspec, &(0x7f00000004c0)=0x80) getsockname(r2, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000000)=0x80) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$inet6(0xa, 0x80000, 0x6) getsockname(r0, &(0x7f0000000000)=@tipc=@name, &(0x7f0000000080)=0x80) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:13 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)={0x0, 0xfb, 0x10d, 0x0, 0x1, "22a0cb39fd017544a118e3e1fa7e7d7e", "71eae20800f27a72bbf07e9794d2f9c0c0e6229a0724414905631053007526888f042fe6ad81eeda665f432c199bad6fb540100f8b3c7710e48a145be297797de1c080fab365aba3535559d8954717f57d0a9b6498083d94183b6d224d5f69fbc192e4a2e3ca10a93ad3456423bb7c6e06f903168315104e26be6428bf3db19c47f37895f43a58ac56fe3f133e3b6fb58bc52f6fb292704f4f240c4a5deab764df6e209a3020271ce99e0243a29d494d335c74a39bb981fe84cc6aad363f84218ffe607101eada1ecc29477b3534b58f30fe046b43b4c5426def41d0fb51b52e4521c8b0339d9ce2017d85702ea1f4251b755d68a8b58d14"}, 0x10d, 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x200}}, './file0\x00'}) (async, rerun: 64) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000380)=@known='system.posix_acl_default\x00') (async, rerun: 64) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) (async) getsockname(r1, &(0x7f0000000440)=@nl=@unspec, &(0x7f00000004c0)=0x80) getsockname(r2, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000000)=0x80) 19:45:13 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) chdir(&(0x7f0000000080)='./file0\x00') (async) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f0000000240)={0x0, 0xfb, 0x10d, 0x0, 0x1, "22a0cb39fd017544a118e3e1fa7e7d7e", "71eae20800f27a72bbf07e9794d2f9c0c0e6229a0724414905631053007526888f042fe6ad81eeda665f432c199bad6fb540100f8b3c7710e48a145be297797de1c080fab365aba3535559d8954717f57d0a9b6498083d94183b6d224d5f69fbc192e4a2e3ca10a93ad3456423bb7c6e06f903168315104e26be6428bf3db19c47f37895f43a58ac56fe3f133e3b6fb58bc52f6fb292704f4f240c4a5deab764df6e209a3020271ce99e0243a29d494d335c74a39bb981fe84cc6aad363f84218ffe607101eada1ecc29477b3534b58f30fe046b43b4c5426def41d0fb51b52e4521c8b0339d9ce2017d85702ea1f4251b755d68a8b58d14"}, 0x10d, 0x1) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x200}}, './file0\x00'}) (async) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000380)=@known='system.posix_acl_default\x00') (async) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r1, &(0x7f0000000440)=@nl=@unspec, &(0x7f00000004c0)=0x80) (async, rerun: 64) getsockname(r2, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000000)=0x80) (rerun: 64) 19:45:13 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r0, 0x4068aea3, &(0x7f0000000100)={0xbc, 0x0, 0x2}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1202069, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x40, 0x1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x10002, &(0x7f0000000180)='\xb0\xfd\xe8\xd0\xc1\r\b\xbbv#\xf8\x98\xf8\xe4\xe4\x19\xd8y\xd7\xfc\xea\xbdn\xb2\xc8C\x17\xda\xf5K(\xd3\xd4\xd3\xe7\x1f\x82\x94\xbc\xf6\x1a\'\xbb@\xe5a\x96\x0f\x10\xd6\x8a[C!\xd5\x95\xb4!B\x8dr\xce\xba\x11\xab\xfd\xe7\x05k%\xdd\x13\x88@\\8\xa8\x19Q\x0f\xa5S<(\xc8\xcb\x00-e6\x1f3\x98O\x12\x7fa/\x7f\xbf]@\xd4\x01\x16\x18\x8c>\r\x1b=`%@w:\xc3F\xe7! \xa69\xae\x9a\xff\xe8=W\x8d\x1bx\x86\xbf\xb4~') r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r4) r6 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r5) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r7) r9 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r8) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r9) r10 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r10) keyctl$assume_authority(0x10, r10) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r6, r9}, &(0x7f0000000140)=""/37, 0x25, &(0x7f00000003c0)={&(0x7f0000000240)={'cryptd(vmac64(khazad-generic))\x00'}, &(0x7f00000002c0)="a4907361c51059e101bc69e56188ecf7d0d7d676cd3266bf891d0c456928a91a417ece0f136a54ce8f66a7cf3f84a9772fe4818d4f82a45bd3e6cddcba09812090888cd02c7536f489b48bacaf86696100f94651409994a65c8395e95c0bf857b3476d84d025ac0117513a5596c6887ff39a45a3835a60d8448fdc0f4330ef6f60e63a652a0f59981a34fbdb69fafce674abd42a8021ab5034cbeb40cf2abf1698e3dd0400be161aa39e158a404fd956e1aa551a4aebb9d535aa71d14d08cf8af50a3a307d579db5be1db88b5f074b86cb9a88ad408810ad35fe4b8a49d6be95b657029c943f8733cff4ccd21f5f6e", 0xef}) 19:45:13 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KVM_CAP_X86_DISABLE_EXITS(r0, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, 0xd}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x10052, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="020026bd70007fdbdf250900000005002e00000000004ab914653eccb2b659a9cccf9597050000007b4d31727e9ab8f3e2b430c38ca0cdeb7723c2a7e3f2c1b26d9b4c487e7b28f1dc8af2886b22872c593b3e2b061ca8cedb6bdfe10aae1107ad1c8c616a6ad99346d5abc56aff075e94e7d1f4354edd9a8fb0252598921025b2245187d4bff1a5fbfe98f22436e402a3485e"], 0x1c}, 0x1, 0x0, 0x0, 0xc001}, 0x20048805) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000340)={0x1, r0, 0x1}) getsockname(r0, &(0x7f00000003c0)=@phonet, &(0x7f0000000040)=0x80) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000440)={0x0, 0x6, 0xf000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x0, &(0x7f0000000140)=')+(\x00') 19:45:13 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1202069, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async, rerun: 32) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x40, 0x1) (async, rerun: 32) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x10002, &(0x7f0000000180)='\xb0\xfd\xe8\xd0\xc1\r\b\xbbv#\xf8\x98\xf8\xe4\xe4\x19\xd8y\xd7\xfc\xea\xbdn\xb2\xc8C\x17\xda\xf5K(\xd3\xd4\xd3\xe7\x1f\x82\x94\xbc\xf6\x1a\'\xbb@\xe5a\x96\x0f\x10\xd6\x8a[C!\xd5\x95\xb4!B\x8dr\xce\xba\x11\xab\xfd\xe7\x05k%\xdd\x13\x88@\\8\xa8\x19Q\x0f\xa5S<(\xc8\xcb\x00-e6\x1f3\x98O\x12\x7fa/\x7f\xbf]@\xd4\x01\x16\x18\x8c>\r\x1b=`%@w:\xc3F\xe7! \xa69\xae\x9a\xff\xe8=W\x8d\x1bx\x86\xbf\xb4~') (async) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r4) r6 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r5) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r6) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r7) r9 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r8) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r9) (async) r10 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r10) (async, rerun: 64) keyctl$assume_authority(0x10, r10) (async, rerun: 64) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r6, r9}, &(0x7f0000000140)=""/37, 0x25, &(0x7f00000003c0)={&(0x7f0000000240)={'cryptd(vmac64(khazad-generic))\x00'}, &(0x7f00000002c0)="a4907361c51059e101bc69e56188ecf7d0d7d676cd3266bf891d0c456928a91a417ece0f136a54ce8f66a7cf3f84a9772fe4818d4f82a45bd3e6cddcba09812090888cd02c7536f489b48bacaf86696100f94651409994a65c8395e95c0bf857b3476d84d025ac0117513a5596c6887ff39a45a3835a60d8448fdc0f4330ef6f60e63a652a0f59981a34fbdb69fafce674abd42a8021ab5034cbeb40cf2abf1698e3dd0400be161aa39e158a404fd956e1aa551a4aebb9d535aa71d14d08cf8af50a3a307d579db5be1db88b5f074b86cb9a88ad408810ad35fe4b8a49d6be95b657029c943f8733cff4ccd21f5f6e", 0xef}) 19:45:13 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) chdir(&(0x7f0000000080)='./file0\x00') (async) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='iso9660\x00', 0x0, 0x0) 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KVM_CAP_X86_DISABLE_EXITS(r0, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, 0xd}) (async) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x10052, 0x0) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="020026bd70007fdbdf250900000005002e00000000004ab914653eccb2b659a9cccf9597050000007b4d31727e9ab8f3e2b430c38ca0cdeb7723c2a7e3f2c1b26d9b4c487e7b28f1dc8af2886b22872c593b3e2b061ca8cedb6bdfe10aae1107ad1c8c616a6ad99346d5abc56aff075e94e7d1f4354edd9a8fb0252598921025b2245187d4bff1a5fbfe98f22436e402a3485e"], 0x1c}, 0x1, 0x0, 0x0, 0xc001}, 0x20048805) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000340)={0x1, r0, 0x1}) (async) getsockname(r0, &(0x7f00000003c0)=@phonet, &(0x7f0000000040)=0x80) (async) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000440)={0x0, 0x6, 0xf000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:13 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 1: ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x3000, 0x3, 0x92a, 0x2, 0x0, [{0x3f, 0x1, 0x1f, '\x00', 0x8}, {0x7, 0x5a, 0x6d, '\x00', 0x8}, {0x6, 0x8, 0x1, '\x00', 0x6}, {0x7f, 0x1, 0x1, '\x00', 0xd0}, {0xd5, 0x3f, 0x0, '\x00', 0xff}, {0xcf, 0x1, 0x8, '\x00', 0x51}, {0x1f, 0x4, 0x8, '\x00', 0xff}, {0x25, 0x3, 0x80, '\x00', 0x3f}, {0x40, 0x8, 0x4, '\x00', 0x40}, {0x7, 0x40, 0x1, '\x00', 0x7f}, {0x2, 0x0, 0x7, '\x00', 0x4}, {0x1, 0x5, 0x4, '\x00', 0x5}, {0x4, 0x8, 0x8b, '\x00', 0x9}, {0x52, 0x2, 0x7, '\x00', 0x80}, {0x3f, 0x5, 0x40, '\x00', 0x81}, {0x9, 0x0, 0x7, '\x00', 0x8}, {0x7, 0x8, 0x33, '\x00', 0x81}, {0x6, 0x6, 0x31, '\x00', 0x9}, {0x5f, 0x2, 0x2, '\x00', 0x3f}, {0x2d, 0x41, 0x3, '\x00', 0x3f}, {0x3f, 0x7f, 0x2, '\x00', 0x81}, {0x6, 0x80, 0x80, '\x00', 0x6}, {0x1, 0x3f, 0x7, '\x00', 0xd3}, {0x7, 0x8, 0x5, '\x00', 0x9}]}}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1202069, 0x0, 0x0, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x40, 0x1) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x10002, &(0x7f0000000180)='\xb0\xfd\xe8\xd0\xc1\r\b\xbbv#\xf8\x98\xf8\xe4\xe4\x19\xd8y\xd7\xfc\xea\xbdn\xb2\xc8C\x17\xda\xf5K(\xd3\xd4\xd3\xe7\x1f\x82\x94\xbc\xf6\x1a\'\xbb@\xe5a\x96\x0f\x10\xd6\x8a[C!\xd5\x95\xb4!B\x8dr\xce\xba\x11\xab\xfd\xe7\x05k%\xdd\x13\x88@\\8\xa8\x19Q\x0f\xa5S<(\xc8\xcb\x00-e6\x1f3\x98O\x12\x7fa/\x7f\xbf]@\xd4\x01\x16\x18\x8c>\r\x1b=`%@w:\xc3F\xe7! \xa69\xae\x9a\xff\xe8=W\x8d\x1bx\x86\xbf\xb4~') (async) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r2) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r3) (async) r4 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r4) r6 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r5) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r6) (async) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r7) r9 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc1}, &(0x7f0000000280)={0x0, "bb64df036ee7b6609658a456fd3fbd6e5dd7489af4568e6dac7116d610c196916a80f59db4a67774cb81a73ac3e926506e483371e90bb27c95846b6a3947a67c"}, 0x48, r8) add_key$fscrypt_v1(&(0x7f0000000100), 0x0, 0x0, 0x0, r9) r10 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r10) (async) keyctl$assume_authority(0x10, r10) (async) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r6, r9}, &(0x7f0000000140)=""/37, 0x25, &(0x7f00000003c0)={&(0x7f0000000240)={'cryptd(vmac64(khazad-generic))\x00'}, &(0x7f00000002c0)="a4907361c51059e101bc69e56188ecf7d0d7d676cd3266bf891d0c456928a91a417ece0f136a54ce8f66a7cf3f84a9772fe4818d4f82a45bd3e6cddcba09812090888cd02c7536f489b48bacaf86696100f94651409994a65c8395e95c0bf857b3476d84d025ac0117513a5596c6887ff39a45a3835a60d8448fdc0f4330ef6f60e63a652a0f59981a34fbdb69fafce674abd42a8021ab5034cbeb40cf2abf1698e3dd0400be161aa39e158a404fd956e1aa551a4aebb9d535aa71d14d08cf8af50a3a307d579db5be1db88b5f074b86cb9a88ad408810ad35fe4b8a49d6be95b657029c943f8733cff4ccd21f5f6e", 0xef}) 19:45:13 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 1: ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x3000, 0x3, 0x92a, 0x2, 0x0, [{0x3f, 0x1, 0x1f, '\x00', 0x8}, {0x7, 0x5a, 0x6d, '\x00', 0x8}, {0x6, 0x8, 0x1, '\x00', 0x6}, {0x7f, 0x1, 0x1, '\x00', 0xd0}, {0xd5, 0x3f, 0x0, '\x00', 0xff}, {0xcf, 0x1, 0x8, '\x00', 0x51}, {0x1f, 0x4, 0x8, '\x00', 0xff}, {0x25, 0x3, 0x80, '\x00', 0x3f}, {0x40, 0x8, 0x4, '\x00', 0x40}, {0x7, 0x40, 0x1, '\x00', 0x7f}, {0x2, 0x0, 0x7, '\x00', 0x4}, {0x1, 0x5, 0x4, '\x00', 0x5}, {0x4, 0x8, 0x8b, '\x00', 0x9}, {0x52, 0x2, 0x7, '\x00', 0x80}, {0x3f, 0x5, 0x40, '\x00', 0x81}, {0x9, 0x0, 0x7, '\x00', 0x8}, {0x7, 0x8, 0x33, '\x00', 0x81}, {0x6, 0x6, 0x31, '\x00', 0x9}, {0x5f, 0x2, 0x2, '\x00', 0x3f}, {0x2d, 0x41, 0x3, '\x00', 0x3f}, {0x3f, 0x7f, 0x2, '\x00', 0x81}, {0x6, 0x80, 0x80, '\x00', 0x6}, {0x1, 0x3f, 0x7, '\x00', 0xd3}, {0x7, 0x8, 0x5, '\x00', 0x9}]}}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) chroot(&(0x7f00000002c0)='./file0\x00') (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/../file0\x00') 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$KVM_CAP_X86_DISABLE_EXITS(r0, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, 0xd}) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x10052, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="020026bd70007fdbdf250900000005002e00000000004ab914653eccb2b659a9cccf9597050000007b4d31727e9ab8f3e2b430c38ca0cdeb7723c2a7e3f2c1b26d9b4c487e7b28f1dc8af2886b22872c593b3e2b061ca8cedb6bdfe10aae1107ad1c8c616a6ad99346d5abc56aff075e94e7d1f4354edd9a8fb0252598921025b2245187d4bff1a5fbfe98f22436e402a3485e"], 0x1c}, 0x1, 0x0, 0x0, 0xc001}, 0x20048805) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x20, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000340)={0x1, r0, 0x1}) getsockname(r0, &(0x7f00000003c0)=@phonet, &(0x7f0000000040)=0x80) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000440)={0x0, 0x6, 0xf000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) ioctl$KVM_CAP_X86_DISABLE_EXITS(r0, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, 0xd}) (async) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='rootfs\x00', 0x10052, 0x0) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="020026bd70007fdbdf250900000005002e00000000004ab914653eccb2b659a9cccf9597050000007b4d31727e9ab8f3e2b430c38ca0cdeb7723c2a7e3f2c1b26d9b4c487e7b28f1dc8af2886b22872c593b3e2b061ca8cedb6bdfe10aae1107ad1c8c616a6ad99346d5abc56aff075e94e7d1f4354edd9a8fb0252598921025b2245187d4bff1a5fbfe98f22436e402a3485e"], 0x1c}, 0x1, 0x0, 0x0, 0xc001}, 0x20048805) (async) syz_open_dev$vcsa(&(0x7f0000000180), 0x20, 0x0) (async) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000340)={0x1, r0, 0x1}) (async) getsockname(r0, &(0x7f00000003c0)=@phonet, &(0x7f0000000040)=0x80) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000440)={0x0, 0x6, 0xf000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:13 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40000, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:13 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1828040, &(0x7f0000000140)=')\'(\x00') 19:45:13 executing program 1: ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x3000, 0x3, 0x92a, 0x2, 0x0, [{0x3f, 0x1, 0x1f, '\x00', 0x8}, {0x7, 0x5a, 0x6d, '\x00', 0x8}, {0x6, 0x8, 0x1, '\x00', 0x6}, {0x7f, 0x1, 0x1, '\x00', 0xd0}, {0xd5, 0x3f, 0x0, '\x00', 0xff}, {0xcf, 0x1, 0x8, '\x00', 0x51}, {0x1f, 0x4, 0x8, '\x00', 0xff}, {0x25, 0x3, 0x80, '\x00', 0x3f}, {0x40, 0x8, 0x4, '\x00', 0x40}, {0x7, 0x40, 0x1, '\x00', 0x7f}, {0x2, 0x0, 0x7, '\x00', 0x4}, {0x1, 0x5, 0x4, '\x00', 0x5}, {0x4, 0x8, 0x8b, '\x00', 0x9}, {0x52, 0x2, 0x7, '\x00', 0x80}, {0x3f, 0x5, 0x40, '\x00', 0x81}, {0x9, 0x0, 0x7, '\x00', 0x8}, {0x7, 0x8, 0x33, '\x00', 0x81}, {0x6, 0x6, 0x31, '\x00', 0x9}, {0x5f, 0x2, 0x2, '\x00', 0x3f}, {0x2d, 0x41, 0x3, '\x00', 0x3f}, {0x3f, 0x7f, 0x2, '\x00', 0x81}, {0x6, 0x80, 0x80, '\x00', 0x6}, {0x1, 0x3f, 0x7, '\x00', 0xd3}, {0x7, 0x8, 0x5, '\x00', 0x9}]}}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) chroot(&(0x7f00000002c0)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10442, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x20002, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x8001, 0x7, 0x8001, 0x1, 0xfff}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r2, {0x7, 0x3, 0x0, {0x0, 0x0, 0x4000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, r3}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = getuid() write$FUSE_ATTR(r4, &(0x7f00000000c0)={0x78, 0x0, r2, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r5, r3, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x802000, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xffff}}, {@blksize={'blksize', 0x3d, 0xb00}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}, 0x1, 0x0, &(0x7f0000000380)="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") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:13 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:13 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = geteuid() r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x20cd000, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other}, {@default_permissions}], [{@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '%'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}}, 0x1, 0x0, &(0x7f0000000300)="2ac935b93adda686eb3d24f201eb0b81b8245827e6c33aed752089b751100508a8f311f9439ea878cee3e5e533b9c50776467265661995554e057c296e471c08a014edff5b73908d00e05c39f81f15af31059d1ab94bb7fd3778a22b12c6cfd86369ab42c33b8e819413373bda9aadbff0ddd640ef35b38c66f4f185398126a0f82e") r7 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r7}, './file0\x00'}) fsetxattr$trusted_overlay_redirect(r7, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) getsockname(r8, &(0x7f0000002240)=@rc={0x1f, @fixed}, &(0x7f00000022c0)=0x80) 19:45:13 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x40000, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1828040, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) chdir(&(0x7f0000000000)='./file0\x00') (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1828040, &(0x7f0000000140)=')\'(\x00') (async) 19:45:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0xb02, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x8800) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x4, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:14 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10442, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x20002, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x8001, 0x7, 0x8001, 0x1, 0xfff}) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r2, {0x7, 0x3, 0x0, {0x0, 0x0, 0x4000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, r3}}}, 0x78) (async, rerun: 32) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (rerun: 32) r5 = getuid() write$FUSE_ATTR(r4, &(0x7f00000000c0)={0x78, 0x0, r2, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r5, r3, 0x6, 0x4}}}, 0x78) (async, rerun: 32) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x802000, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xffff}}, {@blksize={'blksize', 0x3d, 0xb00}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}, 0x1, 0x0, &(0x7f0000000380)="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") (async, rerun: 32) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x40000, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0xb02, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x8800) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x4, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) (async) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0xb02, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x8800) (async) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x4, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) (async) 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='fusectl\x00', 0x4000, 0x0) 19:45:14 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x208c, 0x0, 0x3, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7ff}, 0x8) openat$autofs(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1828040, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) chdir(&(0x7f0000000000)='./file0\x00') (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x1828040, &(0x7f0000000140)=')\'(\x00') (async) 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0) 19:45:14 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10442, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x20002, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x8001, 0x7, 0x8001, 0x1, 0xfff}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r2, {0x7, 0x3, 0x0, {0x0, 0x0, 0x4000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, r3}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = getuid() write$FUSE_ATTR(r4, &(0x7f00000000c0)={0x78, 0x0, r2, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r5, r3, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x802000, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xffff}}, {@blksize={'blksize', 0x3d, 0xb00}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}, 0x1, 0x0, &(0x7f0000000380)="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") umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10442, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x20002, 0x0) (async) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x8001, 0x7, 0x8001, 0x1, 0xfff}) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r1, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r1, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r2, {0x7, 0x3, 0x0, {0x0, 0x0, 0x4000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, r3}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) getuid() (async) write$FUSE_ATTR(r4, &(0x7f00000000c0)={0x78, 0x0, r2, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r5, r3, 0x6, 0x4}}}, 0x78) (async) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x802000, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@allow_other}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xffff}}, {@blksize={'blksize', 0x3d, 0xb00}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}, 0x1, 0x0, &(0x7f0000000380)="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") (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x40000, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0) 19:45:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), r0) (async) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0xb02, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x8800) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x4, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) 19:45:14 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) 19:45:14 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80800, 0x0, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='anon_inodefs\x00', 0x2236420, &(0x7f0000000100)='\x00\x00\x00\x00\x005\xe9h\xef\xa1S$\x81\xc1%H@w\xb4\x9e`\xb4\xbcw\xb4\x8e\x7f\xea\x04\xb3r\xfe\x13\x03\xb4\xe8\xfd+,\x89+BB\xf7\x9d33\xa8\ab\x8d\xf7P6\x01\xb5W\xe7zB\x02\xf5ry* \x97m\xbe\xa4hV\xb0\xd8\xab?\x11\x86F\f}\va!\x10M\xbcC\xa8\xb0\xc3\xa3Q\x87\x89\x96\x00\xd8\xd7Z\x19\x1a5\xdcd\xf7V\xfc\xee?\xf5I=\x03\xef\xb3\xf5\xedI\x19 kO\xfcIt\xf9/\x96\x10\xcd\xe6r\xf8p\xd1\xb0&\x93*3\\XP\xeard=\xc5\x1dy#\xee}5\x84\xda\x8f\x13\xc0&\xa14F\x88A%\xfbV\x95\xf7\xcd\x9c\xe6~2\xa8\xc4\xfc\xfd_\xdf\xda\xd5\x8cB\x853\xd8\xe3Z|\xda\x8f_z-\x1e>]\xf36\xad\x9aD\xbd\a\x00\x87\f\x80\xab\xd4') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0) 19:45:14 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80800, 0x0, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80800, 0x0, 0x0, 0x0, 0x0) (async) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) (async) 19:45:14 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x8) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x8) (async) 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='anon_inodefs\x00', 0x2236420, &(0x7f0000000100)='\x00\x00\x00\x00\x005\xe9h\xef\xa1S$\x81\xc1%H@w\xb4\x9e`\xb4\xbcw\xb4\x8e\x7f\xea\x04\xb3r\xfe\x13\x03\xb4\xe8\xfd+,\x89+BB\xf7\x9d33\xa8\ab\x8d\xf7P6\x01\xb5W\xe7zB\x02\xf5ry* \x97m\xbe\xa4hV\xb0\xd8\xab?\x11\x86F\f}\va!\x10M\xbcC\xa8\xb0\xc3\xa3Q\x87\x89\x96\x00\xd8\xd7Z\x19\x1a5\xdcd\xf7V\xfc\xee?\xf5I=\x03\xef\xb3\xf5\xedI\x19 kO\xfcIt\xf9/\x96\x10\xcd\xe6r\xf8p\xd1\xb0&\x93*3\\XP\xeard=\xc5\x1dy#\xee}5\x84\xda\x8f\x13\xc0&\xa14F\x88A%\xfbV\x95\xf7\xcd\x9c\xe6~2\xa8\xc4\xfc\xfd_\xdf\xda\xd5\x8cB\x853\xd8\xe3Z|\xda\x8f_z-\x1e>]\xf36\xad\x9aD\xbd\a\x00\x87\f\x80\xab\xd4') symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fusectl\x00', 0x0, 0x0) 19:45:14 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x8) 19:45:14 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80800, 0x0, 0x0, 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80800, 0x0, 0x0, 0x0, 0x0) (async) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x4) (async) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x4000, 0x0) 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='anon_inodefs\x00', 0x2236420, &(0x7f0000000100)='\x00\x00\x00\x00\x005\xe9h\xef\xa1S$\x81\xc1%H@w\xb4\x9e`\xb4\xbcw\xb4\x8e\x7f\xea\x04\xb3r\xfe\x13\x03\xb4\xe8\xfd+,\x89+BB\xf7\x9d33\xa8\ab\x8d\xf7P6\x01\xb5W\xe7zB\x02\xf5ry* \x97m\xbe\xa4hV\xb0\xd8\xab?\x11\x86F\f}\va!\x10M\xbcC\xa8\xb0\xc3\xa3Q\x87\x89\x96\x00\xd8\xd7Z\x19\x1a5\xdcd\xf7V\xfc\xee?\xf5I=\x03\xef\xb3\xf5\xedI\x19 kO\xfcIt\xf9/\x96\x10\xcd\xe6r\xf8p\xd1\xb0&\x93*3\\XP\xeard=\xc5\x1dy#\xee}5\x84\xda\x8f\x13\xc0&\xa14F\x88A%\xfbV\x95\xf7\xcd\x9c\xe6~2\xa8\xc4\xfc\xfd_\xdf\xda\xd5\x8cB\x853\xd8\xe3Z|\xda\x8f_z-\x1e>]\xf36\xad\x9aD\xbd\a\x00\x87\f\x80\xab\xd4') (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 19:45:14 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) mknodat$loop(r0, 0x0, 0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1400) 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='binfmt_misc\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='binfmt_misc\x00', 0x0, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (rerun: 32) 19:45:14 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) mknodat$loop(r0, 0x0, 0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1400) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:14 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:14 executing program 0: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='binfmt_misc\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='binfmt_misc\x00', 0x0, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:14 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x1, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) mknodat$loop(r0, 0x0, 0x4, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) linkat(r1, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1400) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:14 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r1, {0xfffffffffffffffe, 0x5, 0x0, {0x4, 0x6, 0x4, 0x1, 0x80000001, 0x7, 0xa0, 0x0, 0x1, 0xcb0f61923a6bba53, 0x3, 0x0, r4, 0x8, 0x2}}}, 0x78) socket$kcm(0x29, 0x2, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:14 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='virtiofs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:14 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:14 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='virtiofs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:15 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 32) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async, rerun: 32) r6 = getuid() (rerun: 32) write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r1, {0xfffffffffffffffe, 0x5, 0x0, {0x4, 0x6, 0x4, 0x1, 0x80000001, 0x7, 0xa0, 0x0, 0x1, 0xcb0f61923a6bba53, 0x3, 0x0, r4, 0x8, 0x2}}}, 0x78) socket$kcm(0x29, 0x2, 0x0) (async, rerun: 64) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (rerun: 64) 19:45:15 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 1: mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='virtiofs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='virtiofs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 1: mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x2f, 0x5, 0x7a, "dd44c28fe5ba564cd0e53cf8c6c15c9c", "8212056851334693fa1f3c2757ee0dc219e3612914a2bd660ad4"}, 0x2f, 0x1) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r1, {0xfffffffffffffffe, 0x5, 0x0, {0x4, 0x6, 0x4, 0x1, 0x80000001, 0x7, 0xa0, 0x0, 0x1, 0xcb0f61923a6bba53, 0x3, 0x0, r4, 0x8, 0x2}}}, 0x78) socket$kcm(0x29, 0x2, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) read$FUSE(r2, &(0x7f00000001c0)={0x2020}, 0x2020) (async) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) getuid() (async) write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) (async) write$FUSE_ATTR(r0, &(0x7f0000000040)={0x78, 0x0, r1, {0xfffffffffffffffe, 0x5, 0x0, {0x4, 0x6, 0x4, 0x1, 0x80000001, 0x7, 0xa0, 0x0, 0x1, 0xcb0f61923a6bba53, 0x3, 0x0, r4, 0x8, 0x2}}}, 0x78) (async) socket$kcm(0x29, 0x2, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:15 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 1: mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x2f, 0x5, 0x7a, "dd44c28fe5ba564cd0e53cf8c6c15c9c", "8212056851334693fa1f3c2757ee0dc219e3612914a2bd660ad4"}, 0x2f, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x2f, 0x5, 0x7a, "dd44c28fe5ba564cd0e53cf8c6c15c9c", "8212056851334693fa1f3c2757ee0dc219e3612914a2bd660ad4"}, 0x2f, 0x1) (async) 19:45:15 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, 0x0) 19:45:15 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 2: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') getsockname(0xffffffffffffffff, &(0x7f0000000180)=@generic, &(0x7f0000000080)=0x80) 19:45:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x2f, 0x5, 0x7a, "dd44c28fe5ba564cd0e53cf8c6c15c9c", "8212056851334693fa1f3c2757ee0dc219e3612914a2bd660ad4"}, 0x2f, 0x1) 19:45:15 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x2f, 0x5, 0x7a, "dd44c28fe5ba564cd0e53cf8c6c15c9c", "8212056851334693fa1f3c2757ee0dc219e3612914a2bd660ad4"}, 0x2f, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080), &(0x7f00000000c0)={0x0, 0xfb, 0x2f, 0x5, 0x7a, "dd44c28fe5ba564cd0e53cf8c6c15c9c", "8212056851334693fa1f3c2757ee0dc219e3612914a2bd660ad4"}, 0x2f, 0x1) (async) 19:45:15 executing program 2: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') getsockname(0xffffffffffffffff, &(0x7f0000000180)=@generic, &(0x7f0000000080)=0x80) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@generic, &(0x7f0000000080)=0x80) (async) 19:45:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='configfs\x00', 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, '.\x00'}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r0, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file0/file0\x00', 0x1600) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 2: syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') getsockname(0xffffffffffffffff, &(0x7f0000000180)=@generic, &(0x7f0000000080)=0x80) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000000)='./file0\x00', 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@generic, &(0x7f0000000080)=0x80) (async) 19:45:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, '.\x00'}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r0, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file0/file0\x00', 0x1600) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 19:45:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, '.\x00'}) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) linkat(r0, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000180)='./file0/file0\x00', 0x1600) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 2: write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4c}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10, 0x80800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x2006000, 0x0) 19:45:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, 0x0, 0x2006000, 0x0) 19:45:15 executing program 2: write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4c}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10, 0x80800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4c}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10, 0x80800) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) 19:45:15 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:15 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:15 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 19:45:15 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='vfat\x00', 0x0, 0x0) 19:45:15 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, 0x0, 0x2006000, 0x0) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:16 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:16 executing program 2: write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4c}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4008040) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x10, 0x80800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:16 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, 0x0, 0x2006000, 0x0) 19:45:16 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, &(0x7f0000000040)='\x00\x80@\xf1') 19:45:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x98a, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3, 0x1}, 0xe) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:16 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1800) 19:45:16 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x1a00000, 0x0) 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:16 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x98a, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3, 0x1}, 0xe) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:16 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) (async) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00') 19:45:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x2004000, &(0x7f0000000140)=')\'(\x00') connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x104, 0x6, 0x0, 0x1, 0x9}, 0x10) 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async, rerun: 32) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x98a, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x3, 0x1}, 0xe) (rerun: 32) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:16 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:16 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) (async) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) (async) 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:16 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x1028, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') [ 2503.654087] devpts: called with bogus options 19:45:16 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:16 executing program 4: keyctl$assume_authority(0x10, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="80000000000000002e2f66696c653000"]) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x3) 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') getpeername(0xffffffffffffffff, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) 19:45:16 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:16 executing program 4: keyctl$assume_authority(0x10, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="80000000000000002e2f66696c653000"]) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x3) keyctl$assume_authority(0x10, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="80000000000000002e2f66696c653000"]) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x3) (async) 19:45:16 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x1028, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:16 executing program 4: keyctl$assume_authority(0x10, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.origin\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="80000000000000002e2f66696c653000"]) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x3) 19:45:16 executing program 1: ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f00000000c0)={0x2000, 0x100000}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000000)=@ax25={{0x3, @bcast}, [@default, @null, @netrom, @remote, @remote, @bcast, @bcast, @rose]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000001480)=""/196, 0xc4}, {&(0x7f0000000180)=""/102, 0x66}, {&(0x7f0000000200)=""/105, 0x69}], 0x3, &(0x7f0000000300)=""/4096, 0x1000}, 0x0) 19:45:16 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') [ 2503.857305] autofs4:pid:20259:autofs4_fill_super: called with bogus options 19:45:16 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:16 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x1028, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:16 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x419050, 0x0, 0xff, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000001c0)) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0x108, 0x7, 0x2, "565a00bd8000cd9c48cb326bad125e46", "798bc40ed010a47c69e2e9bf7719c7804b520895e97c9fe56985b45418f2aea7b915bdbdefbb06e8edba7604c04d7d10cad8abf5a891ad577f2423f9ea8afab55bdd7e4015f01d3712f31ce102b7e66672eeff038707273613fe7a11659a58593d2559a18d377fcb81f5a1e154d50a7941028e6eff92febc71ea8b32675fd049ea96eaf6121110de8e10861469a3c1d7ce11d194472c5dd66db33cdaa7a74fb4845c08e501c96de17d774d559bce6dfd20913e3bebab2e18033d97b32aa82c660dfb66bbb3aae40023813ffd25a7bb0a310a971516542133a02391f3d247f8ad41efc68411dc004e08c7faee00713c53186ccf"}, 0x108, 0x2) 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)='G\'(\x00*\x1f)\\\xa7\x80\x117\xc37\xc2\xe2\xa5g\xb1k\x18{\xc1\xe2\xc8z\x01\x1f\xac\x95:\xbb\xf5WHy3>d5\x11\xc6\xec\xa2\xd7\"\xb1\xab-\x15\xaf_\x1e[\xeb\x0e\xf3\x83\xfc\x96M\xcc\x86\xb2\xaa\x11\xf7\xc0\x04Y\xff\xf8\xa0n\xe6l\xae\x9c\xf9n\a\x00\xf5\a\xab\xa7f\x9f=G\xfc\xb5n\x7f\xaa\xb4CJ\r\xf4\xf8\xbb\xaf]\x13u\x10\xf4\x1do*10n\x92\x7f\xd4\xe8\xd2<\x0e\x17') 19:45:16 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:16 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chdir(&(0x7f0000000080)='./file0\x00') 19:45:16 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) [ 2503.997884] autofs4:pid:20283:autofs4_fill_super: called with bogus options 19:45:16 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:16 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) mount(&(0x7f0000000140)=ANY=[@ANYRESHEX=r2], &(0x7f0000000040)='./file1\x00', 0x0, 0x800c0a, 0x0) renameat2(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file0\x00', 0x1) 19:45:16 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:16 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') chdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x1) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) chdir(&(0x7f0000000080)='./file0\x00') (async) 19:45:16 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:16 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:16 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x80000, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername(r0, &(0x7f0000000000)=@ethernet={0x0, @dev}, &(0x7f00000000c0)=0x80) r1 = gettid() syz_open_procfs$namespace(r1, 0x0) getpgrp(r1) 19:45:16 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)='G\'(\x00*\x1f)\\\xa7\x80\x117\xc37\xc2\xe2\xa5g\xb1k\x18{\xc1\xe2\xc8z\x01\x1f\xac\x95:\xbb\xf5WHy3>d5\x11\xc6\xec\xa2\xd7\"\xb1\xab-\x15\xaf_\x1e[\xeb\x0e\xf3\x83\xfc\x96M\xcc\x86\xb2\xaa\x11\xf7\xc0\x04Y\xff\xf8\xa0n\xe6l\xae\x9c\xf9n\a\x00\xf5\a\xab\xa7f\x9f=G\xfc\xb5n\x7f\xaa\xb4CJ\r\xf4\xf8\xbb\xaf]\x13u\x10\xf4\x1do*10n\x92\x7f\xd4\xe8\xd2<\x0e\x17') 19:45:17 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') [ 2504.175605] FAT-fs (loop1): Unrecognized mount option "ramfs" or missing value [ 2504.186037] autofs4:pid:20300:autofs4_fill_super: called with bogus options 19:45:17 executing program 0: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) renameat2(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x1) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') (async) chdir(&(0x7f0000000080)='./file0\x00') 19:45:17 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:17 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)='G\'(\x00*\x1f)\\\xa7\x80\x117\xc37\xc2\xe2\xa5g\xb1k\x18{\xc1\xe2\xc8z\x01\x1f\xac\x95:\xbb\xf5WHy3>d5\x11\xc6\xec\xa2\xd7\"\xb1\xab-\x15\xaf_\x1e[\xeb\x0e\xf3\x83\xfc\x96M\xcc\x86\xb2\xaa\x11\xf7\xc0\x04Y\xff\xf8\xa0n\xe6l\xae\x9c\xf9n\a\x00\xf5\a\xab\xa7f\x9f=G\xfc\xb5n\x7f\xaa\xb4CJ\r\xf4\xf8\xbb\xaf]\x13u\x10\xf4\x1do*10n\x92\x7f\xd4\xe8\xd2<\x0e\x17') [ 2504.283282] FAT-fs (loop1): Unrecognized mount option "ramfs" or missing value 19:45:17 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140), 0x210001, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r6 = getuid() write$FUSE_ATTR(r5, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r6, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x82, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2c00}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x2600}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x10001}}], [{@euid_lt={'euid<', 0xee00}}, {@permit_directio}, {@fowner_lt={'fowner<', r6}}, {@measure}, {@uid_eq}]}}, 0x1, 0x0, &(0x7f0000000240)="43a6652449e0896d2056d59b2a86592e1c9d49769977ed382fa2766911d85205869fa4387d2dd0e4a8ffc7c6949d2c2e61a2bc0181100b5cd1224f4137b9b14e13e46aae6e6ea10e0d96bc846e5b1aeec01027e9cb4e2d7a35a49f551f82a48806d8845522b4519d09ced65830bb068026da09f4f4349f651ac0993e31074c773db42ff3f588ec9d985ceded4c389907c75aae58f835298d780bda348b563506aa38e4e665776614640a5148875b1102f7f871f6b9569a03a48d8dc791c8eb14704b761963994e1a737c8b7961") r7 = accept4$llc(r0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x100800) accept4$llc(r7, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r7, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getpeername(r7, &(0x7f0000000080)=@rc, &(0x7f0000000100)=0x80) 19:45:17 executing program 5: mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r1 = accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x2) [ 2504.326096] autofs4:pid:20323:autofs4_fill_super: called with bogus options 19:45:17 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:17 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 5: mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') [ 2504.392350] FAT-fs (loop1): Unrecognized mount option "ramfs" or missing value 19:45:17 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x101000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) mount(&(0x7f0000000100)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='selinuxfs\x00', 0x2008008, &(0x7f00000001c0)='/dev/sr0\x00') ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f00000000c0)=@rose) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000080)=r0) 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:17 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000000c0)=r1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000000)) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:17 executing program 5: mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 1: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') [ 2504.520169] FAT-fs (loop1): Unrecognized mount option "ramfs" or missing value 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 1: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ext3\x00', 0x0, 0x0) 19:45:17 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, &(0x7f0000001180)=""/179, 0xb3}, 0x0) 19:45:17 executing program 1: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x400, 0x0) 19:45:17 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:17 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000140)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) mknodat$loop(r1, &(0x7f00000000c0)='./file0\x00', 0x10, 0x1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:17 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=@nullb, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x400, 0x0) 19:45:17 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:17 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='/Dev/sc0\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:17 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x400, 0x0) 19:45:17 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:17 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x400, 0x0) 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:17 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') [ 2505.054303] autofs4:pid:20408:autofs4_fill_super: called with bogus options 19:45:17 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:17 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:17 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') umount2(&(0x7f0000000000)='./file0\x00', 0xd) 19:45:17 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) 19:45:17 executing program 4: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') [ 2505.199160] overlayfs: unrecognized mount option ")'(" or missing value 19:45:18 executing program 4: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000500), 0x10000, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000540), &(0x7f0000000580)=0x4) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) pipe2$watch_queue(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) mknodat$loop(r4, &(0x7f0000000600)='./file0\x00', 0x400, 0x1) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x84084, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0xc00}}, {@max_read={'max_read', 0x3d, 0x1}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_appraise}, {@appraise}]}}, 0x1, 0x0, &(0x7f0000000380)="1ee95b44c447e563") getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) 19:45:18 executing program 4: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:18 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)=0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r4, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r4, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r5, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) r7 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r9 = getuid() r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r10, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) write$FUSE_ATTR(r8, &(0x7f00000000c0)={0x78, 0x0, r5, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r9, r6, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x820000, &(0x7f0000002340)=ANY=[@ANYBLOB="66641d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC, @ANYBLOB=',group_id=', @ANYRES8=r7, @ANYBLOB=',max_read=0x0000000000000009,fowner<', @ANYRESDEC=r2, @ANYBLOB=',permit_directio,fowner>', @ANYRESDEC=r9, @ANYBLOB=',fsuuid=5283f20e-d67a-19d1-0104-cab98728,fscontext=system_u,uid<', @ANYRESDEC=r3, @ANYBLOB=',mask=^MAY_WRITE,smackfstransmute=fowner>,\x00'], 0x1, 0x0, &(0x7f0000000480)="ce4c804a13be43a7c0edb6f8355799202f2e4450957a7c6f8403111496264a0b51108c1b8ab5747942b0e42460bf55340256bf9589f8708db7725097bc1ffdd288012a4d91885694216c34ccdd70df08152692954ef1f92d7bf90243e34a1ee03ae13fcd657a5fee9eba908f80e373ccd628d4ed00ed9bdef764984d7bd5eaf13c5a9fbdbfb6") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r12 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r12, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r12, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r13}, 0x10) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000024c0)={0x10, 0xfffffffffffffff5, r13}, 0x10) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffffffffffff, 0x5, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002300)={r14, 0x58, &(0x7f0000002280)}, 0x10) ioctl$KVM_GET_PIT(r11, 0xc048ae65, &(0x7f0000000040)) 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f00000000c0)='autofs\x00', 0x8000, &(0x7f0000000100)='\x00') 19:45:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r2, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000140)={'syztnl2\x00', r2, 0x4, 0xff, 0xf, 0xfff, 0x1a, @mcast2, @empty, 0x10, 0x40, 0x80, 0x6b}}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '-\x00'}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:18 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) [ 2505.371583] overlayfs: unrecognized mount option ")'(" or missing value 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:18 executing program 3: semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000400)=""/12) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), &(0x7f0000000180)={0x0, 0xfb, 0xb1, 0x5, 0x91, "4142485a853e96d9070f4dc55e055a6f", "87e16e3104725fca9af9ae99708918af6ec50be3afd6dd2a8d93a5bb6ac318fc704acbdae55209d3eae2fe270b1ba29d922b7b2003853f068e30afd5993cda30b4057d68531938bc6a395324328e8d16b7434dc3c8504113d8881807ab10f89637e41d08c436a20fd0957816c4572548b78c999765d634910519f124be2fb071a019bb01e3a208e093fa3baa9ae271a2432736bd79ecf9c60559c009"}, 0xb1, 0x0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0/file0\x00', 0x71024, &(0x7f00000002c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other}, {@max_read={'max_read', 0x3d, 0xffffffffffffffff}}], [{@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.upper\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}}, 0x1, 0x0, &(0x7f00000003c0)="0b5b1f928adf44a912c78921606a") mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000, &(0x7f0000000100)='\x00') 19:45:18 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:18 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000, &(0x7f0000000100)='\x00') 19:45:18 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, &(0x7f00000001c0)='ramfs\x00') [ 2505.550096] overlayfs: unrecognized mount option ")'(" or missing value 19:45:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:18 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:18 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x112420, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000, &(0x7f0000000100)='\x00') 19:45:18 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x112420, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:18 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, &(0x7f0000000100)='\x00') 19:45:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)=r1) r3 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r4, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf0, 0x0, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa3}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7c}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @empty}}]}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}]}, 0xf0}, 0x1, 0x0, 0x0, 0x980}, 0x20008001) 19:45:18 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, &(0x7f00000001c0)='ramfs\x00') 19:45:18 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x112420, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:18 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='cgroup\x00', 0x0, 0x0) 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) [ 2505.824641] autofs4:pid:20495:autofs4_fill_super: called with bogus options 19:45:18 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, &(0x7f00000001c0)='ramfs\x00') [ 2505.894022] overlayfs: unrecognized mount option ")'(" or missing value 19:45:18 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:18 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='nfs4\x00', 0x80400, 0x0) 19:45:18 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) 19:45:18 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') [ 2505.966633] autofs4:pid:20508:autofs4_fill_super: called with bogus options 19:45:18 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) 19:45:18 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:18 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) [ 2506.039108] FAT-fs (loop1): Unrecognized mount option "ramfs" or missing value 19:45:18 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:18 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) 19:45:18 executing program 3: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) [ 2506.094125] autofs4:pid:20525:autofs4_fill_super: called with bogus options 19:45:18 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:18 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:18 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r6) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="465133aca86b1b", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000"], 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r7, 0x4, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x4c, 0x1, 0x5, 0x7b]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0xc52c4038a4ec2542}, 0x2000040) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:18 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x112420, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2506.161735] autofs4:pid:20531:autofs4_fill_super: called with bogus options [ 2506.172149] print_req_error: I/O error, dev loop1, sector 0 [ 2506.184166] FAT-fs (loop1): unable to read boot sector 19:45:19 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2506.234784] autofs4:pid:20541:autofs4_fill_super: called with bogus options 19:45:19 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x0, 0x0) 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:19 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x112420, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r6) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="465133aca86b1b", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000"], 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r7, 0x4, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x4c, 0x1, 0x5, 0x7b]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0xc52c4038a4ec2542}, 0x2000040) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:19 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2506.326814] print_req_error: I/O error, dev loop1, sector 0 [ 2506.334821] FAT-fs (loop1): unable to read boot sector 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') chroot(&(0x7f0000000180)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) [ 2506.375011] autofs4:pid:20554:autofs4_fill_super: called with bogus options 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='overlay\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:19 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x112420, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r6) sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="465133aca86b1b", @ANYRES16=r7, @ANYBLOB="0100000000000000000003000000"], 0x14}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, r7, 0x4, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x4c, 0x1, 0x5, 0x7b]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0xc52c4038a4ec2542}, 0x2000040) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') [ 2506.432318] print_req_error: I/O error, dev loop4, sector 0 [ 2506.438340] FAT-fs (loop4): unable to read boot sector [ 2506.458045] print_req_error: I/O error, dev loop1, sector 0 [ 2506.463866] FAT-fs (loop1): unable to read boot sector 19:45:19 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') chroot(&(0x7f0000000180)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r5) sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="465133aca86b1b", @ANYRES16=r6, @ANYBLOB="0100000000000000000003000000"], 0x14}}, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') chroot(&(0x7f0000000180)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:19 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2506.645270] print_req_error: I/O error, dev loop1, sector 0 [ 2506.651144] FAT-fs (loop1): unable to read boot sector [ 2506.666414] print_req_error: I/O error, dev loop4, sector 0 [ 2506.672485] FAT-fs (loop4): unable to read boot sector 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), r4) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 4: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)=')\'(\x00') [ 2506.796772] print_req_error: I/O error, dev loop1, sector 0 [ 2506.802552] FAT-fs (loop1): unable to read boot sector [ 2506.812806] print_req_error: I/O error, dev loop4, sector 0 [ 2506.820322] FAT-fs (loop4): unable to read boot sector 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='rootfs\x00', 0x2000408, 0x0) 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:19 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:19 executing program 4: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2000408, 0x0) 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:19 executing program 4: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2000408, 0x0) 19:45:19 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 1: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) [ 2507.050638] print_req_error: I/O error, dev loop1, sector 0 [ 2507.056882] FAT-fs (loop1): unable to read boot sector [ 2507.066042] overlayfs: missing 'lowerdir' 19:45:19 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x2000408, 0x0) 19:45:19 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:19 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:19 executing program 5: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:19 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootfs\x00', 0x0, 0x0) 19:45:19 executing program 1: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2507.170220] overlayfs: missing 'lowerdir' 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 1: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') [ 2507.277826] overlayfs: missing 'lowerdir' 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 5: symlink(0x0, &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) [ 2507.347812] overlayfs: missing 'lowerdir' 19:45:20 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 5: symlink(0x0, &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2507.449760] overlayfs: missing 'lowerdir' 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) [ 2507.485695] overlayfs: missing 'lowerdir' 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 2: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 5: symlink(0x0, &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) [ 2507.568849] overlayfs: missing 'lowerdir' 19:45:20 executing program 3: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 3: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(0x0, &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(0x0, &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:20 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f00000002c0)=r1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(0x0, &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='overlay\x00', 0x0, 0x0) 19:45:20 executing program 0: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000140)=""/49, 0x31) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 0: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:20 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:20 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:21 executing program 0: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:21 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000004c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000000c0)}, 0x1) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:21 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000002c0)=r0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) 19:45:21 executing program 3: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:21 executing program 1: mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') chroot(&(0x7f0000000180)='./file0\x00') lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'security.', '!:-.\x00'}, &(0x7f0000000140)=""/49, 0x31) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x120000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0xfb, 0x23, 0x3, 0x81, "a263b80287f74878406818873432b98a", "0e743a053a2110bdc4f83551b94e"}, 0x23, 0x1) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0xe4400, 0x0) r3 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r3, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r3, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) r4 = accept4$llc(r3, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0xfffffffffffffe2d, 0x80800) accept4$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r4, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r4, @ANYBLOB="acb0ffff000000002e2f67696c6530005e0c23701e7ef5537726a4a3a4e73de94c4ead7d2c7e14055a7a051ce3d8"]) renameat2(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x2) 19:45:21 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x108a804, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x1400) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:21 executing program 4: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r2, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="34000000110000082252fc379277e6950ef6d13d10e02cbd70ebfedbdf2500000008", @ANYRES32=0x0, @ANYBLOB="48050100008001000a0002000180c200000000000800200035000000"], 0x34}, 0x1, 0x0, 0x0, 0x8080}, 0x8000) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x400000, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000018000000a9ed31ebcd7b81ea121ddd26a3fd49eb775eb91b", @ANYRES32=r3, @ANYBLOB="e7000000000000002e2f66696c653000"]) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r4, 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r4, &(0x7f00000000c0)='./file0\x00', 0x1) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={'nr', 0x0}, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000003c0)={0x7fff, 0x9c, 0x800, 0xa1, 0xf7, 0xc0, 0x8001}, 0xc) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465761d73723000"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:21 executing program 4: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x400) 19:45:21 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x400) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x80100) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) read$FUSE(0xffffffffffffffff, &(0x7f0000002240)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80008, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',max_read=0x0000000000000003,max_read=0x0000000000000005,default_permissions,max_read=0x0000000000000004,allow_other,max_read=0x0000000003fc0000,smackfsdef=rpc_pipefs\x00,smackfsfloor=rpc_pipefs\x00,dont_hash,smackfshat=&\'}\\,appraise,fowner<', @ANYRESDEC=0xee00, @ANYBLOB="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"], 0x0, 0x0, &(0x7f0000000180)="10ed6782339c91eed7ad8be1eeeabf1a903a5f78744c31b008ad4a680c2d8c36d200b4f3fa710948e08e23bde6b01aeb1d3f1524ac2d0ea25197e7eb07ba49af3d2365c0f5fdc53653fd511b8d46c0c0e70f3deeec19f1584bb2d092fcfcee0413190da5a5ff1216f3b8e4d5d0b8310a0ff10d65abad762366938e5e11cac9d3c792bae6f8b29be96a0f913214d437d6408e86f43c295a29302794d16a29cfebc6b8cb85b452f6a369ef8dfd336154de42d0fbe90db53f0743c69ccbfcfbd34a7bbc2ceaf57972") mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r1}, 0x10) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x78, 0xfffffffffffffff5, r1, {0x628, 0x4, 0x0, {0x6, 0x8000000000000001, 0x4, 0x4, 0x69, 0x1, 0x7, 0x5, 0xfffeffff, 0x8000, 0xd9a, 0xee01, 0xee00, 0x200, 0x8}}}, 0x78) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="2f6465762f6c6f03000000380823ce6e7ae588b454850e31175f1f8231d051963e1a20faaeb8c21b63e9317d940f5d4abd4b4c8882641ee46f95f392410a6df7299ca955bc9b229cdd187500377e957154b7fb427273a00fbafb5383ee1e947f11e28401933512250c3a7d5652176563fbb4a4e0eec9e145caf906081f753a7b7a1add04176c6d4283597e2e848876f818f65ec35cbcc38fd95aa133b02c854548437e32bdd843bf32ecfcadb67bce32573c00000000000000"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='ecryptfs\x00', 0x2011, &(0x7f0000000240)='/dev/vcsa#\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000080), 0x6, 0x200) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x400201, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) linkat(r2, &(0x7f0000000140)='./file0/file0\x00', r3, &(0x7f0000000380)='./file0/file1\x00', 0x1400) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)) getgid() 19:45:21 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='openpromfs\x00', 0x12001, 0x0) mknodat$loop(r0, &(0x7f0000000000)='./file0\x00', 0x40, 0x1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) chroot(&(0x7f0000000000)='./file1\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)) getgid() [ 2508.800211] devpts: called with bogus options 19:45:21 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000080)='./file0\x00') mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x800, 0x1) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)) getgid() 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) [ 2508.865124] devpts: called with bogus options 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000080)='./file0\x00') mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x800, 0x1) 19:45:21 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)) 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) [ 2508.987382] devpts: called with bogus options 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000080)='./file0\x00') mknodat$loop(r0, &(0x7f0000000100)='./file0\x00', 0x800, 0x1) 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') [ 2509.065274] devpts: called with bogus options 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') chroot(&(0x7f0000000080)='./file0\x00') 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:21 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:21 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) [ 2509.121605] devpts: called with bogus options 19:45:21 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:21 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:21 executing program 5: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:21 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:21 executing program 1: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:21 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x800a, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)='\x00\x00\x00\x00') 19:45:22 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:22 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:22 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') ioctl$KVM_SET_IDENTITY_MAP_ADDR(0xffffffffffffffff, 0x4008ae48, &(0x7f0000000080)) 19:45:22 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 3: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), 0x0, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) [ 2509.389188] devpts: called with bogus options 19:45:22 executing program 4: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000680000082bbd7000fddbdf250a0002000400000008000100000000000800013ecd82b20000000000200008a01c0008001800018013000300037b55768d23ad373318a20f"], 0x48}, 0x1, 0x0, 0x0, 0x11}, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 0: r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 2: ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), 0x0, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) [ 2509.428676] devpts: called with bogus options 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), 0x0, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x8004, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x1) 19:45:22 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x882022, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:22 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='devpts\x00', 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:45:22 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:45:22 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1000) 19:45:22 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) keyctl$get_security(0x11, r0, &(0x7f0000000400)=""/38, 0x26) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/193, 0xc1}, {&(0x7f0000000200)=""/189, 0xbd}], 0x2, &(0x7f0000000300)=""/145, 0x91}, 0x100) 19:45:22 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1000) 19:45:22 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:22 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:22 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x10, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:22 executing program 2: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:22 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), 0x0, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:23 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) keyctl$get_security(0x11, r0, &(0x7f0000000400)=""/38, 0x26) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/193, 0xc1}, {&(0x7f0000000200)=""/189, 0xbd}], 0x2, &(0x7f0000000300)=""/145, 0x91}, 0x100) 19:45:23 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='adfs\x00', 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:23 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000000)='\xdd\x00', &(0x7f0000000040)) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:23 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:23 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), 0x0, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:23 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, &(0x7f0000000180)=')A\x00:\x9a\xa6(\x87\xd77\xd1\xa5Q\xd0\xa3a\x8b\xda\x8f\x9d\x97\x1aj\xcf_\xc0\xb1\xa6\xf9R\xd5\xa4\xd1\xc4\xe6\xab\xc8\x17\xc5\x9f$\x1e\x81o\xdc]\xbc[\xd1\xf8\xb2\xc3\xc3B\xbb\x92\x04\xa4;\xbf\xb9\x9a\a\t\xafU\xa552\xae\xb1\x7f:*\xdd@\\Y\x95Gb,L2\a\x14yK\xcd\xdd\xa9\x16\xdb\x1a;_\xcd\xafU3\xd4\xdd\xd1^\x96\\\x9bcf\xbf\xa7\x9dQ}\x15R\xcdo\xf0\xc1\xd7T\xb9P\x9f\x16}\n\xa3Q\f\f\x9f7{\xa0\x04b\n\x0e\x00\x00\x00\xe7\x02\x11\xf6\ts:\xf7\xdcq\xfb\xc1\xcbC\x89=\xc4x\x8f\xbc\xa9p=\xb7\xaby\x8d6\xea\xa3\xf1\x85\xb1m\xe5\x96^Z\x8a)\xcf\xa8\xf40\xbd\t\x06\xf9b4\x00\x00') 19:45:23 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:23 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), 0x0, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b70d726b4f10f366a895896aad344aafaa72b8b1ab23ce1cbc1890ae39fe5140974ec97310ff493c6e9cb53de66e00898092b1f6f6735f37dca7ba18a2a24ef3207e1beee4ce7f5e87d14858213e487458171c242e267e4e8ac3432a95b1f56ce26df0b075df5d3e", 0xce, 0xfffffffffffffffd) 19:45:23 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x200000, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) symlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='./file0/file0\x00') setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000340)={0x0, 0xfb, 0x82, 0x0, 0x80, "6ca1e67f13b3543fd7d1c950217a011e", "ba5e6b270170cbcb18a7f6442eb9903909b4dec6ac7d9efa478d4e73a693675322a59f8f5cb9f35a4de2cea75a615cb37c4563d2938193f312f09f10670ccc0969c32e851da4a38954d94e9cdc431723fb9b46d57039429c63bdb08f6d81c882ade86b77114c9eb684a3523c99"}, 0x82, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 19:45:23 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:23 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) [ 2510.512805] devpts: called with bogus options 19:45:23 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:45:24 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b7", 0x67, 0xfffffffffffffffd) 19:45:24 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) 19:45:24 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) keyctl$get_security(0x11, r0, &(0x7f0000000400)=""/38, 0x26) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/193, 0xc1}, {&(0x7f0000000200)=""/189, 0xbd}], 0x2, &(0x7f0000000300)=""/145, 0x91}, 0x100) 19:45:24 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:45:24 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:24 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) 19:45:24 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 19:45:24 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80, &(0x7f0000000140)=')\'(\x00') 19:45:24 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:24 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) 19:45:24 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) 19:45:24 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:24 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) keyctl$get_security(0x11, r0, &(0x7f0000000400)=""/38, 0x26) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00'}) 19:45:25 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='adfs\x00', 0x0, 0x0) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file1\x00', 0x200000, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) symlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)='./file0/file0\x00') setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000340)={0x0, 0xfb, 0x82, 0x0, 0x80, "6ca1e67f13b3543fd7d1c950217a011e", "ba5e6b270170cbcb18a7f6442eb9903909b4dec6ac7d9efa478d4e73a693675322a59f8f5cb9f35a4de2cea75a615cb37c4563d2938193f312f09f10670ccc0969c32e851da4a38954d94e9cdc431723fb9b46d57039429c63bdb08f6d81c882ade86b77114c9eb684a3523c99"}, 0x82, 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f00000002c0), &(0x7f0000000300)=0x4) 19:45:25 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0/../file0\x00', 0x11, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791e", 0x34, 0xfffffffffffffffd) 19:45:25 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) mknodat$loop(r0, &(0x7f0000000040)='./file1\x00', 0x14004, 0x0) 19:45:25 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)=')\'(\x00') 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) keyctl$get_security(0x11, r0, &(0x7f0000000400)=""/38, 0x26) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) socket$kcm(0x29, 0x5, 0x0) 19:45:25 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:25 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01", 0x1, 0xfffffffffffffffd) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791efbccaefb7b2cce91fe6bb19af82f97cb39fa8b0fbe3f2923f89a25550e07c1696fa89991d82e1ee4276d3b446b34e38a5bd5b7", 0x67, 0xfffffffffffffffd) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) keyctl$get_security(0x11, r0, &(0x7f0000000400)=""/38, 0x26) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000000, 0x0, 0x80, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:25 executing program 3: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="eba6a6bb0fd320293dfe3b93481b0b26f1d71882378c03703ac14c3972696f983ca330982393c5037a618c822a29bbf1c24129ad1bb94fcc0b8966000839816d01442ce0f87551815f093669181997b9a7e42aff4d4ad428d36f9f674606cb87d8cb13e7a430367a9f8574ec03f7f4252da59a157bb430f8c1b0c8ece1860956d154dc004c88017127d1", 0x8a, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$search(0xa, r0, &(0x7f0000000180)='big_key\x00', &(0x7f0000000300)={'syz', 0x1}, r1) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x129c60, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2082808, 0x0) add_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="10ab79f6f8f7163da48c53f82a65d91d88fd97b1e8a745151f", 0x19, 0xfffffffffffffffa) socket$can_raw(0x1d, 0x3, 0x1) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000640)="2552e3bafc75e026138a9e22fa1461bcef072b4213384e3dee99e8645126da0c44d12bbc99a1f80d75d675738061283a9bcbc66febd7ebd5b8b2e30129165c1dc224c942a6867c51ecf7af25378c5ef1118024ff3218318c1f5e6f34c3fadd7264bdfbcf9ddc59c2d53c04eddf49f8d4fbe6afd0ecc3e6253f79f12973696e3fb321319b92f93fa2693701266678789efc7f0a81f01779c8722bc2bd92dd32482ddc4a13eee7c69cca7cf8b2edacd1b094d32ae8b5b57d5a8554179337a4fd4edf3d82a556d4e65da56b75c31c2901823743ed18165cae963d925d3501e6fb2b8a6193956dda59ffc0f0b0", 0xeb, r2) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="0100ffffffff000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)={0x0, 0xfb, 0x102, 0x4, 0x8, "c4fb64ed4a94bd51c9dbd41d5139a4d8", "91ec1141d805617f76566e84e54f67d464a9f6107851eedb4173275e2ea6128949979358490eed7309c929b49ac1d35476f0f6100a7dc9101b5e9d8118454f53f0734c18639f63a0ba0622df8b7fc723602606071f10a19f6264a587731a557f6d2ab0e83c77b76844d89aad4f1f6dfe9b34f1ac2f80b2879bc03a14bdb04a9f2789ed43e19759da2ab223c32fd36b8c123c16e7e2f9cc2045603b7b7465a744ceda9b128a88943b3ec7c1db5342b053c34437c58356f08e9a26e9c4eaf189dc34864ba1ecbdf453073a51e5cbc7ee638cf39a26feb9303e9f916722911107c2a7e8832af74d6b2a97f88e8219"}, 0x102, 0x2) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r1, &(0x7f0000002240)='./file1\x00', r0, &(0x7f0000002280)='./file1\x00', 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r2, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r3, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r5, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f0000004300)=0x16000) read$FUSE(r1, &(0x7f00000022c0)={0x2020}, 0x2020) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r7 = getuid() write$FUSE_ATTR(r6, &(0x7f00000000c0)={0x78, 0x0, r3, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r7, r4, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x40000, &(0x7f0000000140)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x39, 0x35, 0x30, 0x31, 0x34, 0x39, 0x34], 0x2d, [0x39, 0x35, 0x63, 0x64], 0x2d, [0x64, 0x35, 0x57, 0x62], 0x2d, [0x39, 0x63, 0x33, 0x36], 0x2d, [0x30, 0x62, 0x31, 0x33, 0x63, 0x65, 0x36, 0x65]}}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@permit_directio}, {@obj_role={'obj_role', 0x3d, 'romfs\x00'}}, {@obj_type={'obj_type', 0x3d, 'romfs\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'romfs\x00'}}, {@audit}]}}, 0x0, 0x0, &(0x7f0000000300)="8b1e2ef5f481fdde1791e15f3650c2362aef050d93fda200d39103e116c7a060daf8ec6efd7da0b17cc72957579a872c1f55343e3e84c16516f208e53e772d2bea3b4882a98bf9274d1fc9c7bbd13a47d07ed35cf3893eb1036fa884046aeecd") ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x81}}, './file0\x00'}) renameat2(r8, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x7) 19:45:25 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000001000000187f3ad2e55c000000f7bfb74015b1a00e3f0f29d0e1687ea33037c1ac03f4b58c94c68ccc660c53372d531c7ed60311", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = accept4$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @fixed}, &(0x7f0000000100)=0xe, 0x800) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, r1) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="0100ffffffff000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)={0x0, 0xfb, 0x102, 0x4, 0x8, "c4fb64ed4a94bd51c9dbd41d5139a4d8", "91ec1141d805617f76566e84e54f67d464a9f6107851eedb4173275e2ea6128949979358490eed7309c929b49ac1d35476f0f6100a7dc9101b5e9d8118454f53f0734c18639f63a0ba0622df8b7fc723602606071f10a19f6264a587731a557f6d2ab0e83c77b76844d89aad4f1f6dfe9b34f1ac2f80b2879bc03a14bdb04a9f2789ed43e19759da2ab223c32fd36b8c123c16e7e2f9cc2045603b7b7465a744ceda9b128a88943b3ec7c1db5342b053c34437c58356f08e9a26e9c4eaf189dc34864ba1ecbdf453073a51e5cbc7ee638cf39a26feb9303e9f916722911107c2a7e8832af74d6b2a97f88e8219"}, 0x102, 0x2) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 5: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01b01592980932d0cc9b31e51683175adb8f99d8f114dfb10033e953a6afb5a88a49b62d629cc2a4463a689b6cd3c735c3d5791e", 0x34, 0xfffffffffffffffd) 19:45:25 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="00000000000071d1a9b7f9674c9de287bd09b4005dc96fb17a911d4d346ee9c83e71"], &(0x7f00000002c0)='./file0\x00', 0x0, 0x398980c, 0x0) r1 = getgid() write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0x0, 0x0, {0x5, 0x400, 0x0, {0x1, 0x5, 0x100000001, 0x0, 0x9, 0x1, 0xffff6827, 0x39, 0x6, 0x2000, 0x7ff, 0x0, r1, 0xffffffff, 0x3f}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8000c0, &(0x7f00000000c0)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions}]}}, 0x1, 0x0, &(0x7f0000000180)="571a6184a714711ca73b995f90fe7d4c0a182d8ccdec9156ecdf2404e21f7410948bac9368b908028f0d7cf6574392ac43b511eaad7fa53c2cce349b7e2084ba00683159cbfba9b414f4f502775f6348a0f6f0f98620d97cfda3fa97a092949551108253dc6a636c51d661fff8807da0295411a73be609253888a6770683954c570f96311cbfaa6a51dd4b1e32d81d6e8b9c0133ce7bca6f13fc527fe0f91b7acde6478e7f8b3df00759f91a703c993184f4595eb9cbe338ae2ca7f7ed5c0677899fb8bacedb2ee80980572dc149fee2b78b31666a1641f66d0b42fcecfb883ec0") 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0xdc3c, 0xffffffff, 0xfffffff9, 0x0, 0xffff}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x0, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xfe93}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20048004}, 0x40020) ioctl$IOC_WATCH_QUEUE_SET_SIZE(r0, 0x5760, 0x12) 19:45:25 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="0100ffffffff000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000240)={0x0, 0xfb, 0x102, 0x4, 0x8, "c4fb64ed4a94bd51c9dbd41d5139a4d8", "91ec1141d805617f76566e84e54f67d464a9f6107851eedb4173275e2ea6128949979358490eed7309c929b49ac1d35476f0f6100a7dc9101b5e9d8118454f53f0734c18639f63a0ba0622df8b7fc723602606071f10a19f6264a587731a557f6d2ab0e83c77b76844d89aad4f1f6dfe9b34f1ac2f80b2879bc03a14bdb04a9f2789ed43e19759da2ab223c32fd36b8c123c16e7e2f9cc2045603b7b7465a744ceda9b128a88943b3ec7c1db5342b053c34437c58356f08e9a26e9c4eaf189dc34864ba1ecbdf453073a51e5cbc7ee638cf39a26feb9303e9f916722911107c2a7e8832af74d6b2a97f88e8219"}, 0x102, 0x2) 19:45:25 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = getgid() write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x9, 0x101, 0x0, {0x6, 0x7, 0x9, 0x8cfe, 0x92b, 0x80, 0x20, 0x4, 0x7, 0x2000, 0x9, 0xee01, r2, 0x9c9a}}}, 0x78) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="01", 0x1, 0xfffffffffffffffd) 19:45:25 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) umount2(&(0x7f0000004240)='./file0\x00', 0x3) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) r3 = geteuid() r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) symlink(&(0x7f0000004280)='./file1\x00', &(0x7f00000042c0)='./file0\x00') read$FUSE(r4, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r4, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r5, {0x200000000007, 0xffffffff, 0x0, {0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r8 = getuid() socket$inet6_udplite(0xa, 0x2, 0x88) write$FUSE_ATTR(r7, &(0x7f00000000c0)={0x78, 0x0, r5, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r8, r6, 0x6, 0x4}}}, 0x78) write$FUSE_ATTR(r0, &(0x7f00000001c0)={0x78, 0x0, r2, {0xf6, 0x1, 0x0, {0xfffffffffffffffc, 0xd853, 0x8000000000000000, 0x0, 0x9, 0x0, 0x81, 0x2b, 0x2, 0x1000, 0x2, r3, r6, 0xe3, 0x1}}}, 0x78) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), &(0x7f0000000080), 0x2, 0x2) read$FUSE(r1, &(0x7f0000004300)={0x2020}, 0x2020) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000540), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)=ANY=[@ANYBLOB="0100ffffffff000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 19:45:25 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = getgid() write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x9, 0x101, 0x0, {0x6, 0x7, 0x9, 0x8cfe, 0x92b, 0x80, 0x20, 0x4, 0x7, 0x2000, 0x9, 0xee01, r2, 0x9c9a}}}, 0x78) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:25 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = getgid() write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x9, 0x101, 0x0, {0x6, 0x7, 0x9, 0x8cfe, 0x92b, 0x80, 0x20, 0x4, 0x7, 0x2000, 0x9, 0xee01, r2, 0x9c9a}}}, 0x78) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:25 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 0: keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 19:45:25 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='exofs\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000001e3ff0018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$KVM_CAP_VM_COPY_ENC_CONTEXT_FROM(0xffffffffffffffff, 0x4068aea3, &(0x7f00000000c0)={0xc5, 0x0, r1}) 19:45:25 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:25 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='.\x00', 0x5042, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:25 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000004c0)={0x1, 0x0, @ioapic={0x3000, 0x32256dc6, 0x5, 0x6, 0x0, [{0x85, 0xff, 0x0, '\x00', 0x3}, {0xff, 0x9, 0x7, '\x00', 0x3}, {0x3, 0x3e, 0x24, '\x00', 0x97}, {0x3, 0x0, 0xd}, {0x7, 0x2, 0x0, '\x00', 0x1}, {0x9f, 0x4, 0xdf, '\x00', 0x6}, {0x7f, 0x0, 0x8, '\x00', 0x80}, {0x8, 0x81, 0x1, '\x00', 0x7}, {0x8, 0x1, 0x0, '\x00', 0x7f}, {0x7f, 0x1, 0x20, '\x00', 0x8}, {0x9, 0x6, 0x3, '\x00', 0x6}, {0x0, 0x4, 0x6}, {0x23, 0xb6, 0x4, '\x00', 0x5}, {0x0, 0x80, 0x10, '\x00', 0xa8}, {0x6, 0x4, 0x20}, {0x4, 0x0, 0x5c, '\x00', 0x5}, {0x80, 0x58, 0x4, '\x00', 0x7}, {0x8d, 0x20, 0x20, '\x00', 0xf7}, {0x40, 0x6, 0x40}, {0x40, 0x80, 0x1, '\x00', 0x1}, {0xfe, 0xfc, 0x8, '\x00', 0x6}, {0x68, 0x4, 0x9, '\x00', 0x3f}, {0x89, 0x3, 0x5, '\x00', 0xff}, {0x0, 0x2, 0xff, '\x00', 0x1f}]}}) r1 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYRES16=r2, @ANYRES16=r1, @ANYBLOB="200028bd7000fcdbdf2502000000080002000900000008000200003d0000080002000900000005000600340000000800030009000000"], 0x3c}}, 0x801) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:25 executing program 4: mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:25 executing program 2: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r1, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r2, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = getuid() write$FUSE_ATTR(r4, &(0x7f00000000c0)={0x78, 0x0, r2, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r5, r3, 0x6, 0x4}}}, 0x78) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r6, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r6, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r7, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r10 = getuid() write$FUSE_ATTR(r9, &(0x7f00000000c0)={0x78, 0x0, r7, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r10, r8, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1001400, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0xffff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x101}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x800}}], [{@subj_role={'subj_role', 0x3d, 'vxcan1\x00'}}]}}, 0x0, 0x0, &(0x7f0000000300)="38fb5c34dda87b56ffe427b3e3def161d381da5304f1318304cb71618dd43d87532ce9d04e880e151587fb53e178c4a7ee1d05c5f3c91f0f4136569ad06f3e78d68ffafba343d68d50") r11 = socket(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:25 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) getgid() mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:25 executing program 1: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:25 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='.\x00', 0x5042, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:25 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0xab, 0xdd}, &(0x7f0000000180)={'enc=', 'pkcs1', ' hash=', {'xcbc-aes-ce\x00'}}, &(0x7f0000000200)="dbabab4b7058f5f89bb465e8b59ef1fc11af057896cbce74fb2752d2875f60ca0eab1ba58bdfa1e55c0f9fda7d66053e85da0fedbcf1b052af3bf74a0c456d437ae934c709d1d880274c1b26f617c872acbed03fe3da479440d93543a97fa1f6481ba0afb45a50168df17b1ca733f91c985f404e4e285eeed72a72e8546f4164008931d9fa4cbbacec66511b1e8c778e53319e58660de80244404a21f87d99e2d028c598e472eab69f808d", &(0x7f00000002c0)=""/221) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x5, 0x20000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x2) 19:45:26 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x40088, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@sg0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='gfs2\x00', 0x8400, &(0x7f0000000180)='#-]\x96\xea\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='trusted.overlay.upper\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='.\x00', 0x5042, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:26 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 1: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x2010015, 0x0) 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='.\x00', 0x5042, 0x0, 0x1, 0x0, 0x0) 19:45:26 executing program 4: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./\x00'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 5: r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) sendto$llc(r0, &(0x7f0000000000)="e635bedb714d049f85ad5312e07b709712815da8232282549128ecb206b3ddc9b7495525d857103dfbb961057619ba390e7b0e4fe482c18caadaea74f6a55483a35cf054f2c151d5ff7795736e4e749e6a4eee1401d6cd0068208d898094de2fd6158a2384d3ca7f159af1d7ea61377bf1675ad27804108cc70e6bc249d6013d482ba1f1e219a269ffe60aa823658250", 0x90, 0x4040, &(0x7f00000000c0)={0x1a, 0x325, 0x1, 0x80, 0x7, 0x4}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) write$FUSE_ATTR(r1, &(0x7f0000000100)={0x78, 0xffffffffffffffda, 0x0, {0x7, 0xd98, 0x0, {0x4, 0x3ff, 0x100000000, 0x5, 0x4ca, 0xb450, 0x4, 0x6, 0x5, 0xd000, 0x8, 0xee00, 0xffffffffffffffff, 0x3, 0xac}}}, 0x78) 19:45:26 executing program 1: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x5042, 0x0, 0x1, 0x0, 0x0) 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2002000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40044}, 0x4000000) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) 19:45:26 executing program 3: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x5042, 0x0, 0x1, 0x0, 0x0) 19:45:26 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x5042, 0x0, 0x1, 0x0, 0x0) 19:45:26 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 3: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x1, 0x0, 0x0) 19:45:26 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x7) recvmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000001400)=[{&(0x7f0000000180)=""/63, 0x3f}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000002c0)=""/212, 0xd4}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/39, 0x27}], 0x5, &(0x7f0000001480)=""/62, 0x3e}, 0x10061) 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 3: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:45:26 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x7) recvmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000001400)=[{&(0x7f0000000180)=""/63, 0x3f}, {&(0x7f00000001c0)=""/139, 0x8b}, {&(0x7f00000002c0)=""/212, 0xd4}, {&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/39, 0x27}], 0x5, &(0x7f0000001480)=""/62, 0x3e}, 0x10061) 19:45:26 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x15, 0x4, 0x0) sendto$rose(r1, &(0x7f0000000500)="0d8533a1d8fe54c3351fc3766c58659f2c0ee40f603b7cbbf8425d0228847566fd8dea41658c62a641e208e2fb9626a40d034c2a92c4d534f0cbb6ef7abadef6fe337fd70fee16e8926b76e732e36380b657a7ef9efaf913d5be0ddfa3c833f2d1bc50da1a24b3a26798d2a99be2906edd535fe6fdf9e6a75a4d80ecef1dcd31152f4689c89f10665a103f217baf18d4b0a5735fbc6a6cbfb6b04dc027b6dd82907c4676cd63d336ab4e4bea9275404e0fe5e1588560d686758b27f44c28b24a7fc384eb21", 0xc5, 0x10, &(0x7f0000000600)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000640)={0xffc0, 0x8, 0x70da, 0xf8, 0x5, 0x20, 0x40}, 0xc) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x8, 0x3) r4 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000002c0)={'vxcan1\x00', 0x0}) sendmsg$can_raw(r4, &(0x7f0000000400)={&(0x7f0000000300)={0x1d, r5}, 0x10, &(0x7f00000003c0)={&(0x7f0000000340)=@canfd={{0x3}, 0x1, 0x1, 0x0, 0x0, "45573dd34c6f533c8ddb788e5a374552239e5e20650400ac5db2104b2219430e606cc1995cf50800dffb2fc0aaa138f756280e2b15d12854ac9a3ef1c2e5a717"}, 0x48}, 0x1, 0x0, 0x0, 0x4040018}, 0x4000080) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x60, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x1}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8001}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x1000}, 0x0) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r6, 0x0, 0x0) r7 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r8, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r6, &(0x7f0000000880)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x80, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_ADDR={0x4c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1f}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4040000}, 0x4004000) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') r9 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r9, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r9, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) getsockname(r9, &(0x7f0000000440)=@rc={0x1f, @none}, &(0x7f00000004c0)=0x80) 19:45:26 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='befs\x00', 0x1004404, 0x0) 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:26 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:26 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004404, 0x0) 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:26 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:26 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004404, 0x0) 19:45:26 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000000)='reiserfs\x00', 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:26 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:26 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:26 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:27 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1004404, 0x0) 19:45:27 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:27 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='befs\x00', 0x0, 0x0) 19:45:27 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)=')\'(\x00') 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0x56, 0x5, 0x1f, "09653857f87ff7ebed5b10473bc2a409", "add4fbeab1407f321b38aa85f4c17ab18e566036c6089d46adeae9949d2ace1559d0693787124581b5556dd5a85cb23d79e323c72af5305c38d21892759e613ad2"}, 0x56, 0x1) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup\x00', 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='reiserfs\x00', 0x0, 0x0) 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:27 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)=')\'R\x15y\xbeD\x11\xdc\x93R\x95\xc3\xbd#\xb5Wne\xc1@?B') 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], 0x0, 0x0, 0x21001, 0x0) 19:45:27 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) [ 2514.657733] hpfs: bad mount options. 19:45:27 executing program 5: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], 0x0, 0x0, 0x21001, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], 0x0, 0x0, 0x21001, 0x0) 19:45:27 executing program 1: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1000) [ 2514.791503] hpfs: bad mount options. 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x400, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:27 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='bfs\x00', 0x300c000, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='.'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x21001, 0x0) [ 2514.940836] hpfs: bad mount options. 19:45:27 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 19:45:27 executing program 0: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x300c000, 0x0) 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x300c000, 0x0) 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='./'], &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) [ 2515.058771] hpfs: bad mount options. 19:45:27 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 19:45:27 executing program 0: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 19:45:27 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, 0x0) 19:45:27 executing program 0: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:27 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x300c000, 0x0) 19:45:27 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0x0, 0x0) 19:45:28 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2515.228194] hpfs: bad mount options. 19:45:28 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, 0x0) 19:45:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 2515.274989] hpfs: bad mount options. 19:45:28 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bdev\x00', 0x0, 0x0) 19:45:28 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2515.329721] hpfs: bad mount options. 19:45:28 executing program 4: ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)=@bcast) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000000)) r1 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) mknodat$loop(r1, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) read$FUSE(r3, &(0x7f0000004280)={0x2020}, 0x2020) 19:45:28 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000043c0)=ANY=[@ANYBLOB="010000000100000018000000d8653a6d99f57d20efb819935636f325832d081f02e0300000000000", @ANYRES32=r0, @ANYBLOB="000000009b0400002e2f66696c653000"]) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000004340), 0xa000, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, 0x0, r3, 0x7f) read$FUSE(r2, &(0x7f0000002200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000004380)={0x10, 0xfffffffffffffffe, r4}, 0x10) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r6, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r6, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r7, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000004240), r1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000004480)={{0x1, 0x1, 0x18, r3, {0x100}}, './file0\x00'}) r11 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r11, &(0x7f00000001c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r11, &(0x7f0000000000)={0x78, 0xfffffffffffffff5, r12, {0x7, 0xffffffff, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0x0, 0xffffffffffffffff}}}, 0x78) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r15 = getuid() write$FUSE_ATTR(r14, &(0x7f00000000c0)={0x78, 0x0, r12, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r15, r13, 0x6, 0x4}}}, 0x78) syz_mount_image$fuse(&(0x7f0000004400), &(0x7f0000004440)='./file0\x00', 0x859000, &(0x7f00000044c0)={{'fd', 0x3d, r10}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions}, {@allow_other}, {@allow_other}, {@allow_other}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x7ff}}], [{@obj_type={'obj_type', 0x3d, '!^\xec$,'}}]}}, 0x1, 0x0, &(0x7f00000045c0)="94c7e2a6d8f68cc59460f51b0df2b94e22d195d7a3034090e3c9650b80b7773733d90d52ba43577dff6aada2ae7ce9bb4e36ed76706d119a43307fee0f01377dbdeb265379c6c9ee4ca1b75bfcd9b4f788d00ab085e91985c5c3b1d72336b3387a02c412aef6a91b3a9b89c8dbe23497a4ea7af35b2f67471ed4bc1a9a94c7d027924eb2d6efe909e2a9a11506327d75f333551794480e11cc7dd6b103a06711b5d173af8d5a19d21ecbeb0730e2b39da86e07a0c0a55f3ceea6f4809937c48ae6bbfa7cf2b5bc054d63bfae09") sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000004300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000042c0)={&(0x7f0000004280)={0x3c, r9, 0x8, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x101}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48000}, 0x40c0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r17 = getuid() write$FUSE_ATTR(r16, &(0x7f00000000c0)={0x78, 0x0, r7, {0x1ff, 0x1, 0x0, {0x5, 0x7, 0x2d, 0x3, 0x7ff, 0xda, 0x0, 0xff, 0x8001, 0x2000, 0x14, r17, r8, 0x6, 0x4}}}, 0x78) write$FUSE_ATTR(r0, &(0x7f0000000000)={0x78, 0x0, r4, {0x1, 0x709, 0x0, {0x0, 0x5, 0x7, 0xfff, 0x3, 0x3ff, 0xfffffffd, 0x902c, 0x80000001, 0x4000, 0x10001, 0x0, r8, 0x0, 0x134b80aa}}}, 0x78) 19:45:28 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) 19:45:28 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x5) 19:45:28 executing program 1: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 2515.420710] hpfs: bad mount options. [ 2515.437013] hpfs: bad mount options. 19:45:28 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 1: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) 19:45:28 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0100e305000000128150da58a8a05828"]) 19:45:28 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x1084040, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000040)=@sr0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x1000, 0x0) 19:45:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) [ 2515.561188] hpfs: bad mount options. 19:45:28 executing program 1: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) 19:45:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='hostfs\x00', 0x1020, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2515.660700] hpfs: bad mount options. 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) 19:45:28 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 4: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0xfff, 0x401, 0x3, 0x44, 0x1, 0x0, '\x00', 0x0, r0, 0x1, 0x5, 0x5}, 0x48) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x8, 0x0, 0x3, 0x0, r0, 0x800, '\x00', 0x0, r0, 0x4, 0x0, 0x1}, 0x48) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='romfs\x00', 0x0, 0x0) sendto$rose(0xffffffffffffffff, &(0x7f0000000100)="30d290043fd0c689f55d5456bf795795a32431d3d50cdec29b7c47e540c157cb82a3d362223968ed9179faad17dedebc16bc5a86ab301c38ea66625827bdf4f99c90d2130486e3af9b3d2a640172c54c2792ce514fd052d55d4a8db556933b586ba7220d889ed68a4a6b6ba0fd90f8f4ee71de283b0432087c33ff8c78f9c5fcda98da206e71c9c9a3c307918be0fdc9f3876999417e937b011f7ae86b6ae079957e4d5fee2c13af3ff0c4d2f56550c220677985649368eced060849b3854eebcebb838b3978dbecda346c31d991a00604e2acbca3bc0c9a5e31994948e1e13afc0048f5d856d2", 0xe7, 0x20000000, &(0x7f0000000200)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x4, [@null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast]}, 0x40) 19:45:28 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0/file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x5) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x2000408, 0x0) 19:45:28 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 2515.787287] hpfs: bad mount options. 19:45:28 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (fail_nth: 1) 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) 19:45:28 executing program 3: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2515.906130] hpfs: bad mount options. 19:45:28 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:28 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 1) 19:45:28 executing program 3: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:28 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) [ 2515.992676] FAULT_INJECTION: forcing a failure. [ 2515.992676] name failslab, interval 1, probability 0, space 0, times 0 [ 2516.039212] CPU: 0 PID: 21590 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 2516.047215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2516.049388] FAULT_INJECTION: forcing a failure. [ 2516.049388] name failslab, interval 1, probability 0, space 0, times 0 [ 2516.056567] Call Trace: [ 2516.056584] dump_stack+0x1b2/0x281 [ 2516.056597] should_fail.cold+0x10a/0x149 [ 2516.056610] should_failslab+0xd6/0x130 [ 2516.056628] __kmalloc_track_caller+0x2bc/0x400 [ 2516.086827] ? strndup_user+0x5b/0xf0 [ 2516.090635] memdup_user+0x22/0xa0 [ 2516.094614] strndup_user+0x5b/0xf0 [ 2516.098239] ? copy_mnt_ns+0xa30/0xa30 [ 2516.102137] SyS_mount+0x39/0x120 [ 2516.105582] ? copy_mnt_ns+0xa30/0xa30 [ 2516.109462] do_syscall_64+0x1d5/0x640 [ 2516.113345] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2516.118520] RIP: 0033:0x7f15e62590c9 [ 2516.122225] RSP: 002b:00007f15e47cb168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2516.129912] RAX: ffffffffffffffda RBX: 00007f15e6378f80 RCX: 00007f15e62590c9 19:45:28 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2516.137171] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 2516.144419] RBP: 00007f15e47cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2516.151665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2516.158943] R13: 00007ffed2ab4cdf R14: 00007f15e47cb300 R15: 0000000000022000 [ 2516.166218] CPU: 1 PID: 21596 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2516.174097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2516.183446] Call Trace: [ 2516.186035] dump_stack+0x1b2/0x281 19:45:29 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (fail_nth: 2) 19:45:29 executing program 3: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2516.189665] should_fail.cold+0x10a/0x149 [ 2516.193824] should_failslab+0xd6/0x130 [ 2516.197805] __kmalloc_track_caller+0x2bc/0x400 [ 2516.202467] ? strndup_user+0x5b/0xf0 [ 2516.206281] memdup_user+0x22/0xa0 [ 2516.209818] strndup_user+0x5b/0xf0 [ 2516.213437] ? copy_mnt_ns+0xa30/0xa30 [ 2516.217324] SyS_mount+0x39/0x120 [ 2516.220771] ? copy_mnt_ns+0xa30/0xa30 [ 2516.224654] do_syscall_64+0x1d5/0x640 [ 2516.228538] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2516.233721] RIP: 0033:0x7fcf593c70c9 19:45:29 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:29 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2516.237428] RSP: 002b:00007fcf57939168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2516.245133] RAX: ffffffffffffffda RBX: 00007fcf594e6f80 RCX: 00007fcf593c70c9 [ 2516.252396] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2516.259657] RBP: 00007fcf579391d0 R08: 0000000020000100 R09: 0000000000000000 [ 2516.266925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2516.274197] R13: 00007ffebb181cbf R14: 00007fcf57939300 R15: 0000000000022000 19:45:29 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 2) [ 2516.289760] FAULT_INJECTION: forcing a failure. [ 2516.289760] name failslab, interval 1, probability 0, space 0, times 0 [ 2516.342755] CPU: 0 PID: 21606 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 2516.350667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2516.360019] Call Trace: [ 2516.362604] dump_stack+0x1b2/0x281 [ 2516.362611] FAULT_INJECTION: forcing a failure. [ 2516.362611] name failslab, interval 1, probability 0, space 0, times 0 [ 2516.377403] should_fail.cold+0x10a/0x149 [ 2516.381540] should_failslab+0xd6/0x130 [ 2516.385496] kmem_cache_alloc+0x28e/0x3c0 [ 2516.389631] getname_flags+0xc8/0x550 [ 2516.393420] user_path_at_empty+0x2a/0x50 [ 2516.397555] do_mount+0x118/0x2a30 [ 2516.401078] ? lock_acquire+0x170/0x3f0 [ 2516.405035] ? lock_downgrade+0x740/0x740 [ 2516.409185] ? copy_mount_string+0x40/0x40 [ 2516.413398] ? __might_fault+0x177/0x1b0 [ 2516.417439] ? _copy_from_user+0x96/0x100 [ 2516.421568] ? copy_mount_options+0x1fa/0x2f0 [ 2516.426043] ? copy_mnt_ns+0xa30/0xa30 [ 2516.429912] SyS_mount+0xa8/0x120 [ 2516.433348] ? copy_mnt_ns+0xa30/0xa30 [ 2516.437224] do_syscall_64+0x1d5/0x640 [ 2516.441104] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2516.446294] RIP: 0033:0x7f15e62590c9 [ 2516.450002] RSP: 002b:00007f15e47cb168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2516.457689] RAX: ffffffffffffffda RBX: 00007f15e6378f80 RCX: 00007f15e62590c9 [ 2516.464950] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 2516.472222] RBP: 00007f15e47cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2516.479473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 19:45:29 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (fail_nth: 3) [ 2516.486734] R13: 00007ffed2ab4cdf R14: 00007f15e47cb300 R15: 0000000000022000 [ 2516.493995] CPU: 1 PID: 21616 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2516.501876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2516.511225] Call Trace: [ 2516.513816] dump_stack+0x1b2/0x281 [ 2516.517449] should_fail.cold+0x10a/0x149 [ 2516.521599] should_failslab+0xd6/0x130 [ 2516.525572] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2516.530236] ? copy_mnt_ns+0xa30/0xa30 [ 2516.534121] copy_mount_options+0x59/0x2f0 [ 2516.538347] ? copy_mnt_ns+0xa30/0xa30 [ 2516.542228] SyS_mount+0x84/0x120 [ 2516.545682] ? copy_mnt_ns+0xa30/0xa30 [ 2516.549672] do_syscall_64+0x1d5/0x640 [ 2516.553581] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2516.558793] RIP: 0033:0x7fcf593c70c9 [ 2516.562515] RSP: 002b:00007fcf57939168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2516.570217] RAX: ffffffffffffffda RBX: 00007fcf594e6f80 RCX: 00007fcf593c70c9 [ 2516.577580] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2516.584841] RBP: 00007fcf579391d0 R08: 0000000020000100 R09: 0000000000000000 [ 2516.589200] FAULT_INJECTION: forcing a failure. [ 2516.589200] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2516.592106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2516.611153] R13: 00007ffebb181cbf R14: 00007fcf57939300 R15: 0000000000022000 [ 2516.618445] CPU: 0 PID: 21621 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 2516.626339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2516.635811] Call Trace: [ 2516.638398] dump_stack+0x1b2/0x281 19:45:29 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:29 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 2: mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2516.642031] should_fail.cold+0x10a/0x149 [ 2516.646178] __alloc_pages_nodemask+0x21e/0x2900 [ 2516.650934] ? is_bpf_text_address+0x91/0x150 [ 2516.655431] ? __lock_acquire+0x5fc/0x3f20 [ 2516.659668] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2516.664505] ? kernel_text_address+0xbd/0xf0 [ 2516.668917] ? lock_downgrade+0x740/0x740 [ 2516.673064] ? __kernel_text_address+0x9/0x30 [ 2516.677757] ? unwind_get_return_address+0x51/0x90 [ 2516.682694] ? depot_save_stack+0x10d/0x3f0 [ 2516.687053] cache_grow_begin+0x91/0x700 19:45:29 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2516.691114] ? fs_reclaim_release+0xd0/0x110 [ 2516.695520] ? check_preemption_disabled+0x35/0x240 [ 2516.700576] cache_alloc_refill+0x273/0x350 [ 2516.704902] kmem_cache_alloc+0x333/0x3c0 [ 2516.709054] getname_flags+0xc8/0x550 [ 2516.712857] user_path_at_empty+0x2a/0x50 [ 2516.717005] do_mount+0x118/0x2a30 [ 2516.720545] ? lock_acquire+0x170/0x3f0 [ 2516.724515] ? lock_downgrade+0x740/0x740 [ 2516.728663] ? copy_mount_string+0x40/0x40 [ 2516.732915] ? __might_fault+0x177/0x1b0 [ 2516.736954] ? _copy_from_user+0x96/0x100 [ 2516.741082] ? copy_mount_options+0x1fa/0x2f0 [ 2516.745562] ? copy_mnt_ns+0xa30/0xa30 [ 2516.749429] SyS_mount+0xa8/0x120 [ 2516.752858] ? copy_mnt_ns+0xa30/0xa30 [ 2516.756740] do_syscall_64+0x1d5/0x640 [ 2516.760621] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2516.765791] RIP: 0033:0x7f15e62590c9 [ 2516.769481] RSP: 002b:00007f15e47cb168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2516.777169] RAX: ffffffffffffffda RBX: 00007f15e6378f80 RCX: 00007f15e62590c9 [ 2516.784426] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 19:45:29 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 3) 19:45:29 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:29 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (fail_nth: 4) [ 2516.791681] RBP: 00007f15e47cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2516.798931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2516.806176] R13: 00007ffed2ab4cdf R14: 00007f15e47cb300 R15: 0000000000022000 19:45:29 executing program 2: mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2516.868228] FAULT_INJECTION: forcing a failure. [ 2516.868228] name failslab, interval 1, probability 0, space 0, times 0 19:45:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2516.908578] CPU: 0 PID: 21634 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2516.916577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2516.925927] Call Trace: [ 2516.928519] dump_stack+0x1b2/0x281 [ 2516.932180] should_fail.cold+0x10a/0x149 [ 2516.936329] should_failslab+0xd6/0x130 [ 2516.940306] kmem_cache_alloc+0x28e/0x3c0 [ 2516.944458] getname_flags+0xc8/0x550 [ 2516.948256] ? cache_alloc_refill+0x1da/0x350 [ 2516.952749] user_path_at_empty+0x2a/0x50 19:45:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2516.956898] do_mount+0x118/0x2a30 [ 2516.960478] ? do_raw_spin_unlock+0x164/0x220 [ 2516.965147] ? copy_mount_string+0x40/0x40 [ 2516.969378] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2516.974396] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 2516.979236] ? copy_mnt_ns+0xa30/0xa30 [ 2516.983116] ? copy_mount_options+0x1fa/0x2f0 [ 2516.987604] ? copy_mnt_ns+0xa30/0xa30 [ 2516.991491] SyS_mount+0xa8/0x120 [ 2516.994941] ? copy_mnt_ns+0xa30/0xa30 [ 2516.998828] do_syscall_64+0x1d5/0x640 [ 2517.002717] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 19:45:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') 19:45:29 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:29 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') [ 2517.007896] RIP: 0033:0x7fcf593c70c9 [ 2517.011597] RSP: 002b:00007fcf57939168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2517.019297] RAX: ffffffffffffffda RBX: 00007fcf594e6f80 RCX: 00007fcf593c70c9 [ 2517.026558] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2517.033834] RBP: 00007fcf579391d0 R08: 0000000020000100 R09: 0000000000000000 [ 2517.041194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2517.048463] R13: 00007ffebb181cbf R14: 00007fcf57939300 R15: 0000000000022000 19:45:29 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 4) 19:45:29 executing program 2: mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2517.098406] FAULT_INJECTION: forcing a failure. [ 2517.098406] name failslab, interval 1, probability 0, space 0, times 0 [ 2517.137353] CPU: 1 PID: 21652 Comm: syz-executor.5 Not tainted 4.14.304-syzkaller #0 [ 2517.145260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2517.154610] Call Trace: [ 2517.155321] FAULT_INJECTION: forcing a failure. [ 2517.155321] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2517.157195] dump_stack+0x1b2/0x281 [ 2517.172586] should_fail.cold+0x10a/0x149 [ 2517.176719] should_failslab+0xd6/0x130 [ 2517.180679] kmem_cache_alloc+0x28e/0x3c0 [ 2517.184809] alloc_vfsmnt+0x23/0x7f0 [ 2517.188502] ? _raw_read_unlock+0x29/0x40 [ 2517.192628] vfs_kern_mount.part.0+0x27/0x470 [ 2517.197105] do_mount+0xe65/0x2a30 [ 2517.200626] ? lock_acquire+0x170/0x3f0 [ 2517.204579] ? lock_downgrade+0x740/0x740 [ 2517.208708] ? copy_mount_string+0x40/0x40 [ 2517.212922] ? __might_fault+0x177/0x1b0 [ 2517.216966] ? _copy_from_user+0x96/0x100 [ 2517.221098] ? copy_mount_options+0x1fa/0x2f0 [ 2517.225574] ? copy_mnt_ns+0xa30/0xa30 [ 2517.229441] SyS_mount+0xa8/0x120 [ 2517.232874] ? copy_mnt_ns+0xa30/0xa30 [ 2517.236741] do_syscall_64+0x1d5/0x640 [ 2517.240611] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2517.245780] RIP: 0033:0x7f15e62590c9 [ 2517.249480] RSP: 002b:00007f15e47cb168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2517.257167] RAX: ffffffffffffffda RBX: 00007f15e6378f80 RCX: 00007f15e62590c9 [ 2517.264421] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 2517.271674] RBP: 00007f15e47cb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2517.278940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2517.286196] R13: 00007ffed2ab4cdf R14: 00007f15e47cb300 R15: 0000000000022000 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2517.293457] CPU: 0 PID: 21659 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2517.301427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2517.310773] Call Trace: [ 2517.313360] dump_stack+0x1b2/0x281 [ 2517.316988] should_fail.cold+0x10a/0x149 [ 2517.321136] __alloc_pages_nodemask+0x21e/0x2900 [ 2517.325892] ? deref_stack_reg+0x124/0x1a0 [ 2517.330129] ? is_bpf_text_address+0x91/0x150 [ 2517.334631] ? __lock_acquire+0x5fc/0x3f20 [ 2517.338872] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2517.343712] ? kernel_text_address+0xbd/0xf0 [ 2517.348117] ? __kernel_text_address+0x9/0x30 [ 2517.352616] ? depot_save_stack+0x10d/0x3f0 [ 2517.356935] ? kasan_kmalloc+0x139/0x160 [ 2517.360992] cache_grow_begin+0x91/0x700 [ 2517.365033] ? fs_reclaim_release+0xd0/0x110 [ 2517.369418] ? check_preemption_disabled+0x35/0x240 [ 2517.374410] cache_alloc_refill+0x273/0x350 [ 2517.378709] kmem_cache_alloc+0x333/0x3c0 [ 2517.382834] getname_flags+0xc8/0x550 [ 2517.386624] user_path_at_empty+0x2a/0x50 [ 2517.390750] do_mount+0x118/0x2a30 [ 2517.394286] ? copy_mount_string+0x40/0x40 [ 2517.398500] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2517.403490] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 2517.408315] ? copy_mnt_ns+0xa30/0xa30 [ 2517.412191] ? copy_mount_options+0x1fa/0x2f0 [ 2517.416667] ? copy_mnt_ns+0xa30/0xa30 [ 2517.420532] SyS_mount+0xa8/0x120 [ 2517.423966] ? copy_mnt_ns+0xa30/0xa30 [ 2517.427835] do_syscall_64+0x1d5/0x640 [ 2517.431719] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2517.436889] RIP: 0033:0x7fcf593c70c9 [ 2517.440575] RSP: 002b:00007fcf57939168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 19:45:30 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (fail_nth: 5) 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:30 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:30 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) 19:45:30 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:30 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 5) [ 2517.448257] RAX: ffffffffffffffda RBX: 00007fcf594e6f80 RCX: 00007fcf593c70c9 [ 2517.455500] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2517.462764] RBP: 00007fcf579391d0 R08: 0000000020000100 R09: 0000000000000000 [ 2517.470010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2517.477255] R13: 00007ffebb181cbf R14: 00007fcf57939300 R15: 0000000000022000 19:45:30 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) 19:45:30 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:30 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x80000, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2517.600308] FAULT_INJECTION: forcing a failure. [ 2517.600308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2517.640345] CPU: 0 PID: 21673 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2517.648255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2517.657619] Call Trace: [ 2517.660207] dump_stack+0x1b2/0x281 [ 2517.663841] should_fail.cold+0x10a/0x149 [ 2517.667991] __alloc_pages_nodemask+0x21e/0x2900 [ 2517.672753] ? pcpu_alloc+0x8e8/0xf50 [ 2517.676560] ? _find_next_bit+0xdb/0x100 [ 2517.680624] ? pcpu_alloc+0xbe0/0xf50 [ 2517.684428] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2517.689278] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2517.694859] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2517.699881] alloc_pages_current+0x155/0x260 [ 2517.704291] ? __lockdep_init_map+0x100/0x560 [ 2517.708787] get_zeroed_page+0x19/0x50 [ 2517.712669] mount_fs+0x1c7/0x2a0 [ 2517.716126] vfs_kern_mount.part.0+0x5b/0x470 [ 2517.720629] do_mount+0xe65/0x2a30 [ 2517.724180] ? copy_mount_string+0x40/0x40 [ 2517.728413] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2517.733424] ? copy_mnt_ns+0xa30/0xa30 [ 2517.737316] ? copy_mount_options+0x1fa/0x2f0 [ 2517.741807] ? copy_mnt_ns+0xa30/0xa30 [ 2517.745692] SyS_mount+0xa8/0x120 [ 2517.749138] ? copy_mnt_ns+0xa30/0xa30 [ 2517.753019] do_syscall_64+0x1d5/0x640 [ 2517.756907] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2517.762089] RIP: 0033:0x7fcf593c70c9 [ 2517.765789] RSP: 002b:00007fcf57939168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2517.773494] RAX: ffffffffffffffda RBX: 00007fcf594e6f80 RCX: 00007fcf593c70c9 [ 2517.780767] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2517.788171] RBP: 00007fcf579391d0 R08: 0000000020000100 R09: 0000000000000000 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:30 executing program 5: r0 = socket(0x27, 0x2, 0x7) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000200)=[{{0x3, 0x1, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1}}, {{0x0, 0x1, 0x1, 0x1}, {0x4}}, {{0x1}, {0x2, 0x1}}, {{0x0, 0x1}, {0x1, 0x1}}, {{0x4, 0x0, 0x0, 0x1}, {0x3, 0x1}}, {{0x3}, {0x2, 0x0, 0x1}}, {{0x2, 0x1}, {0x4, 0x1, 0x1, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x3, 0x0, 0x1, 0x1}}], 0x70) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c000}, 0x4000040) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) write$FUSE_INTERRUPT(r1, 0x0, 0x0) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=0x48) r5 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r7, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r8 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r10, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r11 = gettid() syz_open_procfs$namespace(r11, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=@setlink={0x144, 0x13, 0x200, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r10, 0x6000, 0x2000}, [@IFLA_NET_NS_FD={0x8, 0x1c, r3}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NET_NS_PID={0x8, 0x13, r11}, @IFLA_VF_PORTS={0xf8, 0x18, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4df89426d5cde015b2551748590a7193"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "aa89fb63abc35c60441a5d21c16c49b3"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0x8, 0x2, '\\u]\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "35a6b3bf386120145073bbaee1e2cd77"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "e600a6e017df48c3d2f635a7df9f59bb"}, @IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x7, 0x2, '${\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}]}, {0x4}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "065c9405770e500cd08f1d59649f147e"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "92510e2a0b8aad0f6d0a90943ff04066"}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0f0555320732b582c52b59c867d57997"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}]}, @IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_BROADCAST={0xa, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}}]}, 0x144}, 0x1, 0x0, 0x0, 0x40041}, 0x10) chroot(&(0x7f00000002c0)='./file1\x00') 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, &(0x7f0000000180)='-\x00') 19:45:30 executing program 5: r0 = socket(0x27, 0x2, 0x7) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000200)=[{{0x3, 0x1, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1}}, {{0x0, 0x1, 0x1, 0x1}, {0x4}}, {{0x1}, {0x2, 0x1}}, {{0x0, 0x1}, {0x1, 0x1}}, {{0x4, 0x0, 0x0, 0x1}, {0x3, 0x1}}, {{0x3}, {0x2, 0x0, 0x1}}, {{0x2, 0x1}, {0x4, 0x1, 0x1, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x3, 0x0, 0x1, 0x1}}], 0x70) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) (async, rerun: 64) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c000}, 0x4000040) (rerun: 64) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=0x48) (async) r5 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r7, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) (async) r8 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r10, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r11 = gettid() syz_open_procfs$namespace(r11, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) sendmsg$nl_route(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=@setlink={0x144, 0x13, 0x200, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r10, 0x6000, 0x2000}, [@IFLA_NET_NS_FD={0x8, 0x1c, r3}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NET_NS_PID={0x8, 0x13, r11}, @IFLA_VF_PORTS={0xf8, 0x18, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4df89426d5cde015b2551748590a7193"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "aa89fb63abc35c60441a5d21c16c49b3"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0x8, 0x2, '\\u]\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "35a6b3bf386120145073bbaee1e2cd77"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "e600a6e017df48c3d2f635a7df9f59bb"}, @IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x7, 0x2, '${\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}]}, {0x4}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "065c9405770e500cd08f1d59649f147e"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "92510e2a0b8aad0f6d0a90943ff04066"}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0f0555320732b582c52b59c867d57997"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}]}, @IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_BROADCAST={0xa, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}}]}, 0x144}, 0x1, 0x0, 0x0, 0x40041}, 0x10) chroot(&(0x7f00000002c0)='./file1\x00') 19:45:30 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) 19:45:30 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, &(0x7f0000000180)='-\x00') 19:45:30 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:30 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 6) 19:45:30 executing program 5: r0 = socket(0x27, 0x2, 0x7) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000200)=[{{0x3, 0x1, 0x1}, {0x2, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x0, 0x1, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x2, 0x0, 0x1}, {0x0, 0x0, 0x1}}, {{0x3, 0x0, 0x1}, {0x2, 0x1, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x4, 0x0, 0x1}}, {{0x0, 0x1, 0x1, 0x1}, {0x4}}, {{0x1}, {0x2, 0x1}}, {{0x0, 0x1}, {0x1, 0x1}}, {{0x4, 0x0, 0x0, 0x1}, {0x3, 0x1}}, {{0x3}, {0x2, 0x0, 0x1}}, {{0x2, 0x1}, {0x4, 0x1, 0x1, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x3, 0x0, 0x1, 0x1}}], 0x70) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x8, 0x0) (async) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r3, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c000}, 0x4000040) (async, rerun: 64) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) (rerun: 64) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000480), &(0x7f00000004c0)=0x4) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async, rerun: 32) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=0x48) (rerun: 32) r5 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r7, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r8 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r9, 0x8933, &(0x7f0000000380)={'batadv_slave_0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r8, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r10, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) (async) r11 = gettid() syz_open_procfs$namespace(r11, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) sendmsg$nl_route(r3, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000640)=@setlink={0x144, 0x13, 0x200, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r10, 0x6000, 0x2000}, [@IFLA_NET_NS_FD={0x8, 0x1c, r3}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_NET_NS_PID={0x8, 0x13, r11}, @IFLA_VF_PORTS={0xf8, 0x18, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4df89426d5cde015b2551748590a7193"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "aa89fb63abc35c60441a5d21c16c49b3"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_PROFILE={0x8, 0x2, '\\u]\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "35a6b3bf386120145073bbaee1e2cd77"}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "e600a6e017df48c3d2f635a7df9f59bb"}, @IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x7, 0x2, '${\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}]}, {0x4}, {0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl0\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "065c9405770e500cd08f1d59649f147e"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "92510e2a0b8aad0f6d0a90943ff04066"}]}, {0x2c, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0f0555320732b582c52b59c867d57997"}, @IFLA_PORT_PROFILE={0x13, 0x2, 'batadv_slave_0\x00'}]}]}, @IFLA_NET_NS_PID={0x8, 0x13, 0xffffffffffffffff}, @IFLA_BROADCAST={0xa, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}}]}, 0x144}, 0x1, 0x0, 0x0, 0x40041}, 0x10) chroot(&(0x7f00000002c0)='./file1\x00') [ 2517.795434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2517.802702] R13: 00007ffebb181cbf R14: 00007fcf57939300 R15: 0000000000022000 [ 2517.829509] hpfs: bad mount options. 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:30 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) 19:45:30 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2517.921900] hpfs: bad mount options. 19:45:30 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2517.951788] nbd_handle_cmd: 236 callbacks suppressed [ 2517.951797] block nbd3: Attempted send on invalid socket [ 2517.962695] print_req_error: I/O error, dev nbd3, sector 0 [ 2517.971264] hpfs: hpfs_map_sector(): read error [ 2517.971454] FAULT_INJECTION: forcing a failure. [ 2517.971454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:45:30 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:30 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:30 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r1 = accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x207, 0x5, 0x7f, 0x1, 0x1, @random="d9c3c56d3a9b"}, 0x10) getpeername(r0, &(0x7f0000000100)=@in6, &(0x7f0000000200)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x7b9, 0x24800) setsockopt$rose(r2, 0x104, 0x4, &(0x7f00000000c0)=0x8001, 0x4) [ 2518.011836] block nbd1: Attempted send on invalid socket [ 2518.017513] print_req_error: I/O error, dev nbd1, sector 0 [ 2518.023265] hpfs: hpfs_map_sector(): read error [ 2518.038088] CPU: 0 PID: 21711 Comm: syz-executor.4 Not tainted 4.14.304-syzkaller #0 [ 2518.045991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2518.055342] Call Trace: [ 2518.057938] dump_stack+0x1b2/0x281 19:45:30 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2518.061572] should_fail.cold+0x10a/0x149 [ 2518.065722] __alloc_pages_nodemask+0x21e/0x2900 [ 2518.070473] ? pcpu_alloc+0x8e8/0xf50 [ 2518.074275] ? pcpu_alloc+0xbe0/0xf50 [ 2518.078094] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2518.082936] ? _find_next_bit+0xdb/0x100 [ 2518.087014] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2518.092469] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2518.097491] alloc_pages_current+0x155/0x260 [ 2518.101896] ? __lockdep_init_map+0x100/0x560 [ 2518.106387] get_zeroed_page+0x19/0x50 19:45:30 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r1 = accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x207, 0x5, 0x7f, 0x1, 0x1, @random="d9c3c56d3a9b"}, 0x10) getpeername(r0, &(0x7f0000000100)=@in6, &(0x7f0000000200)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x7b9, 0x24800) setsockopt$rose(r2, 0x104, 0x4, &(0x7f00000000c0)=0x8001, 0x4) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x207, 0x5, 0x7f, 0x1, 0x1, @random="d9c3c56d3a9b"}, 0x10) (async) getpeername(r0, &(0x7f0000000100)=@in6, &(0x7f0000000200)=0x80) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000080), 0x7b9, 0x24800) (async) setsockopt$rose(r2, 0x104, 0x4, &(0x7f00000000c0)=0x8001, 0x4) (async) [ 2518.110269] mount_fs+0x1c7/0x2a0 [ 2518.113726] vfs_kern_mount.part.0+0x5b/0x470 [ 2518.118223] do_mount+0xe65/0x2a30 [ 2518.121770] ? copy_mount_string+0x40/0x40 [ 2518.126001] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2518.131015] ? copy_mnt_ns+0xa30/0xa30 [ 2518.134900] ? copy_mount_options+0x1fa/0x2f0 [ 2518.139389] ? copy_mnt_ns+0xa30/0xa30 [ 2518.143271] SyS_mount+0xa8/0x120 [ 2518.146717] ? copy_mnt_ns+0xa30/0xa30 [ 2518.150602] do_syscall_64+0x1d5/0x640 [ 2518.154492] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 19:45:30 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2518.159676] RIP: 0033:0x7fcf593c70c9 [ 2518.163381] RSP: 002b:00007fcf57939168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2518.171085] RAX: ffffffffffffffda RBX: 00007fcf594e6f80 RCX: 00007fcf593c70c9 [ 2518.178346] RDX: 0000000020000040 RSI: 00000000200000c0 RDI: 0000000000000000 [ 2518.185609] RBP: 00007fcf579391d0 R08: 0000000020000100 R09: 0000000000000000 [ 2518.192875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2518.200139] R13: 00007ffebb181cbf R14: 00007fcf57939300 R15: 0000000000022000 19:45:31 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (fail_nth: 7) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r1 = accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x207, 0x5, 0x7f, 0x1, 0x1, @random="d9c3c56d3a9b"}, 0x10) (async, rerun: 32) getpeername(r0, &(0x7f0000000100)=@in6, &(0x7f0000000200)=0x80) (async, rerun: 32) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x7b9, 0x24800) setsockopt$rose(r2, 0x104, 0x4, &(0x7f00000000c0)=0x8001, 0x4) 19:45:31 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2518.233668] block nbd3: Attempted send on invalid socket [ 2518.239584] print_req_error: I/O error, dev nbd3, sector 0 [ 2518.245677] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x74, 0x0, 0x10}) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xe8, 0x2, 0xff, "cb94ca22383a7c38a996bffd12250b68", "ad0162f2e0abc4b005ceb0ebb496f6ec1f2bdf580a8d36387a88c50fd84981ad573ea6079d916c6f95c61fe23765f3790834f79a2bc7b7f855c87c2ebb861a82b83576012ba18c167aa70b0a06e41efa28d969b50992ee71ab8254e7003fd4a3f82f842be83dcd6deae9d4929d89d755489ccf045c937b6cba3e3a92de5a79c4a4160156422e9bdd82bc9a4a057841b183ae336c8811701de7131175b9525f57e11ad16fc0b29e1d0c8481f71c53cc68da9c93c4d1dee5e4b5f78e8d18b03c4c39becc2351ecd0c32854179e2338c3d68e86fa"}, 0xe8, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) [ 2518.330115] block nbd1: Attempted send on invalid socket [ 2518.335728] print_req_error: I/O error, dev nbd1, sector 0 [ 2518.341604] hpfs: hpfs_map_sector(): read error [ 2518.353863] block nbd3: Attempted send on invalid socket [ 2518.359481] print_req_error: I/O error, dev nbd3, sector 0 19:45:31 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x74, 0x0, 0x10}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) (async) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x74, 0x0, 0x10}) (async) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2518.377903] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xe8, 0x2, 0xff, "cb94ca22383a7c38a996bffd12250b68", "ad0162f2e0abc4b005ceb0ebb496f6ec1f2bdf580a8d36387a88c50fd84981ad573ea6079d916c6f95c61fe23765f3790834f79a2bc7b7f855c87c2ebb861a82b83576012ba18c167aa70b0a06e41efa28d969b50992ee71ab8254e7003fd4a3f82f842be83dcd6deae9d4929d89d755489ccf045c937b6cba3e3a92de5a79c4a4160156422e9bdd82bc9a4a057841b183ae336c8811701de7131175b9525f57e11ad16fc0b29e1d0c8481f71c53cc68da9c93c4d1dee5e4b5f78e8d18b03c4c39becc2351ecd0c32854179e2338c3d68e86fa"}, 0xe8, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 19:45:31 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x74, 0x0, 0x10}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) (async) ioctl$KVM_CAP_DISABLE_QUIRKS(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x74, 0x0, 0x10}) (async) [ 2518.478750] block nbd1: Attempted send on invalid socket [ 2518.484379] print_req_error: I/O error, dev nbd1, sector 0 [ 2518.498220] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xe8, 0x2, 0xff, "cb94ca22383a7c38a996bffd12250b68", "ad0162f2e0abc4b005ceb0ebb496f6ec1f2bdf580a8d36387a88c50fd84981ad573ea6079d916c6f95c61fe23765f3790834f79a2bc7b7f855c87c2ebb861a82b83576012ba18c167aa70b0a06e41efa28d969b50992ee71ab8254e7003fd4a3f82f842be83dcd6deae9d4929d89d755489ccf045c937b6cba3e3a92de5a79c4a4160156422e9bdd82bc9a4a057841b183ae336c8811701de7131175b9525f57e11ad16fc0b29e1d0c8481f71c53cc68da9c93c4d1dee5e4b5f78e8d18b03c4c39becc2351ecd0c32854179e2338c3d68e86fa"}, 0xe8, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xe8, 0x2, 0xff, "cb94ca22383a7c38a996bffd12250b68", "ad0162f2e0abc4b005ceb0ebb496f6ec1f2bdf580a8d36387a88c50fd84981ad573ea6079d916c6f95c61fe23765f3790834f79a2bc7b7f855c87c2ebb861a82b83576012ba18c167aa70b0a06e41efa28d969b50992ee71ab8254e7003fd4a3f82f842be83dcd6deae9d4929d89d755489ccf045c937b6cba3e3a92de5a79c4a4160156422e9bdd82bc9a4a057841b183ae336c8811701de7131175b9525f57e11ad16fc0b29e1d0c8481f71c53cc68da9c93c4d1dee5e4b5f78e8d18b03c4c39becc2351ecd0c32854179e2338c3d68e86fa"}, 0xe8, 0x2) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2518.527170] block nbd3: Attempted send on invalid socket [ 2518.532681] print_req_error: I/O error, dev nbd3, sector 0 [ 2518.543427] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xe8, 0x2, 0xff, "cb94ca22383a7c38a996bffd12250b68", "ad0162f2e0abc4b005ceb0ebb496f6ec1f2bdf580a8d36387a88c50fd84981ad573ea6079d916c6f95c61fe23765f3790834f79a2bc7b7f855c87c2ebb861a82b83576012ba18c167aa70b0a06e41efa28d969b50992ee71ab8254e7003fd4a3f82f842be83dcd6deae9d4929d89d755489ccf045c937b6cba3e3a92de5a79c4a4160156422e9bdd82bc9a4a057841b183ae336c8811701de7131175b9525f57e11ad16fc0b29e1d0c8481f71c53cc68da9c93c4d1dee5e4b5f78e8d18b03c4c39becc2351ecd0c32854179e2338c3d68e86fa"}, 0xe8, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 19:45:31 executing program 4: keyctl$setperm(0x5, 0x0, 0x2002402) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000000)={0x7fffffff, 0x0, 0x7, 0x4, 0x4}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x18c00, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:31 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2518.645905] block nbd3: Attempted send on invalid socket [ 2518.651457] print_req_error: I/O error, dev nbd3, sector 0 [ 2518.657647] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={0x0, 0xfb, 0xe8, 0x2, 0xff, "cb94ca22383a7c38a996bffd12250b68", "ad0162f2e0abc4b005ceb0ebb496f6ec1f2bdf580a8d36387a88c50fd84981ad573ea6079d916c6f95c61fe23765f3790834f79a2bc7b7f855c87c2ebb861a82b83576012ba18c167aa70b0a06e41efa28d969b50992ee71ab8254e7003fd4a3f82f842be83dcd6deae9d4929d89d755489ccf045c937b6cba3e3a92de5a79c4a4160156422e9bdd82bc9a4a057841b183ae336c8811701de7131175b9525f57e11ad16fc0b29e1d0c8481f71c53cc68da9c93c4d1dee5e4b5f78e8d18b03c4c39becc2351ecd0c32854179e2338c3d68e86fa"}, 0xe8, 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 4: keyctl$setperm(0x5, 0x0, 0x2002402) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000000)={0x7fffffff, 0x0, 0x7, 0x4, 0x4}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x18c00, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (rerun: 64) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:31 executing program 3: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) [ 2518.820480] block nbd3: Attempted send on invalid socket [ 2518.826071] print_req_error: I/O error, dev nbd3, sector 0 [ 2518.831829] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 4: keyctl$setperm(0x5, 0x0, 0x2002402) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000000)={0x7fffffff, 0x0, 0x7, 0x4, 0x4}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x18c00, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x291008, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='binfmt_misc\x00', 0x1010004, 0x0) 19:45:31 executing program 3: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x291008, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='binfmt_misc\x00', 0x1010004, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x291008, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='binfmt_misc\x00', 0x1010004, 0x0) (async) 19:45:31 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x4001c0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000001c0)=0x6) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xffff}, 0xe) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000200)=@bcast) 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x4001c0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000001c0)=0x6) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) connect$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xffff}, 0xe) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000200)=@bcast) 19:45:31 executing program 3: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2518.989869] block nbd2: Attempted send on invalid socket [ 2518.995432] print_req_error: I/O error, dev nbd2, sector 0 [ 2519.011567] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:31 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x291008, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x1, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x101}}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='binfmt_misc\x00', 0x1010004, 0x0) 19:45:31 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:31 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x4001c0, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000001c0)=0x6) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x10000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) connect$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xffff}, 0xe) (async, rerun: 32) syz_init_net_socket$rose(0xb, 0x5, 0x0) (async, rerun: 32) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000200)=@bcast) 19:45:31 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2519.136376] hpfs: hpfs_map_sector(): read error 19:45:31 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) 19:45:31 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@context={'context', 0x3d, 'sysadm_u'}}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:32 executing program 2: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) [ 2519.252345] hpfs: hpfs_map_sector(): read error 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') chdir(&(0x7f0000000000)='./file0\x00') 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 2: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) chdir(&(0x7f0000000000)='./file0\x00') 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 1: mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) 19:45:32 executing program 2: mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') chdir(&(0x7f0000000000)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) chdir(&(0x7f0000000000)='./file0\x00') (async) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeB\xd6`zE\xd8\x00\x00\x00\x00\x01\x00\x00\x00\xb2\x1b!\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bm\xbd\xb1:\x99\xcc\xf0\xb3\x03e\xf2q\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7\t\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe55\x8aG\x12\xe7\x9b;yu\xf8~7\xc2\x8d\x8a3') 19:45:32 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeB\xd6`zE\xd8\x00\x00\x00\x00\x01\x00\x00\x00\xb2\x1b!\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bm\xbd\xb1:\x99\xcc\xf0\xb3\x03e\xf2q\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7\t\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe55\x8aG\x12\xe7\x9b;yu\xf8~7\xc2\x8d\x8a3') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeB\xd6`zE\xd8\x00\x00\x00\x00\x01\x00\x00\x00\xb2\x1b!\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bm\xbd\xb1:\x99\xcc\xf0\xb3\x03e\xf2q\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7\t\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe55\x8aG\x12\xe7\x9b;yu\xf8~7\xc2\x8d\x8a3') (async) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeB\xd6`zE\xd8\x00\x00\x00\x00\x01\x00\x00\x00\xb2\x1b!\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bm\xbd\xb1:\x99\xcc\xf0\xb3\x03e\xf2q\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7\t\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe55\x8aG\x12\xe7\x9b;yu\xf8~7\xc2\x8d\x8a3') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeB\xd6`zE\xd8\x00\x00\x00\x00\x01\x00\x00\x00\xb2\x1b!\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bm\xbd\xb1:\x99\xcc\xf0\xb3\x03e\xf2q\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7\t\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe55\x8aG\x12\xe7\x9b;yu\xf8~7\xc2\x8d\x8a3') (async) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)={0x2}) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)={0x2}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)={0x2}) (async) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)={0x2}) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @private1}, &(0x7f0000000000)=0x80) (async, rerun: 64) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (rerun: 64) 19:45:32 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xe7c}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00./file1\x00']) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 19:45:32 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:32 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:45:32 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x1000085, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_CAP_DISABLE_QUIRKS(r0, 0x4068aea3, &(0x7f0000000040)={0x74, 0x0, 0x13}) 19:45:32 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xe7c}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00./file1\x00']) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xe7c}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00./file1\x00']) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) 19:45:32 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:33 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) r1 = accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r0, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000780)={0x1a, 0x300, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) bind$llc(r1, &(0x7f00000001c0)={0x1a, 0x207, 0x5, 0x7f, 0x1, 0x1, @random="d9c3c56d3a9b"}, 0x10) getpeername(r0, &(0x7f0000000100)=@in6, &(0x7f0000000200)=0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x7b9, 0x24800) setsockopt$rose(r2, 0x104, 0x4, &(0x7f00000000c0)=0x8001, 0x4) 19:45:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) [ 2520.213962] hpfs: hpfs_map_sector(): read error 19:45:33 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000240)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ')'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&^+'}}, {@smackfsdef}]}}, 0x0, 0x0, &(0x7f00000000c0)="fa220800e1ff6322a52ac749cd1d137d2b98ed05497e9ebfccf56e75ff81e32ad0c552011790f76828678b4b91815eced01f83c07ea66bd14f4c") umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:33 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 19:45:33 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x1000085, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_CAP_DISABLE_QUIRKS(r0, 0x4068aea3, &(0x7f0000000040)={0x74, 0x0, 0x13}) 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xe7c}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00./file1\x00']) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 19:45:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x1000085, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_CAP_DISABLE_QUIRKS(r0, 0x4068aea3, &(0x7f0000000040)={0x74, 0x0, 0x13}) 19:45:33 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4008, 0x0, 0x1, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000100)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x18, &(0x7f00000001c0)='bfs\x00') linkat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000300)=""/84, 0x54) 19:45:33 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 19:45:33 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x1000085, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_CAP_DISABLE_QUIRKS(r0, 0x4068aea3, &(0x7f0000000040)={0x74, 0x0, 0x13}) 19:45:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) 19:45:33 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, &(0x7f0000000180)='-\x00') 19:45:33 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 19:45:33 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4008, 0x0, 0x1, 0x0, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') (async) mount(&(0x7f0000000100)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x18, &(0x7f00000001c0)='bfs\x00') (async) linkat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000300)=""/84, 0x54) [ 2520.491421] overlayfs: unrecognized mount option "bfs" or missing value [ 2520.513272] hpfs: hpfs_map_sector(): read error 19:45:33 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, 0x0, &(0x7f0000000140)='hpfs\x00', 0x200002, &(0x7f0000000180)='-\x00') [ 2520.541112] hpfs: hpfs_map_sector(): read error 19:45:33 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4008, 0x0, 0x1, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000100)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x18, &(0x7f00000001c0)='bfs\x00') linkat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000300)=""/84, 0x54) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4008, 0x0, 0x1, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') (async) mount(&(0x7f0000000100)=@md0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x18, &(0x7f00000001c0)='bfs\x00') (async) linkat(r0, &(0x7f0000000200)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00', 0x400) (async) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000300)=""/84, 0x54) (async) 19:45:33 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x280082, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000100)='ocfs2_dlmfs\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 19:45:33 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 1) 19:45:33 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (fail_nth: 1) 19:45:33 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) 19:45:33 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 1) [ 2520.712283] overlayfs: unrecognized mount option "bfs" or missing value [ 2520.738269] FAULT_INJECTION: forcing a failure. [ 2520.738269] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.760636] CPU: 1 PID: 22074 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2520.768548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2520.777989] Call Trace: [ 2520.780581] dump_stack+0x1b2/0x281 [ 2520.784231] should_fail.cold+0x10a/0x149 [ 2520.788403] should_failslab+0xd6/0x130 [ 2520.792394] __kmalloc_track_caller+0x2bc/0x400 [ 2520.797069] ? strndup_user+0x5b/0xf0 [ 2520.800876] memdup_user+0x22/0xa0 [ 2520.804420] strndup_user+0x5b/0xf0 [ 2520.808049] ? copy_mnt_ns+0xa30/0xa30 [ 2520.810104] FAULT_INJECTION: forcing a failure. [ 2520.810104] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.811927] SyS_mount+0x39/0x120 [ 2520.811937] ? copy_mnt_ns+0xa30/0xa30 [ 2520.811950] do_syscall_64+0x1d5/0x640 [ 2520.811970] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2520.839597] RIP: 0033:0x7f18316fe0c9 [ 2520.843289] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2520.850981] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 19:45:33 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000001c0)=""/113, 0x71) 19:45:33 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', 0x0, 0x200002, &(0x7f0000000180)='-\x00') 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000100)={0x1a, 0x309, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES64=r0, @ANYBLOB="d7d00000000000002e00"]) [ 2520.858240] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2520.865507] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.872770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2520.880140] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2520.893099] CPU: 0 PID: 22085 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 2520.901003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2520.910351] Call Trace: [ 2520.912934] dump_stack+0x1b2/0x281 [ 2520.916576] should_fail.cold+0x10a/0x149 [ 2520.920730] should_failslab+0xd6/0x130 [ 2520.924715] __kmalloc_track_caller+0x2bc/0x400 [ 2520.927231] FAULT_INJECTION: forcing a failure. [ 2520.927231] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.929420] ? strndup_user+0x5b/0xf0 [ 2520.944465] memdup_user+0x22/0xa0 [ 2520.948006] strndup_user+0x5b/0xf0 [ 2520.951633] ? copy_mnt_ns+0xa30/0xa30 [ 2520.955514] SyS_mount+0x39/0x120 [ 2520.958951] ? copy_mnt_ns+0xa30/0xa30 [ 2520.962825] do_syscall_64+0x1d5/0x640 [ 2520.966699] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2520.971874] RIP: 0033:0x7f1614f3b0c9 [ 2520.975567] RSP: 002b:00007f16134ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2520.983264] RAX: ffffffffffffffda RBX: 00007f161505af80 RCX: 00007f1614f3b0c9 [ 2520.990517] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2520.997771] RBP: 00007f16134ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.005023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2521.012276] R13: 00007ffd8c6b6dff R14: 00007f16134ad300 R15: 0000000000022000 [ 2521.019555] CPU: 1 PID: 22091 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2521.027611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2521.036956] Call Trace: [ 2521.039545] dump_stack+0x1b2/0x281 [ 2521.043172] should_fail.cold+0x10a/0x149 [ 2521.047322] should_failslab+0xd6/0x130 [ 2521.051298] __kmalloc_track_caller+0x2bc/0x400 [ 2521.055964] ? strndup_user+0x5b/0xf0 [ 2521.059758] memdup_user+0x22/0xa0 [ 2521.063295] strndup_user+0x5b/0xf0 [ 2521.066917] ? copy_mnt_ns+0xa30/0xa30 [ 2521.070806] SyS_mount+0x39/0x120 [ 2521.074256] ? copy_mnt_ns+0xa30/0xa30 [ 2521.078141] do_syscall_64+0x1d5/0x640 [ 2521.082030] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2521.087211] RIP: 0033:0x7f90fc7290c9 [ 2521.090912] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2521.098615] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2521.105879] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 19:45:33 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (fail_nth: 2) 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000100)={0x1a, 0x309, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES64=r0, @ANYBLOB="d7d00000000000002e00"]) 19:45:33 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000001c0)=""/113, 0x71) 19:45:33 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 2) [ 2521.113148] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.120414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2521.127682] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 19:45:33 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000001c0)=""/113, 0x71) 19:45:33 executing program 5: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000100)={0x1a, 0x309, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES64=r0, @ANYBLOB="d7d00000000000002e00"]) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) pipe2$watch_queue(&(0x7f0000000080), 0x80) (async) accept4$llc(0xffffffffffffffff, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10, 0x0) (async) accept4$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000003c0)=0x10, 0x0) (async) recvfrom$llc(r2, &(0x7f00000006c0)=""/135, 0x87, 0x0, &(0x7f0000000100)={0x1a, 0x309, 0x5, 0xff, 0x9, 0xe, @local}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES64=r0, @ANYBLOB="d7d00000000000002e00"]) (async) 19:45:34 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f00000001c0)=""/113, 0x71) [ 2521.187230] FAULT_INJECTION: forcing a failure. [ 2521.187230] name failslab, interval 1, probability 0, space 0, times 0 [ 2521.226731] FAULT_INJECTION: forcing a failure. [ 2521.226731] name failslab, interval 1, probability 0, space 0, times 0 [ 2521.230845] CPU: 0 PID: 22104 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 2521.245814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2521.255162] Call Trace: [ 2521.257746] dump_stack+0x1b2/0x281 [ 2521.261364] should_fail.cold+0x10a/0x149 [ 2521.265505] should_failslab+0xd6/0x130 [ 2521.269479] kmem_cache_alloc+0x28e/0x3c0 [ 2521.273622] getname_flags+0xc8/0x550 [ 2521.277413] user_path_at_empty+0x2a/0x50 [ 2521.281552] do_mount+0x118/0x2a30 [ 2521.285079] ? lock_acquire+0x170/0x3f0 [ 2521.289035] ? lock_downgrade+0x740/0x740 [ 2521.293171] ? copy_mount_string+0x40/0x40 [ 2521.297386] ? __might_fault+0x177/0x1b0 [ 2521.301429] ? _copy_from_user+0x96/0x100 [ 2521.305560] ? copy_mount_options+0x1fa/0x2f0 [ 2521.310034] ? copy_mnt_ns+0xa30/0xa30 [ 2521.313904] SyS_mount+0xa8/0x120 [ 2521.317339] ? copy_mnt_ns+0xa30/0xa30 [ 2521.321209] do_syscall_64+0x1d5/0x640 [ 2521.325101] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2521.330301] RIP: 0033:0x7f1614f3b0c9 [ 2521.334080] RSP: 002b:00007f16134ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2521.341770] RAX: ffffffffffffffda RBX: 00007f161505af80 RCX: 00007f1614f3b0c9 [ 2521.349021] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2521.356359] RBP: 00007f16134ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.363612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2521.370863] R13: 00007ffd8c6b6dff R14: 00007f16134ad300 R15: 0000000000022000 [ 2521.378181] CPU: 1 PID: 22111 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2521.386064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2521.395500] Call Trace: [ 2521.398082] dump_stack+0x1b2/0x281 [ 2521.401711] should_fail.cold+0x10a/0x149 [ 2521.405862] should_failslab+0xd6/0x130 [ 2521.409830] __kmalloc_track_caller+0x2bc/0x400 [ 2521.414504] ? strndup_user+0x5b/0xf0 [ 2521.418303] memdup_user+0x22/0xa0 [ 2521.421846] strndup_user+0x5b/0xf0 [ 2521.425470] ? copy_mnt_ns+0xa30/0xa30 [ 2521.429357] SyS_mount+0x68/0x120 [ 2521.432804] ? copy_mnt_ns+0xa30/0xa30 [ 2521.436690] do_syscall_64+0x1d5/0x640 [ 2521.440578] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2521.445757] RIP: 0033:0x7f18316fe0c9 [ 2521.449460] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2521.457168] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2521.464528] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2521.471792] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.479053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 19:45:34 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 2) 19:45:34 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000380)={0x2}) r1 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000180)={0x3, 0x1000, 0x3ff}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x78, r3, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x992, 0x401, 0x2, 0x4, 0xd8]}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfff, 0x3f, 0x80, 0x7ff]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x20}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000051}, 0x14) 19:45:34 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000380)={0x2}) (async) r1 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x0) (async) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) (async, rerun: 32) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) (async, rerun: 32) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000180)={0x3, 0x1000, 0x3ff}) (async) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x78, r3, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x992, 0x401, 0x2, 0x4, 0xd8]}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfff, 0x3f, 0x80, 0x7ff]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x20}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000051}, 0x14) 19:45:34 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x20010, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='exofs\x00', 0x224004c, &(0x7f00000001c0)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:34 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 1) [ 2521.486316] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 19:45:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (fail_nth: 3) [ 2521.519985] FAULT_INJECTION: forcing a failure. [ 2521.519985] name failslab, interval 1, probability 0, space 0, times 0 [ 2521.557224] CPU: 1 PID: 22131 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2521.565127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2521.574475] Call Trace: [ 2521.578102] dump_stack+0x1b2/0x281 [ 2521.581736] should_fail.cold+0x10a/0x149 [ 2521.585883] should_failslab+0xd6/0x130 [ 2521.589858] __kmalloc_track_caller+0x2bc/0x400 [ 2521.594519] ? strndup_user+0x5b/0xf0 [ 2521.598322] memdup_user+0x22/0xa0 [ 2521.601873] strndup_user+0x5b/0xf0 [ 2521.605495] ? copy_mnt_ns+0xa30/0xa30 [ 2521.609381] SyS_mount+0x68/0x120 [ 2521.612828] ? copy_mnt_ns+0xa30/0xa30 [ 2521.616714] do_syscall_64+0x1d5/0x640 [ 2521.617764] FAULT_INJECTION: forcing a failure. [ 2521.617764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2521.620602] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2521.637544] RIP: 0033:0x7f90fc7290c9 [ 2521.641234] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2521.648923] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2521.656183] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2521.663436] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 19:45:34 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x20010, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='exofs\x00', 0x224004c, &(0x7f00000001c0)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x20010, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='exofs\x00', 0x224004c, &(0x7f00000001c0)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) [ 2521.670687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2521.677941] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2521.685210] CPU: 0 PID: 22142 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 2521.693089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2521.702445] Call Trace: [ 2521.705032] dump_stack+0x1b2/0x281 [ 2521.708491] FAULT_INJECTION: forcing a failure. [ 2521.708491] name failslab, interval 1, probability 0, space 0, times 0 [ 2521.708657] should_fail.cold+0x10a/0x149 [ 2521.723973] __alloc_pages_nodemask+0x21e/0x2900 [ 2521.728717] ? is_bpf_text_address+0x91/0x150 [ 2521.733199] ? __lock_acquire+0x5fc/0x3f20 [ 2521.737427] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2521.742250] ? kernel_text_address+0xbd/0xf0 [ 2521.746644] ? lock_downgrade+0x740/0x740 [ 2521.750775] ? __kernel_text_address+0x9/0x30 [ 2521.755255] ? unwind_get_return_address+0x51/0x90 [ 2521.760198] ? depot_save_stack+0x10d/0x3f0 [ 2521.764511] cache_grow_begin+0x91/0x700 [ 2521.768555] ? fs_reclaim_release+0xd0/0x110 [ 2521.772948] ? check_preemption_disabled+0x35/0x240 [ 2521.777949] cache_alloc_refill+0x273/0x350 [ 2521.782785] kmem_cache_alloc+0x333/0x3c0 [ 2521.786917] getname_flags+0xc8/0x550 [ 2521.790722] user_path_at_empty+0x2a/0x50 [ 2521.794867] do_mount+0x118/0x2a30 [ 2521.798396] ? lock_acquire+0x170/0x3f0 [ 2521.802357] ? lock_downgrade+0x740/0x740 [ 2521.806501] ? copy_mount_string+0x40/0x40 [ 2521.810736] ? __might_fault+0x177/0x1b0 [ 2521.814790] ? _copy_from_user+0x96/0x100 [ 2521.818923] ? copy_mount_options+0x1fa/0x2f0 [ 2521.823409] ? copy_mnt_ns+0xa30/0xa30 [ 2521.827289] SyS_mount+0xa8/0x120 [ 2521.830747] ? copy_mnt_ns+0xa30/0xa30 [ 2521.834619] do_syscall_64+0x1d5/0x640 [ 2521.838498] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2521.843673] RIP: 0033:0x7f1614f3b0c9 [ 2521.847363] RSP: 002b:00007f16134ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2521.855052] RAX: ffffffffffffffda RBX: 00007f161505af80 RCX: 00007f1614f3b0c9 [ 2521.862304] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2521.869560] RBP: 00007f16134ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2521.876819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2521.884074] R13: 00007ffd8c6b6dff R14: 00007f16134ad300 R15: 0000000000022000 [ 2521.891336] CPU: 1 PID: 22143 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2521.899233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2521.908672] Call Trace: [ 2521.911265] dump_stack+0x1b2/0x281 [ 2521.914900] should_fail.cold+0x10a/0x149 19:45:34 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 3) 19:45:34 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 3) [ 2521.919049] should_failslab+0xd6/0x130 [ 2521.923023] kmem_cache_alloc+0x28e/0x3c0 [ 2521.927168] getname_flags+0xc8/0x550 [ 2521.930970] user_path_mountpoint_at+0x23/0x40 [ 2521.935550] SyS_umount+0x125/0xeb0 [ 2521.939176] ? wait_for_completion_io+0x10/0x10 [ 2521.943845] ? vfs_write+0x319/0x4d0 [ 2521.947556] ? __detach_mounts+0x400/0x400 [ 2521.951792] ? SyS_write+0x14d/0x210 [ 2521.955500] ? SyS_read+0x210/0x210 [ 2521.959123] ? do_syscall_64+0x4c/0x640 [ 2521.963103] ? __detach_mounts+0x400/0x400 [ 2521.967355] do_syscall_64+0x1d5/0x640 19:45:34 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000380)={0x2}) (async) r1 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x0) (async) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) (async) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) (async) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000180)={0x3, 0x1000, 0x3ff}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200), r1) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x78, r3, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x992, 0x401, 0x2, 0x4, 0xd8]}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @private1}, @SEG6_ATTR_SECRET={0x14, 0x4, [0xfff, 0x3f, 0x80, 0x7ff]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x20}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000051}, 0x14) 19:45:34 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (fail_nth: 4) 19:45:34 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x20010, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='exofs\x00', 0x224004c, &(0x7f00000001c0)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x20010, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='exofs\x00', 0x224004c, &(0x7f00000001c0)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) [ 2521.971250] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2521.976436] RIP: 0033:0x7faf9a1d70c9 [ 2521.980139] RSP: 002b:00007faf98749168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2521.987841] RAX: ffffffffffffffda RBX: 00007faf9a2f6f80 RCX: 00007faf9a1d70c9 [ 2521.995101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 2522.002366] RBP: 00007faf987491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2522.009633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.016901] R13: 00007ffc9c5cdc2f R14: 00007faf98749300 R15: 0000000000022000 [ 2522.059658] FAULT_INJECTION: forcing a failure. [ 2522.059658] name failslab, interval 1, probability 0, space 0, times 0 [ 2522.071181] FAULT_INJECTION: forcing a failure. [ 2522.071181] name failslab, interval 1, probability 0, space 0, times 0 [ 2522.075868] CPU: 1 PID: 22151 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2522.090239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2522.099581] Call Trace: [ 2522.102168] dump_stack+0x1b2/0x281 [ 2522.105788] should_fail.cold+0x10a/0x149 [ 2522.109930] should_failslab+0xd6/0x130 [ 2522.113896] kmem_cache_alloc+0x28e/0x3c0 [ 2522.118033] getname_flags+0xc8/0x550 [ 2522.121914] user_path_at_empty+0x2a/0x50 [ 2522.126048] do_mount+0x118/0x2a30 [ 2522.129578] ? lock_acquire+0x170/0x3f0 [ 2522.133540] ? lock_downgrade+0x740/0x740 [ 2522.137677] ? copy_mount_string+0x40/0x40 [ 2522.141903] ? __might_fault+0x177/0x1b0 [ 2522.145959] ? _copy_from_user+0x96/0x100 [ 2522.150099] ? copy_mount_options+0x1fa/0x2f0 [ 2522.154579] ? copy_mnt_ns+0xa30/0xa30 [ 2522.158453] SyS_mount+0xa8/0x120 [ 2522.161888] ? copy_mnt_ns+0xa30/0xa30 [ 2522.165764] do_syscall_64+0x1d5/0x640 [ 2522.169656] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2522.170780] FAULT_INJECTION: forcing a failure. [ 2522.170780] name failslab, interval 1, probability 0, space 0, times 0 [ 2522.174857] RIP: 0033:0x7f18316fe0c9 [ 2522.189726] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2522.197428] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2522.204690] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2522.212050] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2522.219316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.226573] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2522.233845] CPU: 0 PID: 22152 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2522.241734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2522.251076] Call Trace: [ 2522.253648] dump_stack+0x1b2/0x281 [ 2522.257262] should_fail.cold+0x10a/0x149 [ 2522.261394] should_failslab+0xd6/0x130 [ 2522.265350] kmem_cache_alloc+0x28e/0x3c0 [ 2522.269482] getname_flags+0xc8/0x550 [ 2522.273272] user_path_at_empty+0x2a/0x50 [ 2522.277416] do_mount+0x118/0x2a30 [ 2522.280937] ? lock_acquire+0x170/0x3f0 [ 2522.284895] ? lock_downgrade+0x740/0x740 [ 2522.289023] ? copy_mount_string+0x40/0x40 [ 2522.293247] ? __might_fault+0x177/0x1b0 [ 2522.297291] ? _copy_from_user+0x96/0x100 [ 2522.301420] ? copy_mount_options+0x1fa/0x2f0 [ 2522.305899] ? copy_mnt_ns+0xa30/0xa30 [ 2522.309766] SyS_mount+0xa8/0x120 [ 2522.313198] ? copy_mnt_ns+0xa30/0xa30 [ 2522.317069] do_syscall_64+0x1d5/0x640 [ 2522.320953] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2522.326131] RIP: 0033:0x7f90fc7290c9 [ 2522.329823] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2522.337511] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2522.344762] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2522.352012] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 19:45:35 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 2) 19:45:35 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='logfs\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00') r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8000, &(0x7f0000000140)=ANY=[@ANYBLOB="06643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,default_permissions,defcontext=root,fscontext=staff_u,func=KEXEC_INITRAMFS_CHECK,obj_user=bfs\x00,audit,mask=MAY_EXEC,obj_type=}{}},smackfsfloor=bfs\x00,\x00'], 0x0, 0x0, &(0x7f0000000280)="78de7d7dae29ada4bbf83e0619c8f1a299cfc79db7109e9fe98766a27fab42128cbd7d") r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:45:35 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 4) [ 2522.359259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.366514] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2522.373777] CPU: 1 PID: 22153 Comm: syz-executor.3 Not tainted 4.14.304-syzkaller #0 [ 2522.381657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2522.391006] Call Trace: [ 2522.393597] dump_stack+0x1b2/0x281 [ 2522.397228] should_fail.cold+0x10a/0x149 [ 2522.401385] should_failslab+0xd6/0x130 [ 2522.405362] kmem_cache_alloc+0x28e/0x3c0 [ 2522.409513] alloc_vfsmnt+0x23/0x7f0 [ 2522.413223] ? _raw_read_unlock+0x29/0x40 [ 2522.417388] vfs_kern_mount.part.0+0x27/0x470 [ 2522.421891] do_mount+0xe65/0x2a30 [ 2522.425429] ? lock_acquire+0x170/0x3f0 [ 2522.429399] ? lock_downgrade+0x740/0x740 [ 2522.433546] ? copy_mount_string+0x40/0x40 [ 2522.437776] ? __might_fault+0x177/0x1b0 [ 2522.441838] ? _copy_from_user+0x96/0x100 [ 2522.442245] FAULT_INJECTION: forcing a failure. [ 2522.442245] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2522.445980] ? copy_mount_options+0x1fa/0x2f0 [ 2522.462226] ? copy_mnt_ns+0xa30/0xa30 [ 2522.466092] SyS_mount+0xa8/0x120 [ 2522.469544] ? copy_mnt_ns+0xa30/0xa30 [ 2522.473412] do_syscall_64+0x1d5/0x640 [ 2522.477284] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2522.482454] RIP: 0033:0x7f1614f3b0c9 [ 2522.486144] RSP: 002b:00007f16134ad168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2522.493829] RAX: ffffffffffffffda RBX: 00007f161505af80 RCX: 00007f1614f3b0c9 [ 2522.501076] RDX: 0000000020000080 RSI: 0000000020000000 RDI: 0000000000000000 [ 2522.508323] RBP: 00007f16134ad1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2522.515568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.522826] R13: 00007ffd8c6b6dff R14: 00007f16134ad300 R15: 0000000000022000 [ 2522.530093] CPU: 0 PID: 22164 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2522.537971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2522.547314] Call Trace: [ 2522.549914] dump_stack+0x1b2/0x281 [ 2522.553581] should_fail.cold+0x10a/0x149 [ 2522.557731] __alloc_pages_nodemask+0x21e/0x2900 [ 2522.562486] ? is_bpf_text_address+0x91/0x150 [ 2522.566980] ? __lock_acquire+0x5fc/0x3f20 [ 2522.571215] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2522.576055] ? kernel_text_address+0xbd/0xf0 [ 2522.580451] ? lock_downgrade+0x740/0x740 [ 2522.584576] ? __kernel_text_address+0x9/0x30 [ 2522.589052] ? unwind_get_return_address+0x51/0x90 [ 2522.593961] ? depot_save_stack+0x10d/0x3f0 [ 2522.598264] cache_grow_begin+0x91/0x700 [ 2522.602337] ? fs_reclaim_release+0xd0/0x110 [ 2522.606724] ? check_preemption_disabled+0x35/0x240 [ 2522.611718] cache_alloc_refill+0x273/0x350 [ 2522.616036] kmem_cache_alloc+0x333/0x3c0 [ 2522.620176] getname_flags+0xc8/0x550 [ 2522.623960] user_path_at_empty+0x2a/0x50 [ 2522.628086] do_mount+0x118/0x2a30 [ 2522.631600] ? lock_acquire+0x170/0x3f0 [ 2522.635562] ? lock_downgrade+0x740/0x740 [ 2522.639695] ? copy_mount_string+0x40/0x40 [ 2522.643914] ? __might_fault+0x177/0x1b0 [ 2522.647961] ? _copy_from_user+0x96/0x100 [ 2522.652090] ? copy_mount_options+0x1fa/0x2f0 [ 2522.656580] ? copy_mnt_ns+0xa30/0xa30 [ 2522.660464] SyS_mount+0xa8/0x120 [ 2522.663892] ? copy_mnt_ns+0xa30/0xa30 [ 2522.667756] do_syscall_64+0x1d5/0x640 [ 2522.671629] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2522.676813] RIP: 0033:0x7f90fc7290c9 [ 2522.680498] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2522.688195] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2522.695452] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2522.702703] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 19:45:35 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 4) 19:45:35 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="526e78d826d7d02c2e00"]) 19:45:35 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='logfs\x00', 0x0, 0x0) (async) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00') (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8000, &(0x7f0000000140)=ANY=[@ANYBLOB="06643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,default_permissions,defcontext=root,fscontext=staff_u,func=KEXEC_INITRAMFS_CHECK,obj_user=bfs\x00,audit,mask=MAY_EXEC,obj_type=}{}},smackfsfloor=bfs\x00,\x00'], 0x0, 0x0, &(0x7f0000000280)="78de7d7dae29ada4bbf83e0619c8f1a299cfc79db7109e9fe98766a27fab42128cbd7d") (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18}, './file0\x00'}) [ 2522.709948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.717199] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2522.728620] hpfs: hpfs_map_sector(): read error [ 2522.773917] FAULT_INJECTION: forcing a failure. [ 2522.773917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2522.785739] CPU: 0 PID: 22169 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2522.793615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2522.802963] Call Trace: [ 2522.805557] dump_stack+0x1b2/0x281 [ 2522.809183] should_fail.cold+0x10a/0x149 [ 2522.813332] __alloc_pages_nodemask+0x21e/0x2900 [ 2522.818086] ? is_bpf_text_address+0x91/0x150 [ 2522.822579] ? __lock_acquire+0x5fc/0x3f20 [ 2522.826904] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2522.831743] ? kernel_text_address+0xbd/0xf0 [ 2522.833156] FAULT_INJECTION: forcing a failure. [ 2522.833156] name failslab, interval 1, probability 0, space 0, times 0 [ 2522.836144] ? lock_downgrade+0x740/0x740 [ 2522.836154] ? __kernel_text_address+0x9/0x30 [ 2522.836167] ? unwind_get_return_address+0x51/0x90 [ 2522.836180] ? depot_save_stack+0x10d/0x3f0 [ 2522.836203] cache_grow_begin+0x91/0x700 [ 2522.869451] ? fs_reclaim_release+0xd0/0x110 [ 2522.873847] ? check_preemption_disabled+0x35/0x240 [ 2522.878852] cache_alloc_refill+0x273/0x350 [ 2522.883169] kmem_cache_alloc+0x333/0x3c0 [ 2522.887309] getname_flags+0xc8/0x550 [ 2522.891115] user_path_at_empty+0x2a/0x50 [ 2522.895256] do_mount+0x118/0x2a30 [ 2522.898886] ? lock_acquire+0x170/0x3f0 [ 2522.902852] ? lock_downgrade+0x740/0x740 [ 2522.906997] ? copy_mount_string+0x40/0x40 [ 2522.911306] ? __might_fault+0x177/0x1b0 [ 2522.915368] ? _copy_from_user+0x96/0x100 [ 2522.919514] ? copy_mount_options+0x1fa/0x2f0 [ 2522.924003] ? copy_mnt_ns+0xa30/0xa30 [ 2522.927888] SyS_mount+0xa8/0x120 [ 2522.931334] ? copy_mnt_ns+0xa30/0xa30 [ 2522.935248] do_syscall_64+0x1d5/0x640 [ 2522.939139] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2522.944320] RIP: 0033:0x7f18316fe0c9 [ 2522.948018] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2522.955718] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2522.962998] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 19:45:35 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 5) 19:45:35 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="526e78d826d7d02c2e00"]) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="526e78d826d7d02c2e00"]) (async) 19:45:35 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="526e78d826d7d02c2e00"]) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="526e78d826d7d02c2e00"]) (async) 19:45:35 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x800010, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') [ 2522.970284] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2522.977544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2522.984812] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2522.992090] CPU: 1 PID: 22174 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2522.999977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2523.009326] Call Trace: [ 2523.011912] dump_stack+0x1b2/0x281 [ 2523.015540] should_fail.cold+0x10a/0x149 [ 2523.019687] should_failslab+0xd6/0x130 [ 2523.020138] FAULT_INJECTION: forcing a failure. [ 2523.020138] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2523.023658] kmem_cache_alloc+0x28e/0x3c0 [ 2523.039577] alloc_vfsmnt+0x23/0x7f0 [ 2523.043272] ? _raw_read_unlock+0x29/0x40 [ 2523.047403] vfs_kern_mount.part.0+0x27/0x470 [ 2523.051882] do_mount+0xe65/0x2a30 [ 2523.055493] ? lock_acquire+0x170/0x3f0 [ 2523.059448] ? lock_downgrade+0x740/0x740 [ 2523.063580] ? copy_mount_string+0x40/0x40 [ 2523.067796] ? __might_fault+0x177/0x1b0 [ 2523.071843] ? _copy_from_user+0x96/0x100 [ 2523.075974] ? copy_mount_options+0x1fa/0x2f0 [ 2523.080449] ? copy_mnt_ns+0xa30/0xa30 [ 2523.084320] SyS_mount+0xa8/0x120 [ 2523.087756] ? copy_mnt_ns+0xa30/0xa30 [ 2523.091628] do_syscall_64+0x1d5/0x640 [ 2523.095503] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2523.100671] RIP: 0033:0x7f90fc7290c9 [ 2523.104362] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2523.112053] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2523.119302] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2523.126552] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.133801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2523.141053] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2523.148335] CPU: 0 PID: 22185 Comm: syz-executor.0 Not tainted 4.14.304-syzkaller #0 [ 2523.156214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2523.165566] Call Trace: [ 2523.168172] dump_stack+0x1b2/0x281 [ 2523.171802] should_fail.cold+0x10a/0x149 [ 2523.175952] ? __lock_acquire+0x5fc/0x3f20 [ 2523.180185] __alloc_pages_nodemask+0x21e/0x2900 [ 2523.184941] ? __might_fault+0x104/0x1b0 [ 2523.189050] ? __lock_acquire+0x5fc/0x3f20 [ 2523.193284] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2523.198129] ? lock_downgrade+0x740/0x740 [ 2523.202278] cache_grow_begin+0x91/0x700 [ 2523.206420] ? fs_reclaim_release+0xd0/0x110 [ 2523.210827] ? check_preemption_disabled+0x35/0x240 [ 2523.215854] cache_alloc_refill+0x273/0x350 [ 2523.220178] kmem_cache_alloc+0x333/0x3c0 19:45:35 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (fail_nth: 5) 19:45:35 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x800010, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') [ 2523.224367] getname_flags+0xc8/0x550 [ 2523.228172] user_path_mountpoint_at+0x23/0x40 [ 2523.232745] SyS_umount+0x125/0xeb0 [ 2523.236370] ? wait_for_completion_io+0x10/0x10 [ 2523.241032] ? vfs_write+0x319/0x4d0 [ 2523.244739] ? __detach_mounts+0x400/0x400 [ 2523.249068] ? SyS_write+0x14d/0x210 [ 2523.252774] ? SyS_read+0x210/0x210 [ 2523.256395] ? do_syscall_64+0x4c/0x640 [ 2523.259035] nbd_handle_cmd: 6 callbacks suppressed [ 2523.259044] block nbd1: Attempted send on invalid socket [ 2523.260364] ? __detach_mounts+0x400/0x400 [ 2523.260375] do_syscall_64+0x1d5/0x640 [ 2523.260389] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2523.265319] print_req_error: 6 callbacks suppressed [ 2523.265324] print_req_error: I/O error, dev nbd1, sector 0 [ 2523.270723] RIP: 0033:0x7faf9a1d70c9 [ 2523.284928] hpfs: hpfs_map_sector(): read error [ 2523.288958] RSP: 002b:00007faf98749168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 2523.288969] RAX: ffffffffffffffda RBX: 00007faf9a2f6f80 RCX: 00007faf9a1d70c9 [ 2523.288975] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 19:45:36 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (fail_nth: 3) 19:45:36 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 6) 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='logfs\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='./file0\x00') (async) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8000, &(0x7f0000000140)=ANY=[@ANYBLOB="06643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000060000,user_id=', @ANYRESDEC=0xee00, @ANYBLOB=',group_id=', @ANYRESDEC=0xee01, @ANYBLOB=',max_read=0x0000000000000004,default_permissions,defcontext=root,fscontext=staff_u,func=KEXEC_INITRAMFS_CHECK,obj_user=bfs\x00,audit,mask=MAY_EXEC,obj_type=}{}},smackfsfloor=bfs\x00,\x00'], 0x0, 0x0, &(0x7f0000000280)="78de7d7dae29ada4bbf83e0619c8f1a299cfc79db7109e9fe98766a27fab42128cbd7d") (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000340), 0x800, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000380)={{0x1, 0x1, 0x18}, './file0\x00'}) 19:45:36 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x800010, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:36 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="e6df86cec14643360526378ed8284e816dfa5e18f4314e40129cffe8b2d697271976e216fd1e878abadfeec2e1d65d1883d10eda31baf8ef110b579f855cfcf1a9c9e574a5188a17fd4e4b88dab1fe5e7e0e69e6a8c5fba7be3a810f7455ffbd7b0fef4b80c6e5546b85a65c471d3f8e"]) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x0) 19:45:36 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 5) [ 2523.288980] RBP: 00007faf987491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.288985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2523.288993] R13: 00007ffc9c5cdc2f R14: 00007faf98749300 R15: 0000000000022000 [ 2523.405396] FAULT_INJECTION: forcing a failure. [ 2523.405396] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.435562] CPU: 1 PID: 22200 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2523.443471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2523.452817] Call Trace: [ 2523.455404] dump_stack+0x1b2/0x281 [ 2523.459031] should_fail.cold+0x10a/0x149 [ 2523.463182] should_failslab+0xd6/0x130 [ 2523.467158] kmem_cache_alloc+0x28e/0x3c0 [ 2523.471306] alloc_vfsmnt+0x23/0x7f0 [ 2523.472605] FAULT_INJECTION: forcing a failure. [ 2523.472605] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.475010] ? _raw_read_unlock+0x29/0x40 [ 2523.475023] vfs_kern_mount.part.0+0x27/0x470 [ 2523.475034] do_mount+0xe65/0x2a30 [ 2523.475045] ? lock_acquire+0x170/0x3f0 [ 2523.475053] ? lock_downgrade+0x740/0x740 [ 2523.475065] ? copy_mount_string+0x40/0x40 [ 2523.475075] ? __might_fault+0x177/0x1b0 [ 2523.475087] ? _copy_from_user+0x96/0x100 [ 2523.475096] ? copy_mount_options+0x1fa/0x2f0 [ 2523.475110] ? copy_mnt_ns+0xa30/0xa30 [ 2523.527207] SyS_mount+0xa8/0x120 [ 2523.530648] ? copy_mnt_ns+0xa30/0xa30 [ 2523.534537] do_syscall_64+0x1d5/0x640 [ 2523.538410] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2523.543578] RIP: 0033:0x7f18316fe0c9 [ 2523.547268] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 19:45:36 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'osx.', '\x00'}) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2523.554965] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2523.562221] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2523.569469] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.576716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2523.583967] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2523.591230] CPU: 0 PID: 22206 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) 19:45:36 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/73, 0xffffff5b}, {&(0x7f00000012c0)=""/157, 0x9d}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000001380)}], 0x6, &(0x7f0000001440)=""/128, 0x80}, 0x10000) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000001500)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) 19:45:36 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="e6df86cec14643360526378ed8284e816dfa5e18f4314e40129cffe8b2d697271976e216fd1e878abadfeec2e1d65d1883d10eda31baf8ef110b579f855cfcf1a9c9e574a5188a17fd4e4b88dab1fe5e7e0e69e6a8c5fba7be3a810f7455ffbd7b0fef4b80c6e5546b85a65c471d3f8e"]) (async, rerun: 64) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x0) (rerun: 64) 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) chdir(&(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) (async) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) [ 2523.599115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2523.608463] Call Trace: [ 2523.611050] dump_stack+0x1b2/0x281 [ 2523.614677] should_fail.cold+0x10a/0x149 [ 2523.618819] should_failslab+0xd6/0x130 [ 2523.622790] __kmalloc_track_caller+0x2bc/0x400 [ 2523.627454] ? kstrdup_const+0x35/0x60 [ 2523.631341] ? lock_downgrade+0x740/0x740 [ 2523.635483] kstrdup+0x36/0x70 [ 2523.638674] kstrdup_const+0x35/0x60 [ 2523.642383] alloc_vfsmnt+0xe0/0x7f0 [ 2523.646095] ? _raw_read_unlock+0x29/0x40 [ 2523.650242] vfs_kern_mount.part.0+0x27/0x470 [ 2523.654738] do_mount+0xe65/0x2a30 [ 2523.658279] ? lock_acquire+0x170/0x3f0 [ 2523.662254] ? lock_downgrade+0x740/0x740 [ 2523.666432] ? copy_mount_string+0x40/0x40 [ 2523.670657] ? __might_fault+0x177/0x1b0 [ 2523.674724] ? _copy_from_user+0x96/0x100 [ 2523.678866] ? copy_mount_options+0x1fa/0x2f0 [ 2523.683355] ? copy_mnt_ns+0xa30/0xa30 [ 2523.687241] SyS_mount+0xa8/0x120 [ 2523.690692] ? copy_mnt_ns+0xa30/0xa30 [ 2523.694576] do_syscall_64+0x1d5/0x640 [ 2523.698462] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 19:45:36 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/73, 0xffffff5b}, {&(0x7f00000012c0)=""/157, 0x9d}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000001380)}], 0x6, &(0x7f0000001440)=""/128, 0x80}, 0x10000) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000001500)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/73, 0xffffff5b}, {&(0x7f00000012c0)=""/157, 0x9d}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000001380)}], 0x6, &(0x7f0000001440)=""/128, 0x80}, 0x10000) (async) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000001500)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) (async) 19:45:36 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') recvmsg$kcm(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @initdev}}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/73, 0xffffff5b}, {&(0x7f00000012c0)=""/157, 0x9d}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000080)=""/1, 0x1}, {&(0x7f0000001380)}], 0x6, &(0x7f0000001440)=""/128, 0x80}, 0x10000) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f0000001500)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bpq0, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) [ 2523.703643] RIP: 0033:0x7f90fc7290c9 [ 2523.707345] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2523.715149] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2523.722419] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2523.729691] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2523.736963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2523.744230] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 19:45:36 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 7) 19:45:36 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 6) 19:45:36 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'osx.', '\x00'}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$FUSE(r1, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r1, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r2}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, r2}, 0x10) 19:45:36 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="e6df86cec14643360526378ed8284e816dfa5e18f4314e40129cffe8b2d697271976e216fd1e878abadfeec2e1d65d1883d10eda31baf8ef110b579f855cfcf1a9c9e574a5188a17fd4e4b88dab1fe5e7e0e69e6a8c5fba7be3a810f7455ffbd7b0fef4b80c6e5546b85a65c471d3f8e"]) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="e6df86cec14643360526378ed8284e816dfa5e18f4314e40129cffe8b2d697271976e216fd1e878abadfeec2e1d65d1883d10eda31baf8ef110b579f855cfcf1a9c9e574a5188a17fd4e4b88dab1fe5e7e0e69e6a8c5fba7be3a810f7455ffbd7b0fef4b80c6e5546b85a65c471d3f8e"]) (async) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0/file0\x00', 0xe, 0x0) (async) 19:45:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r3, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x9c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0xf}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x453) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) [ 2523.880146] FAULT_INJECTION: forcing a failure. [ 2523.880146] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.914470] CPU: 1 PID: 22238 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2523.922373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2523.922432] FAULT_INJECTION: forcing a failure. [ 2523.922432] name failslab, interval 1, probability 0, space 0, times 0 [ 2523.931718] Call Trace: [ 2523.931736] dump_stack+0x1b2/0x281 [ 2523.931750] should_fail.cold+0x10a/0x149 [ 2523.931762] should_failslab+0xd6/0x130 [ 2523.931775] kmem_cache_alloc+0x28e/0x3c0 [ 2523.931787] getname_kernel+0x4e/0x340 [ 2523.931797] kern_path+0x1b/0x40 [ 2523.931808] lookup_bdev+0xc6/0x1c0 [ 2523.931822] ? bd_acquire+0x440/0x440 [ 2523.975987] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2523.981436] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2523.986449] blkdev_get_by_path+0x1b/0xa0 [ 2523.990584] mount_bdev+0x4c/0x360 [ 2523.994105] ? lazy_free_sbi+0x80/0x80 [ 2523.998002] mount_fs+0x92/0x2a0 [ 2524.001354] vfs_kern_mount.part.0+0x5b/0x470 [ 2524.005835] do_mount+0xe65/0x2a30 [ 2524.009357] ? lock_acquire+0x170/0x3f0 [ 2524.013310] ? lock_downgrade+0x740/0x740 [ 2524.017440] ? copy_mount_string+0x40/0x40 [ 2524.021740] ? __might_fault+0x177/0x1b0 [ 2524.025783] ? _copy_from_user+0x96/0x100 [ 2524.029915] ? copy_mount_options+0x1fa/0x2f0 [ 2524.034388] ? copy_mnt_ns+0xa30/0xa30 [ 2524.038258] SyS_mount+0xa8/0x120 [ 2524.041694] ? copy_mnt_ns+0xa30/0xa30 [ 2524.045566] do_syscall_64+0x1d5/0x640 [ 2524.049448] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2524.054625] RIP: 0033:0x7f90fc7290c9 [ 2524.058339] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2524.066027] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2524.073274] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2524.080524] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.087777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2524.095031] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2524.102298] CPU: 0 PID: 22243 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2524.110181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2524.119531] Call Trace: [ 2524.122123] dump_stack+0x1b2/0x281 [ 2524.125757] should_fail.cold+0x10a/0x149 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) 19:45:36 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1844420, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@uid_gt={'uid>', 0xee01}}, {@obj_type}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x4, 0x31, 0x0, 0x30, 0x34, 0x35], 0x2d, [0x6, 0x66, 0x64, 0x61], 0x2d, [0x32, 0x66, 0x61, 0x34], 0x2d, [0x38, 0x36, 0x39, 0x38], 0x2d, [0x61, 0x18, 0x39, 0x61, 0x34, 0x37, 0x31, 0x64]}}}, {@obj_user}, {@smackfsroot={'smackfsroot', 0x3d, '(*\\('}}, {@smackfsdef={'smackfsdef', 0x3d, '@/,'}}, {@measure}]}}, 0x1, 0x0, &(0x7f00000001c0)="029301ba0fb03edc747417ae4c10") r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x113100, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) linkat(r1, &(0x7f0000000300)='./file1\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x5dd}) r3 = geteuid() syz_mount_image$fuse(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x40090, &(0x7f00000004c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8000}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@allow_other}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq}, {@obj_user={'obj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@pcr={'pcr', 0x3d, 0x7}}]}}, 0x0, 0x0, &(0x7f0000000400)="1714ee013ae038933e8cb1b01b73782f57427c261011654b8634d5851b863fe962e8c199e4a5563aca99fe96bbae25ab316562895068eb5a9f9f") r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10}, 0x10) [ 2524.129902] should_failslab+0xd6/0x130 [ 2524.133875] __kmalloc_track_caller+0x2bc/0x400 [ 2524.138535] ? kstrdup_const+0x35/0x60 [ 2524.142418] ? lock_downgrade+0x740/0x740 [ 2524.146566] kstrdup+0x36/0x70 [ 2524.149752] kstrdup_const+0x35/0x60 [ 2524.153457] alloc_vfsmnt+0xe0/0x7f0 [ 2524.157161] ? _raw_read_unlock+0x29/0x40 [ 2524.161310] vfs_kern_mount.part.0+0x27/0x470 [ 2524.165802] do_mount+0xe65/0x2a30 [ 2524.169345] ? lock_acquire+0x170/0x3f0 [ 2524.173323] ? lock_downgrade+0x740/0x740 19:45:36 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1844420, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@uid_gt={'uid>', 0xee01}}, {@obj_type}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x4, 0x31, 0x0, 0x30, 0x34, 0x35], 0x2d, [0x6, 0x66, 0x64, 0x61], 0x2d, [0x32, 0x66, 0x61, 0x34], 0x2d, [0x38, 0x36, 0x39, 0x38], 0x2d, [0x61, 0x18, 0x39, 0x61, 0x34, 0x37, 0x31, 0x64]}}}, {@obj_user}, {@smackfsroot={'smackfsroot', 0x3d, '(*\\('}}, {@smackfsdef={'smackfsdef', 0x3d, '@/,'}}, {@measure}]}}, 0x1, 0x0, &(0x7f00000001c0)="029301ba0fb03edc747417ae4c10") (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x113100, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) linkat(r1, &(0x7f0000000300)='./file1\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) (async) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x5dd}) (async) r3 = geteuid() syz_mount_image$fuse(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x40090, &(0x7f00000004c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8000}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@allow_other}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq}, {@obj_user={'obj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@pcr={'pcr', 0x3d, 0x7}}]}}, 0x0, 0x0, &(0x7f0000000400)="1714ee013ae038933e8cb1b01b73782f57427c261011654b8634d5851b863fe962e8c199e4a5563aca99fe96bbae25ab316562895068eb5a9f9f") (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10}, 0x10) 19:45:36 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) [ 2524.177482] ? copy_mount_string+0x40/0x40 [ 2524.181711] ? __might_fault+0x177/0x1b0 [ 2524.185768] ? _copy_from_user+0x96/0x100 [ 2524.189913] ? copy_mount_options+0x1fa/0x2f0 [ 2524.194400] ? copy_mnt_ns+0xa30/0xa30 [ 2524.198284] SyS_mount+0xa8/0x120 [ 2524.201732] ? copy_mnt_ns+0xa30/0xa30 [ 2524.205616] do_syscall_64+0x1d5/0x640 [ 2524.209500] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2524.214685] RIP: 0033:0x7f18316fe0c9 [ 2524.218384] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 19:45:37 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x2041102, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') 19:45:37 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 8) 19:45:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1844420, &(0x7f0000000080)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}], [{@uid_gt={'uid>', 0xee01}}, {@obj_type}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x0, 0x4, 0x31, 0x0, 0x30, 0x34, 0x35], 0x2d, [0x6, 0x66, 0x64, 0x61], 0x2d, [0x32, 0x66, 0x61, 0x34], 0x2d, [0x38, 0x36, 0x39, 0x38], 0x2d, [0x61, 0x18, 0x39, 0x61, 0x34, 0x37, 0x31, 0x64]}}}, {@obj_user}, {@smackfsroot={'smackfsroot', 0x3d, '(*\\('}}, {@smackfsdef={'smackfsdef', 0x3d, '@/,'}}, {@measure}]}}, 0x1, 0x0, &(0x7f00000001c0)="029301ba0fb03edc747417ae4c10") r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) (async) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0), 0x113100, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r2, 0x0, 0x0) (async) linkat(r1, &(0x7f0000000300)='./file1\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) (async) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000200)={0x5dd}) (async) r3 = geteuid() syz_mount_image$fuse(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x40090, &(0x7f00000004c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8000}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffc}}, {@allow_other}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@uid_eq}, {@obj_user={'obj_user', 0x3d, 'fuse\x00'}}, {@hash}, {@pcr={'pcr', 0x3d, 0x7}}]}}, 0x0, 0x0, &(0x7f0000000400)="1714ee013ae038933e8cb1b01b73782f57427c261011654b8634d5851b863fe962e8c199e4a5563aca99fe96bbae25ab316562895068eb5a9f9f") (async) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) (async) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10}, 0x10) [ 2524.226086] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2524.233356] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2524.240618] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.247878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2524.255140] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2524.309175] FAULT_INJECTION: forcing a failure. [ 2524.309175] name failslab, interval 1, probability 0, space 0, times 0 [ 2524.326952] CPU: 1 PID: 22271 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2524.334838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2524.344262] Call Trace: [ 2524.346842] dump_stack+0x1b2/0x281 [ 2524.350465] should_fail.cold+0x10a/0x149 [ 2524.354593] should_failslab+0xd6/0x130 [ 2524.358545] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2524.363190] ? set_bdev_super+0x110/0x110 [ 2524.367320] sget_userns+0x102/0xc10 [ 2524.371021] ? set_bdev_super+0x110/0x110 [ 2524.375174] ? ns_test_super+0x50/0x50 [ 2524.379044] ? set_bdev_super+0x110/0x110 [ 2524.383166] ? ns_test_super+0x50/0x50 [ 2524.387040] sget+0xd1/0x110 [ 2524.390041] mount_bdev+0xcd/0x360 [ 2524.393557] ? lazy_free_sbi+0x80/0x80 [ 2524.397421] mount_fs+0x92/0x2a0 [ 2524.400769] vfs_kern_mount.part.0+0x5b/0x470 [ 2524.405250] do_mount+0xe65/0x2a30 [ 2524.408774] ? lock_acquire+0x170/0x3f0 [ 2524.412725] ? lock_downgrade+0x740/0x740 [ 2524.416860] ? copy_mount_string+0x40/0x40 [ 2524.421079] ? __might_fault+0x177/0x1b0 [ 2524.425126] ? _copy_from_user+0x96/0x100 [ 2524.429267] ? copy_mount_options+0x1fa/0x2f0 [ 2524.433738] ? copy_mnt_ns+0xa30/0xa30 [ 2524.437604] SyS_mount+0xa8/0x120 [ 2524.441036] ? copy_mnt_ns+0xa30/0xa30 [ 2524.445002] do_syscall_64+0x1d5/0x640 [ 2524.448966] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2524.454128] RIP: 0033:0x7f90fc7290c9 19:45:37 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 7) 19:45:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r3, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x9c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0xf}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x453) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') socket(0xa, 0x1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) (async) socket(0xa, 0x1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r3, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) (async) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x9c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0xf}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x453) (async) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) 19:45:37 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@random={'osx.', '\x00'}) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:37 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x2041102, 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x2041102, 0x0) (async) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') (async) 19:45:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5c030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x35c}, 0x1, 0x0, 0x0, 0x20000090}, 0x4004044) 19:45:37 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 9) [ 2524.457816] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2524.465504] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2524.472758] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2524.480025] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.487277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2524.494530] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 19:45:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async, rerun: 64) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5c030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x35c}, 0x1, 0x0, 0x0, 0x20000090}, 0x4004044) 19:45:37 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r2) 19:45:37 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x2041102, 0x0) (async) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') 19:45:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) r2 = socket(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r3, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x9c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0xf}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x453) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') socket(0xa, 0x1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) (async) socket(0xa, 0x1, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x6}}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'syztnl1\x00', r3, 0x4, 0x8, 0x40, 0x3817, 0x1, @private1, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x1, 0x7, 0x3ea6}}) (async) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x9c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0xf}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x453) (async) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x6) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) [ 2524.601004] FAULT_INJECTION: forcing a failure. [ 2524.601004] name failslab, interval 1, probability 0, space 0, times 0 [ 2524.616381] FAULT_INJECTION: forcing a failure. [ 2524.616381] name failslab, interval 1, probability 0, space 0, times 0 [ 2524.641299] CPU: 0 PID: 22289 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 19:45:37 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0/file0\x00', 0x5) [ 2524.649200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2524.658552] Call Trace: [ 2524.661227] dump_stack+0x1b2/0x281 [ 2524.664867] should_fail.cold+0x10a/0x149 [ 2524.669026] should_failslab+0xd6/0x130 [ 2524.673013] kmem_cache_alloc+0x28e/0x3c0 [ 2524.677267] getname_kernel+0x4e/0x340 [ 2524.681155] kern_path+0x1b/0x40 [ 2524.684518] lookup_bdev+0xc6/0x1c0 [ 2524.688147] ? bd_acquire+0x440/0x440 [ 2524.691944] ? rcu_lockdep_current_cpu_online+0xed/0x140 19:45:37 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0/file0\x00', 0x5) [ 2524.697407] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2524.702421] blkdev_get_by_path+0x1b/0xa0 [ 2524.706565] mount_bdev+0x4c/0x360 [ 2524.710101] ? lazy_free_sbi+0x80/0x80 [ 2524.713981] mount_fs+0x92/0x2a0 [ 2524.717361] vfs_kern_mount.part.0+0x5b/0x470 [ 2524.721876] do_mount+0xe65/0x2a30 [ 2524.725417] ? lock_acquire+0x170/0x3f0 [ 2524.729382] ? lock_downgrade+0x740/0x740 [ 2524.733522] ? copy_mount_string+0x40/0x40 [ 2524.737749] ? __might_fault+0x177/0x1b0 [ 2524.741820] ? _copy_from_user+0x96/0x100 [ 2524.745966] ? copy_mount_options+0x1fa/0x2f0 [ 2524.750458] ? copy_mnt_ns+0xa30/0xa30 [ 2524.754344] SyS_mount+0xa8/0x120 [ 2524.757790] ? copy_mnt_ns+0xa30/0xa30 [ 2524.761666] do_syscall_64+0x1d5/0x640 [ 2524.765555] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2524.770735] RIP: 0033:0x7f18316fe0c9 [ 2524.774440] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2524.782144] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2524.789458] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2524.796717] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.803969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2524.811220] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2524.818491] CPU: 1 PID: 22292 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2524.826369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2524.835715] Call Trace: [ 2524.838318] dump_stack+0x1b2/0x281 [ 2524.841943] should_fail.cold+0x10a/0x149 [ 2524.846069] ? nbd_alloc_config+0x180/0x180 [ 2524.850386] should_failslab+0xd6/0x130 [ 2524.854346] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2524.859004] ? lock_downgrade+0x740/0x740 [ 2524.863139] ? nbd_alloc_config+0x180/0x180 [ 2524.867534] nbd_alloc_config+0x5e/0x180 [ 2524.871572] nbd_open+0x23d/0x370 [ 2524.875009] __blkdev_get+0x306/0x1090 [ 2524.878878] ? sb_min_blocksize+0x1d0/0x1d0 [ 2524.883201] blkdev_get+0x441/0x890 [ 2524.886812] ? __blkdev_get+0x1090/0x1090 [ 2524.890938] ? mntput+0x5c/0x80 [ 2524.894192] ? lookup_bdev+0x8c/0x1c0 [ 2524.897970] ? bd_acquire+0x440/0x440 [ 2524.901750] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2524.907275] blkdev_get_by_path+0x38/0xa0 [ 2524.911403] mount_bdev+0x4c/0x360 [ 2524.914921] ? lazy_free_sbi+0x80/0x80 [ 2524.918804] mount_fs+0x92/0x2a0 [ 2524.922157] vfs_kern_mount.part.0+0x5b/0x470 [ 2524.926650] do_mount+0xe65/0x2a30 [ 2524.930186] ? lock_acquire+0x170/0x3f0 [ 2524.934135] ? lock_downgrade+0x740/0x740 [ 2524.938262] ? copy_mount_string+0x40/0x40 [ 2524.942591] ? __might_fault+0x177/0x1b0 [ 2524.946738] ? _copy_from_user+0x96/0x100 [ 2524.950864] ? copy_mount_options+0x1fa/0x2f0 [ 2524.955335] ? copy_mnt_ns+0xa30/0xa30 [ 2524.959199] SyS_mount+0xa8/0x120 [ 2524.962627] ? copy_mnt_ns+0xa30/0xa30 [ 2524.966491] do_syscall_64+0x1d5/0x640 [ 2524.970373] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2524.975555] RIP: 0033:0x7f90fc7290c9 [ 2524.979246] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2524.986932] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2524.994181] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 19:45:37 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 8) 19:45:37 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0/file0\x00', 0x5) 19:45:37 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000001c0)={0x10000, 0x7c72}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x2, 0x3, 0xf4c, 0x100, 0x0, [{0x7, 0x2, 0x0, '\x00', 0x81}, {0x77, 0x4, 0x80, '\x00', 0x6}, {0x20, 0x3, 0x9, '\x00', 0x4}, {0x6, 0x5, 0x6, '\x00', 0x5}, {0xf8, 0x9, 0xea, '\x00', 0x1}, {0xff, 0x1, 0x4, '\x00', 0x1}, {0x6, 0x1, 0x81, '\x00', 0x2}, {0x7, 0x93, 0x81, '\x00', 0x86}, {0x7, 0x73, 0x20, '\x00', 0x1}, {0x1, 0x7, 0x7, '\x00', 0xec}, {0x0, 0x7f, 0x9, '\x00', 0x54}, {0x5, 0x2, 0x0, '\x00', 0x6}, {0x8, 0x7d, 0x1f, '\x00', 0x40}, {0x82, 0x0, 0x3, '\x00', 0x3f}, {0x7, 0x1, 0x6, '\x00', 0x16}, {0x2, 0x40, 0xe, '\x00', 0x4}, {0x2, 0xaa, 0x9, '\x00', 0x3f}, {0x4, 0x0, 0x6, '\x00', 0x59}, {0xbf, 0x6, 0x6, '\x00', 0xd4}, {0x8a, 0xe0, 0x3f, '\x00', 0x8}, {0x2, 0x4, 0x6, '\x00', 0x20}, {0x5, 0x80, 0x4}, {0x7, 0x81, 0x20, '\x00', 0x9}, {0x91, 0x7b, 0x1, '\x00', 0x6}]}}) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=0x28) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000240)={0x1, 0x9}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) socket$kcm(0x29, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r0, &(0x7f0000000500)='./file0\x00', r1, &(0x7f0000000540)='./file0/file0\x00', 0x1400) 19:45:37 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r2) 19:45:37 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5c030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x35c}, 0x1, 0x0, 0x0, 0x20000090}, 0x4004044) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="5c030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x35c}, 0x1, 0x0, 0x0, 0x20000090}, 0x4004044) (async) 19:45:37 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 10) [ 2525.001431] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2525.008684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2525.015940] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2525.103680] FAULT_INJECTION: forcing a failure. [ 2525.103680] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2525.115515] CPU: 0 PID: 22340 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2525.123389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2525.132744] Call Trace: [ 2525.135332] dump_stack+0x1b2/0x281 [ 2525.138962] should_fail.cold+0x10a/0x149 [ 2525.143114] __alloc_pages_nodemask+0x21e/0x2900 [ 2525.144054] FAULT_INJECTION: forcing a failure. [ 2525.144054] name failslab, interval 1, probability 0, space 0, times 0 [ 2525.147865] ? __lock_acquire+0x5fc/0x3f20 [ 2525.147882] ? __lock_acquire+0x5fc/0x3f20 [ 2525.147895] ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2525.147904] ? trace_hardirqs_on+0x10/0x10 [ 2525.147913] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2525.147922] ? depot_save_stack+0x10d/0x3f0 [ 2525.147933] ? __lock_acquire+0x5fc/0x3f20 [ 2525.147952] ? kstrdup_const+0x35/0x60 [ 2525.147963] ? lock_acquire+0x170/0x3f0 [ 2525.198413] cache_grow_begin+0x91/0x700 [ 2525.202457] ? fs_reclaim_release+0xd0/0x110 [ 2525.206849] ? check_preemption_disabled+0x35/0x240 [ 2525.211849] cache_alloc_refill+0x273/0x350 [ 2525.216155] kmem_cache_alloc+0x333/0x3c0 [ 2525.220290] getname_kernel+0x4e/0x340 [ 2525.224160] kern_path+0x1b/0x40 [ 2525.227527] lookup_bdev+0xc6/0x1c0 [ 2525.231136] ? bd_acquire+0x440/0x440 [ 2525.234918] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2525.240349] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2525.245348] blkdev_get_by_path+0x1b/0xa0 [ 2525.249494] mount_bdev+0x4c/0x360 [ 2525.253015] ? lazy_free_sbi+0x80/0x80 [ 2525.256883] mount_fs+0x92/0x2a0 [ 2525.260235] vfs_kern_mount.part.0+0x5b/0x470 [ 2525.264720] do_mount+0xe65/0x2a30 [ 2525.268246] ? lock_acquire+0x170/0x3f0 [ 2525.272201] ? lock_downgrade+0x740/0x740 [ 2525.276346] ? copy_mount_string+0x40/0x40 [ 2525.280650] ? __might_fault+0x177/0x1b0 [ 2525.284698] ? _copy_from_user+0x96/0x100 [ 2525.288835] ? copy_mount_options+0x1fa/0x2f0 [ 2525.293314] ? copy_mnt_ns+0xa30/0xa30 [ 2525.297186] SyS_mount+0xa8/0x120 [ 2525.300623] ? copy_mnt_ns+0xa30/0xa30 [ 2525.304496] do_syscall_64+0x1d5/0x640 [ 2525.308460] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2525.313628] RIP: 0033:0x7f18316fe0c9 [ 2525.317336] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2525.325028] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2525.332280] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2525.339527] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2525.346775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2525.354027] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2525.361298] CPU: 1 PID: 22342 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2525.369178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2525.378559] Call Trace: [ 2525.381145] dump_stack+0x1b2/0x281 [ 2525.384887] should_fail.cold+0x10a/0x149 [ 2525.389035] should_failslab+0xd6/0x130 [ 2525.393004] __kmalloc+0x2c1/0x400 [ 2525.396540] ? __list_lru_init+0x67/0x710 [ 2525.400688] __list_lru_init+0x67/0x710 [ 2525.401085] block nbd1: Attempted send on invalid socket [ 2525.404657] sget_userns+0x504/0xc10 [ 2525.404669] ? set_bdev_super+0x110/0x110 [ 2525.404680] ? ns_test_super+0x50/0x50 [ 2525.404690] ? set_bdev_super+0x110/0x110 [ 2525.404698] ? ns_test_super+0x50/0x50 [ 2525.404704] sget+0xd1/0x110 [ 2525.404713] mount_bdev+0xcd/0x360 [ 2525.404723] ? lazy_free_sbi+0x80/0x80 [ 2525.404732] mount_fs+0x92/0x2a0 [ 2525.404745] vfs_kern_mount.part.0+0x5b/0x470 [ 2525.410183] print_req_error: I/O error, dev nbd1, sector 0 [ 2525.413875] do_mount+0xe65/0x2a30 [ 2525.418990] hpfs: hpfs_map_sector(): read error [ 2525.421870] ? lock_acquire+0x170/0x3f0 [ 2525.421881] ? lock_downgrade+0x740/0x740 [ 2525.421893] ? copy_mount_string+0x40/0x40 [ 2525.421904] ? __might_fault+0x177/0x1b0 [ 2525.478191] ? _copy_from_user+0x96/0x100 [ 2525.482328] ? copy_mount_options+0x1fa/0x2f0 [ 2525.486806] ? copy_mnt_ns+0xa30/0xa30 [ 2525.490678] SyS_mount+0xa8/0x120 [ 2525.494114] ? copy_mnt_ns+0xa30/0xa30 [ 2525.497981] do_syscall_64+0x1d5/0x640 19:45:38 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r2) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000140)=r2) (async) 19:45:38 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000300)='./file0\x00', 0x8021, 0x0, 0xfe, 0x0, 0x0) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file1\x00'}, 0x10) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x7f) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='\v\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000828bd7000fcdbdf25010000000c1404800500030001000000080001000100000008000100ffffffffa0000c802c000b8008000900e91d833c080009008870fc0d08000a00ae7c0000080009000747451808000900a892865724000b8008000a002ebe0000080009005ca54e0f08000a0015860000080009000545160624000b8008000a000dc10000080001000100bb0208000a00edc9000008000900fc63205a14000b800800090035720b4a08000a000e5f000014000b8008000a00f5fb000009000a002f4f00002c0004800500035cdc6ef55a2f7b7e0300020000000500030000000000050003000200"/246], 0xfc}, 0x1, 0x0, 0x0, 0x10}, 0x0) 19:45:38 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'bfs\x00'}) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r1}, 0x10) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) 19:45:38 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 9) 19:45:38 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000001c0)={0x9, 0x87, 0x80000001, 0x4, 0x7fff}) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000180)=0x3) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2525.501852] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2525.507021] RIP: 0033:0x7f90fc7290c9 [ 2525.510709] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2525.518397] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2525.525646] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2525.532894] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2525.540141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2525.547389] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 19:45:38 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000001c0)={0x10000, 0x7c72}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x2, 0x3, 0xf4c, 0x100, 0x0, [{0x7, 0x2, 0x0, '\x00', 0x81}, {0x77, 0x4, 0x80, '\x00', 0x6}, {0x20, 0x3, 0x9, '\x00', 0x4}, {0x6, 0x5, 0x6, '\x00', 0x5}, {0xf8, 0x9, 0xea, '\x00', 0x1}, {0xff, 0x1, 0x4, '\x00', 0x1}, {0x6, 0x1, 0x81, '\x00', 0x2}, {0x7, 0x93, 0x81, '\x00', 0x86}, {0x7, 0x73, 0x20, '\x00', 0x1}, {0x1, 0x7, 0x7, '\x00', 0xec}, {0x0, 0x7f, 0x9, '\x00', 0x54}, {0x5, 0x2, 0x0, '\x00', 0x6}, {0x8, 0x7d, 0x1f, '\x00', 0x40}, {0x82, 0x0, 0x3, '\x00', 0x3f}, {0x7, 0x1, 0x6, '\x00', 0x16}, {0x2, 0x40, 0xe, '\x00', 0x4}, {0x2, 0xaa, 0x9, '\x00', 0x3f}, {0x4, 0x0, 0x6, '\x00', 0x59}, {0xbf, 0x6, 0x6, '\x00', 0xd4}, {0x8a, 0xe0, 0x3f, '\x00', 0x8}, {0x2, 0x4, 0x6, '\x00', 0x20}, {0x5, 0x80, 0x4}, {0x7, 0x81, 0x20, '\x00', 0x9}, {0x91, 0x7b, 0x1, '\x00', 0x6}]}}) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=0x28) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000240)={0x1, 0x9}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) socket$kcm(0x29, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) linkat(r0, &(0x7f0000000500)='./file0\x00', r1, &(0x7f0000000540)='./file0/file0\x00', 0x1400) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000001c0)={0x10000, 0x7c72}) (async) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x2, 0x3, 0xf4c, 0x100, 0x0, [{0x7, 0x2, 0x0, '\x00', 0x81}, {0x77, 0x4, 0x80, '\x00', 0x6}, {0x20, 0x3, 0x9, '\x00', 0x4}, {0x6, 0x5, 0x6, '\x00', 0x5}, {0xf8, 0x9, 0xea, '\x00', 0x1}, {0xff, 0x1, 0x4, '\x00', 0x1}, {0x6, 0x1, 0x81, '\x00', 0x2}, {0x7, 0x93, 0x81, '\x00', 0x86}, {0x7, 0x73, 0x20, '\x00', 0x1}, {0x1, 0x7, 0x7, '\x00', 0xec}, {0x0, 0x7f, 0x9, '\x00', 0x54}, {0x5, 0x2, 0x0, '\x00', 0x6}, {0x8, 0x7d, 0x1f, '\x00', 0x40}, {0x82, 0x0, 0x3, '\x00', 0x3f}, {0x7, 0x1, 0x6, '\x00', 0x16}, {0x2, 0x40, 0xe, '\x00', 0x4}, {0x2, 0xaa, 0x9, '\x00', 0x3f}, {0x4, 0x0, 0x6, '\x00', 0x59}, {0xbf, 0x6, 0x6, '\x00', 0xd4}, {0x8a, 0xe0, 0x3f, '\x00', 0x8}, {0x2, 0x4, 0x6, '\x00', 0x20}, {0x5, 0x80, 0x4}, {0x7, 0x81, 0x20, '\x00', 0x9}, {0x91, 0x7b, 0x1, '\x00', 0x6}]}}) (async) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=0x28) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000240)={0x1, 0x9}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) (async) socket$kcm(0x29, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) linkat(r0, &(0x7f0000000500)='./file0\x00', r1, &(0x7f0000000540)='./file0/file0\x00', 0x1400) (async) 19:45:38 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000300)='./file0\x00', 0x8021, 0x0, 0xfe, 0x0, 0x0) (async, rerun: 32) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') (rerun: 32) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file1\x00'}, 0x10) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x7f) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='\v\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000828bd7000fcdbdf25010000000c1404800500030001000000080001000100000008000100ffffffffa0000c802c000b8008000900e91d833c080009008870fc0d08000a00ae7c0000080009000747451808000900a892865724000b8008000a002ebe0000080009005ca54e0f08000a0015860000080009000545160624000b8008000a000dc10000080001000100bb0208000a00edc9000008000900fc63205a14000b800800090035720b4a08000a000e5f000014000b8008000a00f5fb000009000a002f4f00002c0004800500035cdc6ef55a2f7b7e0300020000000500030000000000050003000200"/246], 0xfc}, 0x1, 0x0, 0x0, 0x10}, 0x0) 19:45:38 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 11) 19:45:38 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000001c0)={0x9, 0x87, 0x80000001, 0x4, 0x7fff}) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000180)=0x3) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000001c0)={0x9, 0x87, 0x80000001, 0x4, 0x7fff}) (async) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000180)=0x3) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) [ 2525.678673] FAULT_INJECTION: forcing a failure. [ 2525.678673] name failslab, interval 1, probability 0, space 0, times 0 [ 2525.695575] CPU: 0 PID: 22370 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2525.703484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2525.712850] Call Trace: [ 2525.715440] dump_stack+0x1b2/0x281 [ 2525.719075] should_fail.cold+0x10a/0x149 [ 2525.723235] ? nbd_alloc_config+0x180/0x180 19:45:38 executing program 0: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000001c0)={0x9, 0x87, 0x80000001, 0x4, 0x7fff}) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000180)=0x3) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:38 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'bfs\x00'}) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r1}, 0x10) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) (async) openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'bfs\x00'}) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r1}, 0x10) (async) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) (async) 19:45:38 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000001c0)={0x10000, 0x7c72}) (async) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f00000002c0)={0x0, 0x0, @ioapic={0x2, 0x3, 0xf4c, 0x100, 0x0, [{0x7, 0x2, 0x0, '\x00', 0x81}, {0x77, 0x4, 0x80, '\x00', 0x6}, {0x20, 0x3, 0x9, '\x00', 0x4}, {0x6, 0x5, 0x6, '\x00', 0x5}, {0xf8, 0x9, 0xea, '\x00', 0x1}, {0xff, 0x1, 0x4, '\x00', 0x1}, {0x6, 0x1, 0x81, '\x00', 0x2}, {0x7, 0x93, 0x81, '\x00', 0x86}, {0x7, 0x73, 0x20, '\x00', 0x1}, {0x1, 0x7, 0x7, '\x00', 0xec}, {0x0, 0x7f, 0x9, '\x00', 0x54}, {0x5, 0x2, 0x0, '\x00', 0x6}, {0x8, 0x7d, 0x1f, '\x00', 0x40}, {0x82, 0x0, 0x3, '\x00', 0x3f}, {0x7, 0x1, 0x6, '\x00', 0x16}, {0x2, 0x40, 0xe, '\x00', 0x4}, {0x2, 0xaa, 0x9, '\x00', 0x3f}, {0x4, 0x0, 0x6, '\x00', 0x59}, {0xbf, 0x6, 0x6, '\x00', 0xd4}, {0x8a, 0xe0, 0x3f, '\x00', 0x8}, {0x2, 0x4, 0x6, '\x00', 0x20}, {0x5, 0x80, 0x4}, {0x7, 0x81, 0x20, '\x00', 0x9}, {0x91, 0x7b, 0x1, '\x00', 0x6}]}}) (async) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000200)=0x28) (async) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000240)={0x1, 0x9}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) (async) socket$kcm(0x29, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) (async) linkat(r0, &(0x7f0000000500)='./file0\x00', r1, &(0x7f0000000540)='./file0/file0\x00', 0x1400) 19:45:38 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000300)='./file0\x00', 0x8021, 0x0, 0xfe, 0x0, 0x0) (async) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) chroot(&(0x7f0000000000)='./file0\x00') (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file1\x00'}, 0x10) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x7f) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='\v\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000828bd7000fcdbdf25010000000c1404800500030001000000080001000100000008000100ffffffffa0000c802c000b8008000900e91d833c080009008870fc0d08000a00ae7c0000080009000747451808000900a892865724000b8008000a002ebe0000080009005ca54e0f08000a0015860000080009000545160624000b8008000a000dc10000080001000100bb0208000a00edc9000008000900fc63205a14000b800800090035720b4a08000a000e5f000014000b8008000a00f5fb000009000a002f4f00002c0004800500035cdc6ef55a2f7b7e0300020000000500030000000000050003000200"/246], 0xfc}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 2525.727583] should_failslab+0xd6/0x130 [ 2525.731565] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2525.736241] ? lock_downgrade+0x740/0x740 [ 2525.740389] ? nbd_alloc_config+0x180/0x180 [ 2525.744705] nbd_alloc_config+0x5e/0x180 [ 2525.748766] nbd_open+0x23d/0x370 [ 2525.752224] __blkdev_get+0x306/0x1090 [ 2525.756119] ? sb_min_blocksize+0x1d0/0x1d0 [ 2525.760440] blkdev_get+0x441/0x890 [ 2525.764072] ? __blkdev_get+0x1090/0x1090 [ 2525.768254] ? mntput+0x5c/0x80 [ 2525.771544] ? lookup_bdev+0x8c/0x1c0 [ 2525.775341] ? bd_acquire+0x440/0x440 19:45:38 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:38 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) renameat2(r1, &(0x7f00000000c0)='\x00', r0, &(0x7f0000000100)='./file0/file0\x00', 0x2) [ 2525.779150] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 2525.784610] blkdev_get_by_path+0x38/0xa0 [ 2525.788755] mount_bdev+0x4c/0x360 [ 2525.792323] ? lazy_free_sbi+0x80/0x80 [ 2525.796206] mount_fs+0x92/0x2a0 [ 2525.799570] vfs_kern_mount.part.0+0x5b/0x470 [ 2525.804068] do_mount+0xe65/0x2a30 [ 2525.807612] ? lock_acquire+0x170/0x3f0 [ 2525.811592] ? lock_downgrade+0x740/0x740 [ 2525.815776] ? copy_mount_string+0x40/0x40 [ 2525.820009] ? __might_fault+0x177/0x1b0 [ 2525.824069] ? _copy_from_user+0x96/0x100 [ 2525.828211] ? copy_mount_options+0x1fa/0x2f0 [ 2525.832711] ? copy_mnt_ns+0xa30/0xa30 [ 2525.836700] SyS_mount+0xa8/0x120 [ 2525.840148] ? copy_mnt_ns+0xa30/0xa30 [ 2525.844032] do_syscall_64+0x1d5/0x640 [ 2525.847921] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2525.853106] RIP: 0033:0x7f18316fe0c9 [ 2525.856810] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2525.864520] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2525.871817] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 19:45:38 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 10) 19:45:38 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) renameat2(r1, &(0x7f00000000c0)='\x00', r0, &(0x7f0000000100)='./file0/file0\x00', 0x2) 19:45:38 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bfs\x00', 0x0, 0x0) (async, rerun: 32) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (rerun: 32) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'btrfs.', 'bfs\x00'}) (async) read$FUSE(r0, &(0x7f0000002200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0xfffffffffffffffe, r1}, 0x10) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) [ 2525.879083] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2525.886350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2525.893611] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2525.902649] FAULT_INJECTION: forcing a failure. [ 2525.902649] name failslab, interval 1, probability 0, space 0, times 0 [ 2525.920896] CPU: 0 PID: 22386 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 19:45:38 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') [ 2525.928799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2525.938150] Call Trace: [ 2525.940736] dump_stack+0x1b2/0x281 [ 2525.944366] should_fail.cold+0x10a/0x149 [ 2525.948520] should_failslab+0xd6/0x130 [ 2525.952493] __kmalloc+0x2c1/0x400 [ 2525.956037] ? __list_lru_init+0x67/0x710 [ 2525.960188] __list_lru_init+0x67/0x710 [ 2525.964161] sget_userns+0x4e4/0xc10 [ 2525.967869] ? set_bdev_super+0x110/0x110 [ 2525.972018] ? ns_test_super+0x50/0x50 [ 2525.975905] ? set_bdev_super+0x110/0x110 [ 2525.980045] ? ns_test_super+0x50/0x50 [ 2525.983930] sget+0xd1/0x110 [ 2525.986946] mount_bdev+0xcd/0x360 [ 2525.990484] ? lazy_free_sbi+0x80/0x80 [ 2525.994165] FAULT_INJECTION: forcing a failure. [ 2525.994165] name failslab, interval 1, probability 0, space 0, times 0 [ 2525.994366] mount_fs+0x92/0x2a0 [ 2526.008896] vfs_kern_mount.part.0+0x5b/0x470 [ 2526.013392] do_mount+0xe65/0x2a30 [ 2526.016928] ? lock_acquire+0x170/0x3f0 [ 2526.020904] ? lock_downgrade+0x740/0x740 [ 2526.025041] ? copy_mount_string+0x40/0x40 [ 2526.029277] ? __might_fault+0x177/0x1b0 [ 2526.033322] ? _copy_from_user+0x96/0x100 [ 2526.037456] ? copy_mount_options+0x1fa/0x2f0 [ 2526.041939] ? copy_mnt_ns+0xa30/0xa30 [ 2526.045813] SyS_mount+0xa8/0x120 [ 2526.049250] ? copy_mnt_ns+0xa30/0xa30 [ 2526.053142] do_syscall_64+0x1d5/0x640 [ 2526.057022] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2526.062196] RIP: 0033:0x7f90fc7290c9 [ 2526.065907] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2526.073620] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2526.080871] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2526.088122] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2526.095373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2526.102623] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2526.109895] CPU: 1 PID: 22432 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2526.117781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2526.127131] Call Trace: [ 2526.129715] dump_stack+0x1b2/0x281 [ 2526.133341] should_fail.cold+0x10a/0x149 [ 2526.137489] should_failslab+0xd6/0x130 [ 2526.141467] kmem_cache_alloc_trace+0x29a/0x3d0 [ 2526.146145] ? set_bdev_super+0x110/0x110 [ 2526.150285] sget_userns+0x102/0xc10 [ 2526.153992] ? set_bdev_super+0x110/0x110 [ 2526.158146] ? ns_test_super+0x50/0x50 [ 2526.162030] ? set_bdev_super+0x110/0x110 [ 2526.166173] ? ns_test_super+0x50/0x50 [ 2526.170055] sget+0xd1/0x110 [ 2526.173072] mount_bdev+0xcd/0x360 [ 2526.176606] ? lazy_free_sbi+0x80/0x80 [ 2526.180489] mount_fs+0x92/0x2a0 [ 2526.183853] vfs_kern_mount.part.0+0x5b/0x470 [ 2526.188347] do_mount+0xe65/0x2a30 [ 2526.191896] ? lock_acquire+0x170/0x3f0 [ 2526.195864] ? lock_downgrade+0x740/0x740 [ 2526.199988] ? copy_mount_string+0x40/0x40 [ 2526.204201] ? __might_fault+0x177/0x1b0 [ 2526.208260] ? _copy_from_user+0x96/0x100 [ 2526.212385] ? copy_mount_options+0x1fa/0x2f0 [ 2526.218245] ? copy_mnt_ns+0xa30/0xa30 [ 2526.222197] SyS_mount+0xa8/0x120 [ 2526.225952] ? copy_mnt_ns+0xa30/0xa30 [ 2526.229924] do_syscall_64+0x1d5/0x640 [ 2526.233801] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2526.238969] RIP: 0033:0x7f18316fe0c9 [ 2526.242655] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2526.250347] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2526.257601] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2526.264846] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2526.272118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 19:45:39 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 12) 19:45:39 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') 19:45:39 executing program 3: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) renameat2(r1, &(0x7f00000000c0)='\x00', r0, &(0x7f0000000100)='./file0/file0\x00', 0x2) 19:45:39 executing program 0: r0 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) recvfrom$llc(r0, &(0x7f0000000140)=""/160, 0xa0, 0x20, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:39 executing program 5: ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) 19:45:39 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 11) [ 2526.279450] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 19:45:39 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x101, 0x7, 0x57, 0x8, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}}, 0x10) 19:45:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'user.', ')}\x99\x00'}, &(0x7f0000000100)=""/212, 0xd4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) 19:45:39 executing program 5: ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (async) 19:45:39 executing program 0: r0 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) recvfrom$llc(r0, &(0x7f0000000140)=""/160, 0xa0, 0x20, 0x0, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 2526.411491] FAULT_INJECTION: forcing a failure. [ 2526.411491] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.423983] FAULT_INJECTION: forcing a failure. [ 2526.423983] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.444448] CPU: 0 PID: 22455 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2526.452351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 19:45:39 executing program 0: r0 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) recvfrom$llc(r0, &(0x7f0000000140)=""/160, 0xa0, 0x20, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) accept4$llc(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) (async) recvfrom$llc(r0, &(0x7f0000000140)=""/160, 0xa0, 0x20, 0x0, 0x0) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) (async) [ 2526.461698] Call Trace: [ 2526.464285] dump_stack+0x1b2/0x281 [ 2526.467918] should_fail.cold+0x10a/0x149 [ 2526.472066] should_failslab+0xd6/0x130 [ 2526.476044] __kmalloc+0x2c1/0x400 [ 2526.479586] ? __list_lru_init+0x67/0x710 [ 2526.483729] __list_lru_init+0x67/0x710 [ 2526.487699] sget_userns+0x504/0xc10 [ 2526.493268] ? set_bdev_super+0x110/0x110 [ 2526.497411] ? ns_test_super+0x50/0x50 [ 2526.501283] ? set_bdev_super+0x110/0x110 [ 2526.505414] ? ns_test_super+0x50/0x50 [ 2526.509279] sget+0xd1/0x110 [ 2526.512281] mount_bdev+0xcd/0x360 [ 2526.515815] ? lazy_free_sbi+0x80/0x80 [ 2526.519684] mount_fs+0x92/0x2a0 [ 2526.523034] vfs_kern_mount.part.0+0x5b/0x470 [ 2526.527527] do_mount+0xe65/0x2a30 [ 2526.531049] ? lock_acquire+0x170/0x3f0 [ 2526.535005] ? lock_downgrade+0x740/0x740 [ 2526.539144] ? copy_mount_string+0x40/0x40 [ 2526.543360] ? __might_fault+0x177/0x1b0 [ 2526.547410] ? _copy_from_user+0x96/0x100 [ 2526.551540] ? copy_mount_options+0x1fa/0x2f0 [ 2526.556276] ? copy_mnt_ns+0xa30/0xa30 [ 2526.560145] SyS_mount+0xa8/0x120 [ 2526.563578] ? copy_mnt_ns+0xa30/0xa30 [ 2526.567474] do_syscall_64+0x1d5/0x640 [ 2526.571347] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2526.576514] RIP: 0033:0x7f90fc7290c9 [ 2526.580205] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2526.587893] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2526.595160] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2526.602410] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2526.609833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2526.617100] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2526.624363] CPU: 1 PID: 22457 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2526.632246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2526.641600] Call Trace: [ 2526.644185] dump_stack+0x1b2/0x281 [ 2526.647831] should_fail.cold+0x10a/0x149 [ 2526.651982] should_failslab+0xd6/0x130 [ 2526.655954] __kmalloc+0x2c1/0x400 19:45:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'user.', ')}\x99\x00'}, &(0x7f0000000100)=""/212, 0xd4) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) [ 2526.659491] ? __list_lru_init+0x67/0x710 [ 2526.663641] __list_lru_init+0x67/0x710 [ 2526.667621] sget_userns+0x4e4/0xc10 [ 2526.671340] ? set_bdev_super+0x110/0x110 [ 2526.675511] ? ns_test_super+0x50/0x50 [ 2526.679393] ? set_bdev_super+0x110/0x110 [ 2526.683536] ? ns_test_super+0x50/0x50 [ 2526.687416] sget+0xd1/0x110 [ 2526.690428] mount_bdev+0xcd/0x360 [ 2526.693961] ? lazy_free_sbi+0x80/0x80 [ 2526.697854] mount_fs+0x92/0x2a0 [ 2526.701212] vfs_kern_mount.part.0+0x5b/0x470 [ 2526.705698] do_mount+0xe65/0x2a30 [ 2526.709236] ? lock_acquire+0x170/0x3f0 [ 2526.713188] ? lock_downgrade+0x740/0x740 [ 2526.717317] ? copy_mount_string+0x40/0x40 [ 2526.721538] ? __might_fault+0x177/0x1b0 [ 2526.725590] ? _copy_from_user+0x96/0x100 [ 2526.729715] ? copy_mount_options+0x1fa/0x2f0 [ 2526.734185] ? copy_mnt_ns+0xa30/0xa30 [ 2526.738048] SyS_mount+0xa8/0x120 [ 2526.741483] ? copy_mnt_ns+0xa30/0xa30 [ 2526.745361] do_syscall_64+0x1d5/0x640 [ 2526.749278] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2526.754454] RIP: 0033:0x7f18316fe0c9 19:45:39 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 13) 19:45:39 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x101, 0x7, 0x57, 0x8, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}}, 0x10) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) (async) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x101, 0x7, 0x57, 0x8, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}}, 0x10) (async) 19:45:39 executing program 5: ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000080)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) (async, rerun: 64) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) 19:45:39 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'user.', ')}\x99\x00'}, &(0x7f0000000100)=""/212, 0xd4) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'user.', ')}\x99\x00'}, &(0x7f0000000100)=""/212, 0xd4) (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) (async) 19:45:39 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername(r1, &(0x7f0000000140)=@nl, &(0x7f00000001c0)=0x80) mmap$KVM_VCPU(&(0x7f0000ffb000/0x5000)=nil, 0x930, 0x2, 0x10, r0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:39 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hpfs\x00', 0x0, 0x0) (fail_nth: 12) [ 2526.758146] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2526.765833] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2526.773084] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2526.780337] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2526.787585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2526.794850] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 19:45:39 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) (async) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername(r1, &(0x7f0000000140)=@nl, &(0x7f00000001c0)=0x80) (async) mmap$KVM_VCPU(&(0x7f0000ffb000/0x5000)=nil, 0x930, 0x2, 0x10, r0, 0x0) (async) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 19:45:39 executing program 4: r0 = syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x0, &(0x7f0000000100)=')\'(\x00\xc6[p\x82A\x99\xaf\xa6\x8c\xaeM\xc7`zE\xd8\x1c\xce\x04\x96M\xe8\xe1\"\xca\x97\x031\x87\xde$\xf9\xf9k\x99dQk\x9d\xbe\xa3\x89\xee\x91\x8d\xa5}\xf4b<\xf5:\xef\xb9!Tg\x90|\xe6/Z\xfe\xfd\xa2\x19\xd1\x17\xa9\x055\xa1\xd1\xd2bmq\x95\x81I\xff\xd9\x84\xdf\x85\xe2\x9aXw\xe1\x7f\x86\xe2\xf31\x04\x87\x8feh\xc3\x99gd\x8c\xe3\xfcI.<\xef\xbdl\x9d\x04\xf8\xe0\xb1\xc7I\xf0w\x1e\x90#\x8d^\x02\xde\xc54o3\xc0\x91\xe7\x9b;yu\xf8~7\xc2\x8d\x8a1S\xed\x16T\xa6\xdb\xb0\x15\xdfWB\xb2\f\xd5\xd2\xa1\x15\xe9') ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x101, 0x7, 0x57, 0x8, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}}, 0x10) 19:45:39 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) 19:45:39 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "7dba881476e07e3891127b61bb3548915d4d351de64101b7c2e74e941d786f3fa32530b7f11d66badd964e6c522f96cbeae9e65673630c2a09b05ec680a7bf40", 0x2a}, 0x48, 0xfffffffffffffff8) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/../file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) [ 2526.902935] FAULT_INJECTION: forcing a failure. [ 2526.902935] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.921342] CPU: 0 PID: 22493 Comm: syz-executor.1 Not tainted 4.14.304-syzkaller #0 [ 2526.928442] FAULT_INJECTION: forcing a failure. [ 2526.928442] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.929240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2526.929244] Call Trace: 19:45:39 executing program 3: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "7dba881476e07e3891127b61bb3548915d4d351de64101b7c2e74e941d786f3fa32530b7f11d66badd964e6c522f96cbeae9e65673630c2a09b05ec680a7bf40", 0x2a}, 0x48, 0xfffffffffffffff8) (async) syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0/../file0\x00') (async) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='vxfs\x00', 0x0, 0x0) [ 2526.929260] dump_stack+0x1b2/0x281 [ 2526.929275] should_fail.cold+0x10a/0x149 [ 2526.929293] should_failslab+0xd6/0x130 [ 2526.964246] __kmalloc+0x2c1/0x400 [ 2526.967776] ? __list_lru_init+0x67/0x710 [ 2526.971913] __list_lru_init+0x67/0x710 [ 2526.975883] sget_userns+0x504/0xc10 [ 2526.979584] ? set_bdev_super+0x110/0x110 [ 2526.983720] ? ns_test_super+0x50/0x50 [ 2526.987598] ? set_bdev_super+0x110/0x110 [ 2526.991731] ? ns_test_super+0x50/0x50 [ 2526.995606] sget+0xd1/0x110 [ 2526.998610] mount_bdev+0xcd/0x360 [ 2527.002137] ? lazy_free_sbi+0x80/0x80 [ 2527.006017] mount_fs+0x92/0x2a0 [ 2527.009377] vfs_kern_mount.part.0+0x5b/0x470 [ 2527.013863] do_mount+0xe65/0x2a30 [ 2527.017397] ? lock_acquire+0x170/0x3f0 [ 2527.021364] ? lock_downgrade+0x740/0x740 [ 2527.025509] ? copy_mount_string+0x40/0x40 [ 2527.029730] ? __might_fault+0x177/0x1b0 [ 2527.033781] ? _copy_from_user+0x96/0x100 [ 2527.037924] ? copy_mount_options+0x1fa/0x2f0 [ 2527.042408] ? copy_mnt_ns+0xa30/0xa30 [ 2527.046286] SyS_mount+0xa8/0x120 [ 2527.049721] ? copy_mnt_ns+0xa30/0xa30 [ 2527.053591] do_syscall_64+0x1d5/0x640 [ 2527.057465] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2527.062634] RIP: 0033:0x7f18316fe0c9 [ 2527.066325] RSP: 002b:00007f182fc70168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2527.074011] RAX: ffffffffffffffda RBX: 00007f183181df80 RCX: 00007f18316fe0c9 [ 2527.081260] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2527.088508] RBP: 00007f182fc701d0 R08: 0000000000000000 R09: 0000000000000000 [ 2527.095755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2527.103006] R13: 00007fff95e45aff R14: 00007f182fc70300 R15: 0000000000022000 [ 2527.110271] CPU: 1 PID: 22492 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2527.118151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2527.127499] Call Trace: [ 2527.130084] dump_stack+0x1b2/0x281 [ 2527.133710] should_fail.cold+0x10a/0x149 [ 2527.137855] should_failslab+0xd6/0x130 [ 2527.141824] __kmalloc+0x2c1/0x400 [ 2527.145402] ? register_shrinker+0x1ab/0x220 [ 2527.149807] register_shrinker+0x1ab/0x220 [ 2527.154034] sget_userns+0x9aa/0xc10 [ 2527.157740] ? set_bdev_super+0x110/0x110 [ 2527.161893] ? ns_test_super+0x50/0x50 [ 2527.165779] ? set_bdev_super+0x110/0x110 [ 2527.169926] ? ns_test_super+0x50/0x50 [ 2527.173806] sget+0xd1/0x110 [ 2527.176818] mount_bdev+0xcd/0x360 [ 2527.180352] ? lazy_free_sbi+0x80/0x80 [ 2527.184230] mount_fs+0x92/0x2a0 [ 2527.187604] vfs_kern_mount.part.0+0x5b/0x470 [ 2527.192098] do_mount+0xe65/0x2a30 [ 2527.195633] ? lock_acquire+0x170/0x3f0 [ 2527.199600] ? lock_downgrade+0x740/0x740 19:45:39 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000002200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bfs\x00', 0x0, 0x0) (rerun: 64) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) [ 2527.203756] ? copy_mount_string+0x40/0x40 [ 2527.207992] ? __might_fault+0x177/0x1b0 [ 2527.212048] ? _copy_from_user+0x96/0x100 [ 2527.216193] ? copy_mount_options+0x1fa/0x2f0 [ 2527.220682] ? copy_mnt_ns+0xa30/0xa30 [ 2527.224563] SyS_mount+0xa8/0x120 [ 2527.228009] ? copy_mnt_ns+0xa30/0xa30 [ 2527.231894] do_syscall_64+0x1d5/0x640 [ 2527.235779] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2527.240959] RIP: 0033:0x7f90fc7290c9 [ 2527.244664] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2527.252377] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2527.259626] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2527.267076] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2527.274340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2527.281600] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2527.294196] ------------[ cut here ]------------ [ 2527.299058] WARNING: CPU: 1 PID: 22492 at fs/super.c:1163 kill_block_super+0xbe/0xe0 [ 2527.306929] Kernel panic - not syncing: panic_on_warn set ... [ 2527.306929] [ 2527.314299] CPU: 1 PID: 22492 Comm: syz-executor.2 Not tainted 4.14.304-syzkaller #0 [ 2527.322161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 2527.331599] Call Trace: [ 2527.334170] dump_stack+0x1b2/0x281 [ 2527.337798] panic+0x1f9/0x42d [ 2527.340976] ? add_taint.cold+0x16/0x16 [ 2527.344999] ? kill_block_super+0xbe/0xe0 [ 2527.349126] ? __warn.cold+0x5/0x44 [ 2527.352735] ? kill_block_super+0xbe/0xe0 [ 2527.356865] __warn.cold+0x20/0x44 [ 2527.360477] ? ist_end_non_atomic+0x10/0x10 [ 2527.364816] ? kill_block_super+0xbe/0xe0 [ 2527.368967] report_bug+0x208/0x250 [ 2527.372577] do_error_trap+0x195/0x2d0 [ 2527.376453] ? math_error+0x2d0/0x2d0 [ 2527.380262] ? retint_kernel+0x2d/0x2d [ 2527.384130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2527.388964] invalid_op+0x1b/0x40 [ 2527.392398] RIP: 0010:kill_block_super+0xbe/0xe0 [ 2527.397130] RSP: 0018:ffff8880afd9fbc8 EFLAGS: 00010246 [ 2527.402488] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900070c6000 [ 2527.409750] RDX: 0000000000040000 RSI: ffffffff8187781e RDI: ffff88808ff25530 [ 2527.417022] RBP: ffff888087cd6900 R08: ffffffff8b9b4f38 R09: 0000000000000001 [ 2527.424276] R10: 0000000000000000 R11: ffff8880a5c16100 R12: ffff88808ff25080 [ 2527.431521] R13: ffffffff891aa470 R14: ffffffff88f45bc0 R15: dffffc0000000000 [ 2527.440086] ? kill_block_super+0xbe/0xe0 [ 2527.444212] ? kill_block_super+0xbe/0xe0 [ 2527.448337] deactivate_locked_super+0x6c/0xd0 [ 2527.453157] sget_userns+0x9c4/0xc10 [ 2527.457199] ? set_bdev_super+0x110/0x110 [ 2527.461331] ? ns_test_super+0x50/0x50 [ 2527.465196] ? set_bdev_super+0x110/0x110 [ 2527.469319] ? ns_test_super+0x50/0x50 [ 2527.473178] sget+0xd1/0x110 [ 2527.476183] mount_bdev+0xcd/0x360 [ 2527.479734] ? lazy_free_sbi+0x80/0x80 [ 2527.483596] mount_fs+0x92/0x2a0 [ 2527.486963] vfs_kern_mount.part.0+0x5b/0x470 [ 2527.491435] do_mount+0xe65/0x2a30 [ 2527.494964] ? lock_acquire+0x170/0x3f0 [ 2527.498922] ? lock_downgrade+0x740/0x740 [ 2527.503051] ? copy_mount_string+0x40/0x40 [ 2527.507300] ? __might_fault+0x177/0x1b0 [ 2527.511346] ? _copy_from_user+0x96/0x100 [ 2527.515478] ? copy_mount_options+0x1fa/0x2f0 [ 2527.519964] ? copy_mnt_ns+0xa30/0xa30 [ 2527.523827] SyS_mount+0xa8/0x120 [ 2527.527256] ? copy_mnt_ns+0xa30/0xa30 [ 2527.531131] do_syscall_64+0x1d5/0x640 [ 2527.535009] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 2527.540190] RIP: 0033:0x7f90fc7290c9 [ 2527.543875] RSP: 002b:00007f90fac9b168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2527.551573] RAX: ffffffffffffffda RBX: 00007f90fc848f80 RCX: 00007f90fc7290c9 [ 2527.558822] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000080 [ 2527.566065] RBP: 00007f90fac9b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2527.573316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2527.580567] R13: 00007ffe969f57ff R14: 00007f90fac9b300 R15: 0000000000022000 [ 2527.588161] Kernel Offset: disabled [ 2527.591854] Rebooting in 86400 seconds..