0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{0x0}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xf6ffffff}}, 0x24, 0x0) 06:14:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x3}}, 0x24, 0x0) [ 599.305610][T31893] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x0) 06:14:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x8}}, 0x24, 0x0) [ 599.431289][T31910] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x10}}, 0x24, 0x0) 06:14:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x2}}, 0x24, 0x0) [ 599.653523][T31923] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 599.768719][T31923] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:14:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x3}}, 0x24, 0x0) 06:14:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{0x0}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xfeffffff}}, 0x24, 0x0) 06:14:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x7}}, 0x24, 0x0) 06:14:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x300}}, 0x24, 0x0) 06:14:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x700}}, 0x24, 0x0) 06:14:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x4000}}, 0x24, 0x0) 06:14:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x1000000}}, 0x24, 0x0) 06:14:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xffffff8c}}, 0x24, 0x0) 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x2000000}}, 0x24, 0x0) [ 601.162178][T31987] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x3000000}}, 0x24, 0x0) 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x7000000}}, 0x24, 0x0) 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x40000000}}, 0x24, 0x0) [ 601.319626][T32007] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x8cffffff}}, 0x24, 0x0) 06:14:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:14:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xf6ffffff}}, 0x24, 0x0) 06:14:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xf9', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xffffffeb}}, 0x24, 0x0) 06:14:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfeffffff}}, 0x24, 0x0) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xffffff8c}}, 0x24, 0x0) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfffffff6}}, 0x24, 0x0) 06:14:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xfd', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfffffffe}}, 0x24, 0x0) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x100000000000000}}, 0x24, 0x0) 06:14:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x200000000000000}}, 0x24, 0x0) 06:14:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x7f', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xfffffff6}}, 0x24, 0x0) 06:14:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x300000000000000}}, 0x24, 0x0) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x700000000000000}}, 0x24, 0x0) 06:14:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x8c', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x4000000000000000}}, 0x24, 0x0) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x8cffffff00000000}}, 0x24, 0x0) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xf6ffffff00000000}}, 0x24, 0x0) 06:14:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000020000000000"], 0x24, 0x0) 06:14:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xeb', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfeffffff00000000}}, 0x24, 0x0) 06:14:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xfffffffe}}, 0x24, 0x0) 06:14:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xffffffff00000000}}, 0x24, 0x0) 06:14:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x2}}, 0x24, 0x0) 06:14:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xf6', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x3}}, 0x24, 0x0) 06:14:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x7}}, 0x24, 0x0) 06:14:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x300}}, 0x24, 0x0) 06:14:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000030000000000"], 0x24, 0x0) 06:14:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xfe', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x700}}, 0x24, 0x0) 06:14:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x1000000000000}}, 0x24, 0x0) 06:14:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x4000}}, 0x24, 0x0) 06:14:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x1000000}}, 0x24, 0x0) 06:14:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x2000000}}, 0x24, 0x0) 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x3000000}}, 0x24, 0x0) [ 605.116993][T32195] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x7000000}}, 0x24, 0x0) [ 605.233663][T32204] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000070000000000"], 0x24, 0x0) 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x40000000}}, 0x24, 0x0) 06:14:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x100000000000000}}, 0x24, 0x0) 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x8cffffff}}, 0x24, 0x0) [ 605.843091][T32215] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xf6ffffff}}, 0x24, 0x0) 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfeffffff}}, 0x24, 0x0) [ 605.988760][T32235] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xffffff8c}}, 0x24, 0x0) 06:14:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xaf', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfffffff6}}, 0x24, 0x0) 06:14:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000300000000"], 0x24, 0x0) 06:14:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfffffffe}}, 0x24, 0x0) 06:14:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x200000000000000}}, 0x24, 0x0) 06:14:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x100000000000000}}, 0x24, 0x0) [ 606.779967][T32265] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x200000000000000}}, 0x24, 0x0) 06:14:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x300000000000000}}, 0x24, 0x0) [ 606.930063][T32282] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x700000000000000}}, 0x24, 0x0) 06:14:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x4000000000000000}}, 0x24, 0x0) [ 607.129678][T32295] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 607.269639][T32301] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000700000000"], 0x24, 0x0) 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x8cffffff00000000}}, 0x24, 0x0) 06:14:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x300000000000000}}, 0x24, 0x0) 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xf6ffffff00000000}}, 0x24, 0x0) [ 607.698804][T32307] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfeffffff00000000}}, 0x24, 0x0) 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xffffffff00000000}}, 0x24, 0x0) [ 607.848276][T32327] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:14:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x4}}, 0x24, 0x0) 06:14:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 608.055861][T32343] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 608.184492][T32346] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x8}}, 0x24, 0x0) 06:14:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000003f00000000"], 0x24, 0x0) 06:14:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x700000000000000}}, 0x24, 0x0) 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x17}}, 0x24, 0x0) [ 608.662888][T32362] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x2}}, 0x24, 0x0) 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x3}}, 0x24, 0x0) [ 608.798422][T32376] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x7}}, 0x24, 0x0) 06:14:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x300}}, 0x24, 0x0) 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x700}}, 0x24, 0x0) [ 608.997471][T32386] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x4000}}, 0x24, 0x0) [ 609.105652][T32395] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:14:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x1000000}}, 0x24, 0x0) 06:14:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000004000000000"], 0x24, 0x0) 06:14:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x4000000000000000}}, 0x24, 0x0) 06:14:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x2000000}}, 0x24, 0x0) 06:14:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x3000000}}, 0x24, 0x0) 06:14:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x7000000}}, 0x24, 0x0) [ 609.599455][T32415] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x40000000}}, 0x24, 0x0) [ 609.702812][T32428] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x8cffffff}}, 0x24, 0x0) 06:14:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 609.944234][T32441] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 610.051785][T32444] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) 06:14:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xf6ffffff}}, 0x24, 0x0) 06:14:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000010000"], 0x24, 0x0) 06:14:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xfeffffff}}, 0x24, 0x0) 06:14:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x8cffffff00000000}}, 0x24, 0x0) 06:14:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xffffff8c}}, 0x24, 0x0) [ 610.508722][T32455] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xfffffff6}}, 0x24, 0x0) 06:14:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xfffffffe}}, 0x24, 0x0) [ 610.647659][T32472] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x100000000000000}}, 0x24, 0x0) 06:14:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 610.848103][T32485] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 610.982496][T32488] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x200000000000000}}, 0x24, 0x0) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x300000000000000}}, 0x24, 0x0) 06:14:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000020000"], 0x24, 0x0) 06:14:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xebffffff00000000}}, 0x24, 0x0) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x700000000000000}}, 0x24, 0x0) [ 611.459801][T32502] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x4000000000000000}}, 0x24, 0x0) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x8cffffff00000000}}, 0x24, 0x0) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xf6ffffff00000000}}, 0x24, 0x0) [ 611.595991][T32521] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xfeffffff00000000}}, 0x24, 0x0) 06:14:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) 06:14:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0xffffffff00000000}}, 0x24, 0x0) 06:14:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x2}}, 0x24, 0x0) [ 612.058520][T32534] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 612.171247][T32546] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000030000"], 0x24, 0x0) 06:14:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x3}}, 0x24, 0x0) 06:14:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xf6ffffff00000000}}, 0x24, 0x0) 06:14:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x7}}, 0x24, 0x0) 06:14:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x300}}, 0x24, 0x0) [ 612.387974][T32560] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x700}}, 0x24, 0x0) [ 612.527789][T32574] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x4000}}, 0x24, 0x0) 06:14:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @empty}, 0x1c) 06:14:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x1000000}}, 0x24, 0x0) [ 612.929686][T32583] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) [ 613.057146][T32593] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000070000"], 0x24, 0x0) 06:14:45 executing program 2: 06:14:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x2000000}}, 0x24, 0x0) 06:14:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xfeffffff00000000}}, 0x24, 0x0) 06:14:45 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unlink(&(0x7f0000000180)='./file0\x00') clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000100000000000000010000000000000008000020", @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x2c, 0x0) close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) 06:14:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x3000000}}, 0x24, 0x0) 06:14:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x7000000}}, 0x24, 0x0) [ 613.351980][T32607] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x40000000}}, 0x24, 0x0) [ 613.459081][T32621] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x8cffffff}}, 0x24, 0x0) 06:14:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 613.662199][T32637] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 613.796701][T32640] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000003f0000"], 0x24, 0x0) 06:14:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xf6ffffff}}, 0x24, 0x0) 06:14:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f00000002c0)='ppp0.@#user{-\x00\xf1\x02\x18\\\xc2@s\xf1\x15', 0xfffffffffffffffe) 06:14:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xffffffff00000000}}, 0x24, 0x0) 06:14:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xfeffffff}}, 0x24, 0x0) [ 614.240853][T32654] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) pipe2(0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, &(0x7f0000000440)="0f06cf66b9520900000f32f2f20f009859820fc71d66b9450200000f320f01c866b9b60b000066b80090000066ba000000000f30266467660f3880af0c00000066b95202000066b80500000066ba000000000f30", 0x54}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:14:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xffffff8c}}, 0x24, 0x0) [ 614.365843][T32670] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xfffffff6}}, 0x24, 0x0) 06:14:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100001000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 06:14:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 614.643782][T32686] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) [ 614.774595][T32689] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000400000"], 0x24, 0x0) 06:14:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xfffffffe}}, 0x24, 0x0) 06:14:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x2}}, 0x24, 0x0) 06:14:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:14:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x100000000000000}}, 0x24, 0x0) [ 615.210715][T32702] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x200000000000000}}, 0x24, 0x0) 06:14:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x8}}, 0x24, 0x0) 06:14:47 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) 06:14:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x17}}, 0x24, 0x0) 06:14:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x300000000000000}}, 0x24, 0x0) [ 615.343287][T32716] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) 06:14:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000ffffff8c0000"], 0x24, 0x0) 06:14:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x700000000000000}}, 0x24, 0x0) 06:14:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x2}}, 0x24, 0x0) 06:14:47 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) 06:14:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x4000000000000000}}, 0x24, 0x0) 06:14:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0x8cffffff00000000}}, 0x24, 0x0) 06:14:48 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) [ 616.119607][T32749] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xf6ffffff00000000}}, 0x24, 0x0) 06:14:48 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) [ 616.267091][T32764] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(0x0, &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) [ 616.437270][ T305] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 616.565362][ T310] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000ffffffeb0000"], 0x24, 0x0) 06:14:48 executing program 2: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000640), 0x12) 06:14:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xfeffffff00000000}}, 0x24, 0x0) 06:14:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x3}}, 0x24, 0x0) 06:14:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x10, 0x0, 0xffffffff00000000}}, 0x24, 0x0) 06:14:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x2}}, 0x24, 0x0) 06:14:49 executing program 2: [ 617.064470][ T323] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x4}}, 0x24, 0x0) 06:14:49 executing program 2: 06:14:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x8}}, 0x24, 0x0) [ 617.212447][ T337] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) 06:14:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000fffffff60000"], 0x24, 0x0) 06:14:49 executing program 2: 06:14:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:14:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x7}}, 0x24, 0x0) 06:14:49 executing program 2: 06:14:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x2}}, 0x24, 0x0) [ 617.977856][ T357] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:49 executing program 2: 06:14:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x3}}, 0x24, 0x0) 06:14:50 executing program 2: 06:14:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) [ 618.131691][ T371] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x7}}, 0x24, 0x0) 06:14:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000fffffffe0000"], 0x24, 0x0) 06:14:50 executing program 2: 06:14:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x300}}, 0x24, 0x0) 06:14:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x300}}, 0x24, 0x0) 06:14:50 executing program 2: [ 618.923331][ T389] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x700}}, 0x24, 0x0) 06:14:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x700}}, 0x24, 0x0) 06:14:50 executing program 2: 06:14:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x1, 0x0) 06:14:50 executing program 2: [ 619.040822][ T402] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x4000}}, 0x24, 0x0) 06:14:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020008cffffff0000"], 0x24, 0x0) 06:14:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x4000}}, 0x24, 0x0) 06:14:51 executing program 2: 06:14:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x1000000}}, 0x24, 0x0) 06:14:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:51 executing program 2: 06:14:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 06:14:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x2000000}}, 0x24, 0x0) 06:14:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x1000000}}, 0x24, 0x0) [ 619.925823][ T428] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000001640)=""/212, 0xd4}, {0x0}], 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x10201, 0x2, 0x0, 0x800e0051d) shutdown(r2, 0x0) 06:14:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x3000000}}, 0x24, 0x0) 06:14:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x7000000}}, 0x24, 0x0) [ 620.074341][ T450] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x40000000}}, 0x24, 0x0) 06:14:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000ebffffff0000"], 0x24, 0x0) 06:14:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x53, &(0x7f0000000040)={0x0, {{0x10, 0x2}}, {{0x10, 0x2}}}, 0x118) recvfrom$inet(r0, 0x0, 0x10201, 0x2, 0x0, 0x800e0051d) shutdown(r0, 0x0) 06:14:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 06:14:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x2000000}}, 0x24, 0x0) 06:14:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x8cffffff}}, 0x24, 0x0) [ 620.902294][ T470] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xf6ffffff}}, 0x24, 0x0) 06:14:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1}, 0x42) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) poll(0x0, 0x0, 0x4e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x103bd, 0x0, 0x0, 0x800e0051f) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r3, &(0x7f0000002800)=[{&(0x7f0000000180)=""/109, 0x6d}, {0x0}], 0x2) shutdown(r2, 0x0) shutdown(r1, 0x0) 06:14:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xfeffffff}}, 0x24, 0x0) [ 621.032008][ T484] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xffffff8c}}, 0x24, 0x0) 06:14:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xfffffff6}}, 0x24, 0x0) [ 621.196656][ T501] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xfffffffe}}, 0x24, 0x0) [ 621.342885][ T510] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000f6ffffff0000"], 0x24, 0x0) 06:14:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f00000001c0)=""/211, 0xd3}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x3}, 0x10) recvfrom$inet(r2, 0x0, 0x9457, 0x0, 0x0, 0x800e00529) shutdown(r1, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcbd, 0x0, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0x46e4, 0x0, 0x0, 0x800e0051e) shutdown(r2, 0x0) 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x100000000000000}}, 0x24, 0x0) 06:14:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 06:14:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x3000000}}, 0x24, 0x0) 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x200000000000000}}, 0x24, 0x0) [ 621.821611][ T521] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x300000000000000}}, 0x24, 0x0) 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x700000000000000}}, 0x24, 0x0) [ 621.946925][ T541] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:53 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000002500)={0x0, 0x0, 0x0}, 0x0) poll(&(0x7f0000000000), 0x2, 0x8020000000047) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) lseek(r0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x7760cef5, 0x40042, 0x0, 0x800e00510) shutdown(r0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 06:14:53 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x4000000000000000}}, 0x24, 0x0) 06:14:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 622.154381][ T558] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 622.264224][ T563] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000feffffff0000"], 0x24, 0x0) 06:14:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x8cffffff00000000}}, 0x24, 0x0) 06:14:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f00000001c0)=""/211, 0xd3}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000000)={0x3}, 0x10) recvfrom$inet(r2, 0x0, 0x9457, 0x0, 0x0, 0x800e00529) shutdown(r1, 0x0) recvfrom$inet(r2, &(0x7f0000000040)=""/181, 0xb5, 0x42, 0x0, 0x0) shutdown(r2, 0x0) 06:14:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) 06:14:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x7000000}}, 0x24, 0x0) 06:14:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xf6ffffff00000000}}, 0x24, 0x0) [ 622.757142][ T577] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xfeffffff00000000}}, 0x24, 0x0) 06:14:54 executing program 2: 06:14:54 executing program 2: 06:14:54 executing program 2: [ 622.889730][ T592] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0xffffffff00000000}}, 0x24, 0x0) 06:14:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x2}}, 0x24, 0x0) 06:14:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 06:14:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) 06:14:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x40000000}}, 0x24, 0x0) 06:14:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x3}}, 0x24, 0x0) 06:14:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x7}}, 0x24, 0x0) [ 623.809909][ T615] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:55 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r0) 06:14:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x300}}, 0x24, 0x0) 06:14:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x700}}, 0x24, 0x0) [ 624.035559][ T632] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x4000}}, 0x24, 0x0) [ 624.087298][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 624.119747][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 624.169670][ T637] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 624.338865][ T637] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 624.392637][ T637] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 06:14:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x1000000}}, 0x24, 0x0) 06:14:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x100002002) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 06:14:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[], 0x0, 0x0) 06:14:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x8cffffff}}, 0x24, 0x0) 06:14:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x2000000}}, 0x24, 0x0) 06:14:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$evdev(0xffffffffffffffff, 0x0, 0x0) 06:14:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xebffffff}}, 0x24, 0x0) [ 624.698901][ T655] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x3000000}}, 0x24, 0x0) 06:14:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xf6ffffff}}, 0x24, 0x0) 06:14:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)=ANY=[@ANYBLOB="02030000100000000000000000000000010018000000000005000600000000000a0000000000000000000000000000000000eb0000000000000000000000000001001500000000000200010000000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000ff0000000000000000"], 0x80}}, 0x0) [ 624.839266][ T677] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x7000000}}, 0x24, 0x0) 06:14:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xfeffffff}}, 0x24, 0x0) 06:14:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:57 executing program 2: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000000)="01ff46d9", 0x4, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0xf3, 0x0) 06:14:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB], 0x1, 0x0) 06:14:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x40000000}}, 0x24, 0x0) 06:14:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xffffff8c}}, 0x24, 0x0) 06:14:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='@'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) [ 625.670293][ T698] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='sit0\x00\x00\x00\x00\b\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x34, 0x2b4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x366, 0x0, 0x0, 0xfffffffffffffe7c) 06:14:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x8cffffff}}, 0x24, 0x0) 06:14:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xffffffeb}}, 0x24, 0x0) [ 625.819597][ T724] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:58 executing program 2: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f00000003c0)=""/28, 0xfffffefa) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x201000000bf, @time}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000180)={0x1000, 0x0, 'client1\x00', 0x0, "b807113a7d854595", "0a73977d3fe04667073e53446da71112c16e305b63421a96724cd62fbd765e9d"}) tkill(r0, 0x1000000000013) 06:14:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xfffffff6}}, 0x24, 0x0) 06:14:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xf6ffffff}}, 0x24, 0x0) 06:14:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB], 0x1, 0x0) 06:14:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xfeffffff}}, 0x24, 0x0) 06:14:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xfffffffe}}, 0x24, 0x0) [ 626.576621][ T740] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xffffff8c}}, 0x24, 0x0) 06:14:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x1000000000000}}, 0x24, 0x0) 06:14:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xfffffff6}}, 0x24, 0x0) [ 626.693585][ T761] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xfffffffe}}, 0x24, 0x0) 06:14:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:14:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:14:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x100000000000000}}, 0x24, 0x0) 06:14:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB], 0x1, 0x0) 06:14:59 executing program 2: 06:14:59 executing program 2: 06:14:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x200000000000000}}, 0x24, 0x0) 06:14:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x100000000000000}}, 0x24, 0x0) 06:14:59 executing program 2: [ 627.511587][ T786] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:14:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x300000000000000}}, 0x24, 0x0) 06:14:59 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400f36d0000000001000000000000eff24d8238cfa47e23f7ef", 0x4c}], 0x1}, 0x0) 06:14:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x700000000000000}}, 0x24, 0x0) [ 627.654241][ T800] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 627.676093][ T808] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 06:15:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:00 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000280)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) 06:15:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x4000000000000000}}, 0x24, 0x0) 06:15:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000"], 0x1, 0x0) 06:15:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0x8cffffff00000000}}, 0x24, 0x0) 06:15:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x700, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 628.431693][ T822] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x200000000000000}}, 0x24, 0x0) 06:15:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xf6ffffff00000000}}, 0x24, 0x0) 06:15:00 executing program 2: 06:15:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xfeffffff00000000}}, 0x24, 0x0) 06:15:00 executing program 2: [ 628.594891][ T839] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:01 executing program 2: 06:15:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x0, 0xffffffff00000000}}, 0x24, 0x0) 06:15:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000"], 0x1, 0x0) 06:15:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x300000000000000}}, 0x24, 0x0) 06:15:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x4, 0x0) 06:15:01 executing program 2: [ 629.378875][ T856] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:01 executing program 2: 06:15:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:01 executing program 2: [ 629.492352][ T870] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x400001, 0x0) 06:15:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000ffff"], 0x24, 0x0) 06:15:02 executing program 2: 06:15:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x20000924, 0x0) 06:15:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000"], 0x1, 0x0) 06:15:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x700000000000000}}, 0x24, 0x0) 06:15:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x2) 06:15:02 executing program 2: 06:15:02 executing program 2: [ 630.402538][ T892] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x3) 06:15:02 executing program 2: 06:15:02 executing program 2: [ 630.556738][ T907] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000ffff"], 0x24, 0x0) 06:15:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x7) 06:15:03 executing program 2: 06:15:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000"], 0x1, 0x0) 06:15:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x4000000000000000}}, 0x24, 0x0) 06:15:03 executing program 2: 06:15:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x300) 06:15:03 executing program 2: [ 631.366959][ T923] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x700) 06:15:03 executing program 2: 06:15:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x4000) [ 631.519927][ T938] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000ffff"], 0x24, 0x0) 06:15:04 executing program 2: 06:15:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x1000000) 06:15:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000"], 0x1, 0x0) 06:15:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x8cffffff00000000}}, 0x24, 0x0) 06:15:04 executing program 2: 06:15:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x2000000) 06:15:04 executing program 2: [ 632.319709][ T956] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:04 executing program 2: 06:15:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x3000000) 06:15:04 executing program 2: [ 632.468787][ T973] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000ffff"], 0x24, 0x0) 06:15:05 executing program 2: 06:15:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x7000000) 06:15:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000"], 0x1, 0x0) 06:15:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xebffffff00000000}}, 0x24, 0x0) 06:15:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x40000000) 06:15:05 executing program 2: [ 633.276758][ T988] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:05 executing program 2: 06:15:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x8cffffff) 06:15:05 executing program 2: 06:15:05 executing program 2: [ 633.435378][ T1003] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000ffff"], 0x24, 0x0) 06:15:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xf6ffffff) 06:15:06 executing program 2: 06:15:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xf6ffffff00000000}}, 0x24, 0x0) 06:15:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000"], 0x1, 0x0) 06:15:06 executing program 2: 06:15:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xfeffffff) 06:15:06 executing program 2: [ 634.239704][ T1020] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xffffff8c) 06:15:06 executing program 2: 06:15:06 executing program 2: [ 634.373601][ T1035] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:07 executing program 2: 06:15:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xfffffff6) 06:15:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000"], 0x1, 0x0) 06:15:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000200000000"], 0x24, 0x0) 06:15:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xfeffffff00000000}}, 0x24, 0x0) 06:15:07 executing program 2: 06:15:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xfffffffe) [ 635.165444][ T1050] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:07 executing program 2: 06:15:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x100000000000000) 06:15:07 executing program 2: 06:15:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x200000000000000) 06:15:07 executing program 2: [ 635.314392][ T1073] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:07 executing program 2: 06:15:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 635.533102][ T1085] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 635.692640][ T1088] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000"], 0x1, 0x0) 06:15:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000300000000"], 0x24, 0x0) 06:15:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x300000000000000) 06:15:07 executing program 2: 06:15:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0xffffffff00000000}}, 0x24, 0x0) 06:15:08 executing program 2: 06:15:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x700000000000000) [ 636.126127][ T1100] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 06:15:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x4000000000000000) 06:15:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sendmsg$sock(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="308a3ea51d4fa365f74e90679b404e6cf7e8e9ce8a5606bf4c54fb56043bf8da61196ca3f3341271b14dedf702e5ccc1383f9edb6283c0d4a800c4", 0x3b}], 0x1}, 0x0) select(0x11b, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x35) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x9}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 06:15:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x8cffffff00000000) [ 636.275969][ T1118] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000"], 0x1, 0x0) 06:15:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000700000000"], 0x24, 0x0) 06:15:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xf6ffffff00000000) 06:15:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:08 executing program 2: getrandom(&(0x7f00000001c0)=""/219, 0xdb, 0x3) 06:15:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x2}}, 0x24, 0x0) 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xfeffffff00000000) 06:15:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) [ 637.111410][ T1147] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0xffffffff00000000) 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0xc49a629f620ca9e7) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x14) [ 637.242922][ T1156] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop2 [ 637.258310][ T1159] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 637.329875][ T1156] BTRFS error (device loop2): superblock checksum mismatch 06:15:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100010010) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x754a7a768b6cf534, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/35) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0200000001000001000000000200f0b3592e40f8d98a4f21e980241b9f000010000000000000002000001100000000f380210520769e78248b0278be9a42430d5a21ce728a86c3f8fa19600082fd8ba8088b5a3b53887409ac3360d6835a51e046c01d3479903ddd80c54d2eb41c1c9282729158105f6ddcef84ac22a01ee6156b80105b124399fdf161c52c4455a1aa86839516d81450214ddaae9320a93aebe2351614561348f43ae32ba6ff3a1132cbb30382fa24adc2f61882fe7d25fd739c59b4e21f0da607714c5e35289be7115901b64a1755aa1d5698749f74c2ebc4274458a413b40dda74a6"], 0x24, 0x0) [ 637.419626][ T1156] BTRFS error (device loop2): open_ctree failed [ 637.519021][ T1170] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 637.539050][ T1156] BTRFS error (device loop2): superblock checksum mismatch [ 637.599806][ T1156] BTRFS error (device loop2): open_ctree failed 06:15:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000"], 0x1, 0x0) [ 637.694406][ T1178] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000180)) readv(r0, 0x0, 0x0) write$FUSE_DIRENT(r1, 0x0, 0xfffffffffffffea8) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000003000000"], 0x24, 0x0) 06:15:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x3}}, 0x24, 0x0) 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000080)=0x42) openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) 06:15:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffce, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="b3f3a0db3abd34d7499c597c4aeccf2d11478338d4e63beb3dfdbea569252b36bb2a870731ad6da58270422cb4e63cef5a17d424f28376ad3d36def6f232089bab191ba760a741a74f4945428e8fce97eb1942d9efef07f805ddf94b34213ee225ebad61d89f85b609cef88779d845c648d605c0a861c2398715468076d62061fe5e8fc6841af316119a4e6ca355759a69759cffac8a9211752cd66f9f3cdee0736f88930600940dd86a1edd15163281978cd480fb5df03dff3c48cc623e9922455b", 0xc2, 0x7ff}, {&(0x7f0000000240)="8fe2a2518144bee343984d81adfd8ae05ecd874f42b350bec8c9ad6d8bb41587583ddf8a2b78ae7224f384b28b68cd51ea4a6d949d03d957be47d3d3f47feaaac9da98b018bfa673c1e05a34d34f6d285cf4098612701ea2a4074770c2ae36f7d70669a829c2643213626c01f51a8c", 0x6f, 0x4}], 0x40, &(0x7f0000000440)={[{@hide='hide'}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x75, 0xeff2351566872237, 0x65, 0x75, 0x39, 0x61, 0x66], 0x2d, [0x36, 0x66, 0x36, 0x61], 0x2d, [0x63, 0x39, 0x33, 0x37], 0x2d, [0x32, 0xb81baabe799bbfb, 0x32, 0x33], 0x2d, [0x38, 0x30, 0xf7e0a6d285f02527, 0x32, 0x65, 0x30, 0x32, 0x35]}}}, {@euid_gt={'euid>', r0}}]}) readv(0xffffffffffffffff, 0x0, 0x0) r1 = epoll_create1(0x80000) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000840)={0x44, 0x0, &(0x7f00000006c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x4e970e1836e2555a, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000600)={@ptr={0x70742a85, 0x0, &(0x7f00000004c0)=""/176, 0xb0, 0x2, 0x2b}, @ptr={0x70742a85, 0x0, &(0x7f0000000580)=""/89, 0x59, 0x0, 0x25}, @flat=@handle={0x73682a85, 0xad9363243473fbc5, 0x2}}, &(0x7f0000000680)={0x0, 0x28, 0x50}}}], 0xde, 0x0, &(0x7f0000000740)="d1e283715f057658583b19763414ae07a9a71815bc668d985563f471e39b185819d64b6d90013e6fa883b5bede4135013959a925363f4751a838813c9822be0cd6a4de6495fa0b4857d0b972fb5306d557aabe4e6af50d6072425cb4b880748ed88bea0bae646109171ff6bd39beb4dab601e4ba87af7eb2c8d3440cb78a6575e6a12acf0722b8b07d3990977cd3cb721c5c7a9bd8f8b9915a28c5f85a63b29be5e2b4fef3287929051962ca6d9d4fbfc3587bfa4cfd342c2db8f68ee090575f95d91727229fa5369a4d0da26dc4db577cb56ac92eb025b730a7aef2469b"}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 638.019046][ T1194] BTRFS error (device loop2): superblock checksum mismatch [ 638.033540][ T1193] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 638.100406][ T1194] BTRFS error (device loop2): open_ctree failed 06:15:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) 06:15:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 638.310368][ T1212] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 638.335722][ T1215] BTRFS error (device loop2): superblock checksum mismatch 06:15:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010000001ba19d7c020000ed000000001000c52315ec3f2dadcb000000000000"], 0x24, 0x0) [ 638.399703][ T1215] BTRFS error (device loop2): open_ctree failed 06:15:10 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100, 0x8400) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000140)={0x0, 0x6, 0x0, &(0x7f0000000080)=0x8f}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000"], 0x1, 0x0) 06:15:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) [ 638.606821][ T1233] BTRFS error (device loop2): superblock checksum mismatch [ 638.619907][ T1236] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 638.669695][ T1233] BTRFS error (device loop2): open_ctree failed 06:15:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000007000000"], 0x24, 0x0) 06:15:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000080)=0x80, 0x4) 06:15:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x7}}, 0x24, 0x0) 06:15:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) 06:15:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="02bb555502180000a38aea320100e58c00000000000000000000000000000000000064ee0000000000"], 0x24, 0x0) 06:15:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x2) [ 638.961811][ T1254] BTRFS error (device loop2): superblock checksum mismatch [ 638.992449][ T1253] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:10 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x210000, 0x0) memfd_create(&(0x7f0000000140)='mime_type\'\x00', 0x6) truncate(&(0x7f00000001c0)='./file0\x00', 0x9) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0x1000, 0x6, 0x1, 0x6, 0x2, 0x1c00000000000}, 0x1f}, 0xa) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000006c7e233604a6000000000000000200000000e0abc5c443000000100000cd217b5d0fdbb5171e6c2a18389cc700"/60], 0x24, 0x0) 06:15:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {}, [{0x2, 0x2, r0}, {0x2, 0x1, r0}, {0x2, 0x0, r0}], {0x2}, [], {0x10, 0x10}}, 0x3c, 0x0) [ 639.059739][ T1254] BTRFS error (device loop2): open_ctree failed 06:15:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 639.199889][ T1276] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 639.326011][ T1279] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000"], 0x1, 0x0) 06:15:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) [ 639.482678][ T1286] BTRFS error (device loop2): superblock checksum mismatch [ 639.559728][ T1286] BTRFS error (device loop2): open_ctree failed 06:15:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000003f000000"], 0x24, 0x0) 06:15:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x400, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x4521c3157a0055e8, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000340)={0x2, &(0x7f0000000300)=[{0x3, 0x9, 0x0, 0x10001}, {0x2, 0x2, 0x5, 0x4}]}, 0x10) write$FUSE_DIRENT(r0, 0x0, 0xfffffffffffffdb1) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xfffffffffffffe01, 0x101000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x0, &(0x7f0000000240)}, &(0x7f0000000200)=0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100000000000000020000000000002010000000000100008000000000000000"], 0x24, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000380)={0x0, 0x1, 0x1006, 0x1}) socket$inet(0x2, 0x2, 0x100000000) 06:15:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:11 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x300}}, 0x24, 0x0) 06:15:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x1b3) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x7, {0x0, 0x10008}}, 0x21f) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000180)={0x8, [0x2, 0xffffffffffffffff, 0x8, 0x9, 0xda, 0x10000, 0xfffffffffffff801, 0x1]}, &(0x7f00000001c0)=0x14) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000140)) ftruncate(r0, 0x4) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYRESOCT], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e21, @remote}}}, &(0x7f0000000280)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="a5003fa78f4a7a6cdf0402ece4"], 0xa) [ 639.896418][ T1296] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:11 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x3, r0, 0x800) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000140)={0xffffffff, "eb29e4994fd11767738943e043327cdfa543251d24783b980a22e94705205ef7", 0x1, 0x7, 0x200, 0x4, 0x3}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 640.058359][ T1315] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:12 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000"], 0x1, 0x0) 06:15:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000080)=0x3) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000040000000"], 0x24, 0x0) 06:15:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x700}}, 0x24, 0x0) 06:15:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="0200000001000000000000000200000000000000103ed450ed00ffff2000000000000000bdb51a3b39bd91b97759a94c0aa6c61e48ca3e7e52273656112748b375398f35e3aeb9cacc12e9db3aa84bf486e3d69b1bd297b3eee4110b4beafd976a9fc75fe5bc3305052b8710725358c0a3ccd088af6058bd9516328e5679dd5c051d86d7c3b93424a38ecedc"], 0x24, 0x0) 06:15:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x141) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000180)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x2) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) [ 640.937172][ T1345] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="0200de0000000000e191bfc210000000000000002000"/36], 0x24, 0x0) [ 641.073344][ T1365] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000"], 0x1, 0x0) 06:15:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200)=0x4, 0x8) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0xffffffffffffffba) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80000, 0x0) getsockname(r1, &(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, &(0x7f0000000080)=0x80) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000100"], 0x24, 0x0) 06:15:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf41, 0x0) 06:15:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10, 0x80000) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000140)=0x4) 06:15:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x4000}}, 0x24, 0x0) 06:15:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x1e7) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 641.828865][ T1384] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf41, 0x0) 06:15:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200000, 0x47) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080), &(0x7f0000000140)=0x4) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020a803eec4bfb0000000100000000000000020000000000000010000000000000ab2000000000000000"], 0x1, 0x0) 06:15:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) r1 = getpid() write$FUSE_LK(r0, &(0x7f0000000180)={0x28, 0x0, 0x5, {{0x1, 0x7, 0x2, r1}}}, 0x28) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000080)) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x16a0000000000, 0x3, &(0x7f0000000440)=[{&(0x7f0000000240)="75ef6173fb3de52fd96120d8c9aaf1ebf602e0587c1d7426e605883c586914282d01097fa6703f874d291a0cf592b25bdf29e191adfa5100bb8dddd61c8cd5282074ea13690110dab60b33817093e56cc9dbec7f3109cf7dc1d1c22641e5f2754fcc180b5369918b2bc7f7ca5f20485627ce667da1cd4c125a9aa7193ac0b66d6944bd68f0499eaeb2a64fe606b44fe508aafe6b42274782fee67e8fd4d2df24", 0xa0, 0x2}, {&(0x7f0000000300)="09062b08a337c716fbd100971a414b1c1412fcd3c7093b8c3ca99b3a679b6f69988eae9995914d9a7ddafd56e3768c5c7503fc286b763c80ed60abc1f252", 0x3e, 0x5}, {&(0x7f0000000340)="2442f1723d13ada26578104e045568cde3edc3bcc09d182634f3cce0922fdbe94c86fc5def71b1ba8517bea13352558fcb548ae523069806a6295b9dd5aeab49b8179003c74b7673b2cace814172a9bb2b3a903ae075c1f6d5de055e0455e635d4a48d8a974670827c3ee2bcd2602451363cbaf1c5e270b3d3b524a02d7b9d09692d7dc945633a6e11755b46d8e7c716b004ade556e5981ddccf2b7eaf8915389fcc50eabffd2b909c8e654390a8bb5962d7186ac1d777383285639d35ca8a33018c6b91007a15d8036fd75cb5c6e462cd4524a6e3fc", 0xd6, 0x2}], 0x2000082, &(0x7f00000004c0)={[{@dmask={'dmask', 0x3d, 0x7ff}}, {@show_sys_files_yes='show_sys_files=yes'}, {@fmask={'fmask'}}, {@errors_continue='errors=continue'}], [{@fsname={'fsname', 0x3d, '[wlan1'}}, {@dont_hash='dont_hash'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x22}}, {@smackfsdef={'smackfsdef', 0x3d, '/proc/capi/capi20ncci\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@audit='audit'}, {@dont_hash='dont_hash'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'em0[md5sumvboxnet1keyring['}}]}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="02000000010000000000000f020000000000000010000000c1000000f5a9090002010000ff03520af106c144027af9b96bbf616dbc1df338eefb2727b1f4a53becd048dc0ba5b6b7f6737e56aacb4ee3e1de51fca970f2f3bca963608c0f377745"], 0x24, 0x0) [ 641.951584][ T1400] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf41, 0x0) 06:15:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)={[{@fat=@gid={'gid'}}]}) 06:15:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 642.080902][ T1412] ntfs: (device loop1): parse_options(): Unrecognized mount option fsname. [ 642.109584][ T1412] ntfs: (device loop1): parse_options(): Unrecognized mount option dont_hash. [ 642.120110][ T1412] ntfs: (device loop1): parse_options(): Unrecognized mount option context. [ 642.128802][ T1412] ntfs: (device loop1): parse_options(): Unrecognized mount option pcr. [ 642.202894][ T1418] FAT-fs (loop0): bogus number of reserved sectors [ 642.219586][ T1418] FAT-fs (loop0): Can't find a valid FAT filesystem [ 642.280010][ T1423] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 642.341653][ T1418] FAT-fs (loop0): bogus number of reserved sectors [ 642.348264][ T1418] FAT-fs (loop0): Can't find a valid FAT filesystem [ 642.459719][ T1429] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 06:15:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000200"], 0x24, 0x0) 06:15:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf41, 0x0) 06:15:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4) inotify_init1(0x80000) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x307e, 0x550a251965aa53e2) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="0324ac904382159b4b744a7a1cfc5c56d808aed038c5ff015f5bebad6be3c7be2c6a42d4d72c98418b57c6c29e9466309d2cdab80606cbd9d14be9b136445ef360ad9756b11d7a6c8499e4dd7f124d36242b988c4b580f9887c60cec46281d839c7f34c78e930423f65acaa6d8df5d636ce493ae0df440f55b90efdbff1c1f8973d10af4e966130d8654e3e912966a1498c652e59e8f5c9e494ec4d3456d37f1a4fc563b57f3031f34742bb43f837d03a10f72820342860c4ab88dace2162ce5b2b951ff6f0d03821ef642c196abadd33d1b19ae1ef6399d4001d12e4d241d8cd53df1c233d651008cb7cf2b8dd375683b7c73156068a73809c4b6") write$FUSE_DIRENT(r0, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="020000000100000000000000020004000000000008000300", @ANYRES32=r1, @ANYBLOB="580275d950418995027967e8dc474bc7dda86ca4a8bc0a29a8527f84bd0fe693c14faae5f986496a6e1b0ff563665a13fe52897ef32649b0b97840f7261c735d598327ad942db9f3d1cb0449a11fdf55", @ANYRES32=r1, @ANYBLOB="08000300", @ANYRES32=r1, @ANYBLOB="08000400", @ANYRES32=r1, @ANYBLOB="080006004b60585a19ac5a4992aa1a35a899d95d087068fa6d8770cef97d86307a088cd5f89ca6fd0f6093f7d57fb52cec656ee4a52a430c3e6b393365011d23d7ee90d07f75210b5643b865a2601b5c401ebc55d6ba47017fe949ed124b985e35ea0627485fc9f51b547a85703aebef4131852fb561", @ANYRES32=r1, @ANYBLOB="10000000000000002000000000000000"], 0x4c, 0x0) 06:15:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) 06:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x1000000}}, 0x24, 0x0) 06:15:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x2, 0x6, 0x3}}, 0x30) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02007cbb3fa4a4b4000001290f651d3dac4bbf9ac400000000000000021d000000efff0010002000000000002000"], 0x24, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, 0x0) 06:15:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf41, 0x0) [ 642.797618][ T1441] BTRFS error (device loop0): superblock checksum mismatch 06:15:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x12) readv(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x84800) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02000000010000b72c110000000000020000000000000010000000000000002000000000000000a0c9380dc058b8d04fd9e75d639f52cd1450c8a63ab0bd69f237f2ffffffffffffdb11ba5ce1b95d58ed2b99e6c810785b6e37cc56982414bb19626576fca8ef10be9ea642e8bedc58f5769c10924dd856f57f1f05000000000000845e9e8611285fbb30b6fdeb0011e3d7a69a57bc805fb47dbe6bdb4b517c68aaa12476a4dc39511bab3484bfa202521c37251fcae2d21b6678be850b0a2ec4a6d4e9"], 0x24, 0x0) 06:15:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 642.922901][ T1441] BTRFS error (device loop0): open_ctree failed 06:15:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) 06:15:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf41, 0x0) [ 643.033917][ T1466] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 643.087285][ T1473] BTRFS error (device loop0): superblock checksum mismatch [ 643.146275][ T1473] BTRFS error (device loop0): open_ctree failed [ 643.179671][ T1478] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000300"], 0x24, 0x0) 06:15:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200000, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x6ca) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) fchownat(r0, &(0x7f0000000140)='./file0\x00', r1, r2, 0x37ceb6862f19fecd) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="0200000001000000000000000200000000eecb9c69000000000000002000000000000000"], 0x24, 0x0) 06:15:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0xf41, 0x0) 06:15:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(0xffffffffffffffff, 0x40bc5311, 0x0) 06:15:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x2000000}}, 0x24, 0x0) 06:15:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="761d0000010000000000000802ab9e88adf69818320023000000000020ba0a000477a10000000000dcb6b224d8874d8ab01a8a605fedb6e8965351729215c7230b3d3caeafaa15d1e3020047569de865bf64c5618feafa88e93b7c9593132be7a80e08cc652c6c2b73ed0878f0899326b14e3b02d1556ce4bd20"], 0x24, 0x0) 06:15:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0xf41, 0x0) [ 643.727528][ T1490] BTRFS error (device loop0): superblock checksum mismatch [ 643.758042][ T1485] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x181000) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) fchownat(r0, &(0x7f0000000080)='./file0\x00', r1, r2, 0x400) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000040)=0xe8) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)={{}, {}, [{0x2, 0x0, r0}, {0x2, 0x7, r0}, {0x2, 0x4, r0}, {0x2, 0x4, r0}, {0x2, 0x2, r0}], {0x2}}, 0x4c, 0x0) [ 643.840441][ T1490] BTRFS error (device loop0): open_ctree failed [ 643.900888][ T1510] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0xf41, 0x0) 06:15:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) [ 644.125297][ T1533] BTRFS error (device loop0): superblock checksum mismatch [ 644.171680][ T1533] BTRFS error (device loop0): open_ctree failed 06:15:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000700"], 0x24, 0x0) 06:15:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x1ff, 0x18000) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x1) readv(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) getresgid(&(0x7f0000000080)=0x0, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r4 = accept4(0xffffffffffffffff, &(0x7f0000000340)=@nl=@unspec, &(0x7f00000003c0)=0x80, 0x80000) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x9, 0x3, 0x300, 0x138, 0x0, 0x0, 0x138, 0x138, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, &(0x7f0000000400), {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x3, 0x8001, 0x0, 'snmp\x00', 0x4}}}, {{@uncond, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x8c, 0x3, 0x614}, {0x401, 0xeb, 0xfffffffffffffff9}, 0x6, 0x6}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x360) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='system.posix_aQl_de\x84\f\x80\xcaio\xb8\v\x15ault\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000100000000000000020000000000000008000100", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="3bf4f3e4", @ANYRES32=r3, @ANYBLOB="08000400", @ANYRES32=r2, @ANYBLOB="100000200000002000000000000000"], 0x44, 0x5) 06:15:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf41, 0x0) 06:15:16 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x3000000}}, 0x24, 0x0) 06:15:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="02000000010000000000ddff01080000000000001000000000000000200000000000000062f66f40d2f57424c2"], 0x24, 0x0) [ 644.694730][ T1546] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:16 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf41, 0x0) 06:15:16 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x5aa, 0x8000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) get_thread_area(&(0x7f0000000140)={0x1, 0x20000000, 0x2000, 0x0, 0x0, 0x8, 0x3ff, 0x4, 0x20, 0x20000000000000}) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040), &(0x7f0000000080)=0x4) 06:15:16 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) [ 644.969621][ T1565] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 06:15:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 645.215756][ T1579] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 645.338629][ T1582] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000003f00"], 0x24, 0x0) 06:15:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000140)=""/246) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf41, 0x0) 06:15:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) 06:15:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x7000000}}, 0x24, 0x0) 06:15:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000940)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r1, 0x5}, 0x8) 06:15:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) [ 645.699586][ T1597] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf41, 0x0) 06:15:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x4042c1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/wireless\x00') getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={r2, 0x5f2}, &(0x7f0000000200)=0x8) readv(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010000002000000002000000000000001000000000000000200000f4ff000000"], 0x24, 0x0) 06:15:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf41, 0x0) [ 645.958396][ T1620] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 646.065172][ T1626] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf41, 0x0) 06:15:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x60300, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) r2 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x20a0004, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fsmagic={'fsmagic', 0x3d, 0x80000000}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_user={'obj_user', 0x3d, '\r/'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf41, 0x0) 06:15:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000004000"], 0x24, 0x0) 06:15:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x40000000}}, 0x24, 0x0) 06:15:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf41, 0x0) [ 646.622818][ T1637] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf41, 0x0) 06:15:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf41, 0x0) [ 646.781121][ T1654] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:18 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x800) write$FUSE_DIRENT(r1, 0x0, 0x16d783c9575e4f24) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="02000000010000000000000002000000000000001000000000000000200000000000000070e7a3ecc8dd5fc585fab1d5a000a32f9487dca538fbf23b7725690d01cf6405f5ff3cccf2a31863e93489b30340c6e70f43f9cb7f0a9e63d2fb5209090b8de74b80136f"], 0x24, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x10) 06:15:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf41, 0x0) 06:15:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x183) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="020000000100000000000000020000000000000010000000000000002000000000000000f9fb8ac2e9609a1e3a37f7fc37f49f09abc6f03aed8193e0e5021e9b02cad1b86ebd28555141a988f20aa68ab5fbe968d4cace9592"], 0x24, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x1, 0x6, 0x2, 0x7}) 06:15:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="497496d351e3b5b67b1103825f1a972991be798dd78838f114e267489f7c4e86d9f237f1f2b88db4103d44eb23043e11388104d51234ba12e55c1ed743d328e68c6b3f7f9638170f04e02ca693a7", 0x4e, 0x391b}, {&(0x7f00000001c0)="384e139ef03faf33b9c81b0acab18a24950558003ff71d8fb63882a5d0c586dc45452bdff7a93a5aafd1e252a2900799aa08a4edd2b29d6832c4e80b4983c19d98260f593edfb52d35c4b80ce6c60050b4545bbc6b672fd128b6309ea09d7fd8bd54cbfd168f4b1f2efbe40528070b8bb67d7afdc8092bccdf42770003f240646d29d977c7eb2043f0637f7c70e41309dff8e7977a1bfe1cec71539ae0e0dfc947", 0xa1}, {&(0x7f0000000280)="0b258c0a29ed87f16b41872906db8025dfdf68eb2843b5fed92cfb1041d3c636ee0cc9b3aac9ec165904c4200261657c4fe8e3d357d9388e723bc90c6ab337c3f219927e39b444e5cffd34c6565bcbca37d53a5433015a9ac15a45ee", 0x5c, 0xfffffffffffffff8}], 0x800, &(0x7f0000000380)={[{@hash_r5='hash=r5'}, {@balloc_notest4='block-allocator=notest4'}, {@grpjquota='grpjquota'}, {@balloc_border='block-allocator=border'}], [{@dont_hash='dont_hash'}]}) syz_open_dev$admmidi(&(0x7f0000000400)='/dev/admmidi#\x00', 0x3, 0x400000) syz_open_dev$amidi(&(0x7f0000000480)='/dev/amidi#\x00', 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x2, 0x2) r1 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400000) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat(r2, &(0x7f0000000580)='./file0\x00', 0x10000) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000005c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @default, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) readv(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000440)=0x4) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 647.029359][ T1672] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 647.145922][ T1680] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "hash=r5" [ 647.167657][ T1683] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000ffffff8c00"], 0x24, 0x0) 06:15:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf41, 0x0) 06:15:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf41, 0x0) 06:15:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:19 executing program 1: readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2400, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x8cffffff}}, 0x24, 0x0) 06:15:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0xc2) readv(r0, 0x0, 0xffffffffffffff4a) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000140)=0x4) 06:15:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf41, 0x0) 06:15:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@ethernet, &(0x7f0000000140)=0x80, 0x6cd6026c5fb3157e) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180)={0x1000}, 0x4) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf41, 0x0) [ 647.664010][ T1697] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:19 executing program 1: seccomp(0x1, 0x1, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x9, 0x40, 0x1f, 0x6}, {0x70, 0x2, 0xf7c, 0xffffffff00000000}, {0x3, 0x34d23f91, 0x53f7, 0x473d}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xc126, 0x80100) accept4$llc(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=0x10, 0x80000) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x3, 0xa7, [], 0x7, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)=""/167}, &(0x7f00000004c0)=0x78) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x5, 0x1, 0xfffffffffffffffa, 0x0, 0xfffffffffffff6d7, 0x4, 0x80000000, {0x0, @in6={{0xa, 0x4e24, 0x25cc, @local, 0x80}}, 0x6, 0x42, 0x4, 0x401, 0x3}}, &(0x7f0000000680)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000006c0)={0x1f, 0x1, 0x200, 0x400, 0x1, 0x6, 0x80, 0x8, r1}, &(0x7f0000000700)=0x20) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000500)={{0x9, 0xffff, 0x2, 0x4, 0x7, 0xfffffffffffffffb}, 0x9, 0x0, 0xdb9d, 0x1, 0x10000, "73d7d66636a187ec4a7976291701536aa79487d69b993e17ed450e025191baa3afb9787d8ddeef545531cfc0775f2253a69ddf9f184287c46dc2efba8d7ba6678837b15e39a63b289d3f068c1321cb0bcaccd63807757ec9b37c431a11f2a1df8d40ff2947666d5e1b46b7278ad767218c5442a8719156de915b60c3c8f32ecf"}) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000240)={0x6, &(0x7f0000000200)=[{0x5, 0x800}, {0xfffffffffffffcb9, 0x7}, {0x1, 0xfffffffffffffff8}, {0x4c0, 0x4}, {0x2, 0x7}, {0xfffffffffffffc00, 0x3}]}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=0xffffffffffffffff, 0x4) readv(r2, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f00000001c0)={0x3, 0x1, [0x6, 0x5, 0xfff, 0x2b, 0x3], 0x9}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100000000000000cabd79c82533361a44183b6d788f7e850a00000000000000"], 0x24, 0x0) 06:15:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xf41, 0x0) [ 647.855317][ T1723] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000ffffffeb00"], 0x24, 0x0) 06:15:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf41, 0x0) 06:15:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCGPTPEER(r0, 0x5441, 0x8b1) 06:15:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0xf41, 0x0) 06:15:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xebffffff}}, 0x24, 0x0) 06:15:20 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x40100, 0x101800) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x501002, 0x0) mkdirat(r1, &(0x7f0000000000)='./file1\x00', 0x0) vmsplice(r1, &(0x7f0000000380)=[{&(0x7f0000000140)="b17a5f482b94fabbe4e4706f1484b73b191129708b469475f0885318d5d78ff70c3994ae040bb700bca8cb9fd67be7c1c4ed50e0cf28ae2e916b0b09dabc7269d220379d2e2368f6fd6b0048382634d3de51260499edbf", 0x57}, {&(0x7f00000001c0)="f24e0788868e450d52bf254f19c22db97d56905abcecc8eb5b70d11ab99e303212ced0c6ce2f4ddeb4859341ad9c9b2316d7ce18e19241933a44fec16a43cda4f70aefca2e00c4745803", 0x4a}, {&(0x7f0000000240)="b1428f1b10355d2628e127ff4410198ff8e35f744be6fc05cc6ba1073161a2d0cb62", 0x22}, {&(0x7f0000000280)="e13a3f95984c4bdba9f337fef2644f9c69c9bff26c85b208d9c2daf1c9be8bb284c99fe3174c4a099c5aa17f18a72cadaf8c61c1f74fe71a826f53d81c8e1dd52336254806f8764d2c507bc765ba3b0e1ebf21ae9c3b478fa4a2156cdfee2368db231d235467b34a9dd457b87132e4f18232ff176f8335ad49247c0525a5511f0543fb60cc1c811b34d35bd2f17fd2b1ac3670ffc3c06adc20b006cbff234eefe7e4f4a4f32183b629dc4c9858ef8c6bf68cf528a794f0c457c0d34f24901fc713c6e2a3fbf48c346a8571a97aeecdc654264c2fc7d83d103b", 0xd9}], 0x4, 0x8) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x81) readv(r1, 0x0, 0xffffffffffffffa9) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000080)={0xecae, 0x4, 0x7ce, 0x5, 0x0, 0x1}) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) 06:15:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf41, 0x0) 06:15:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0xb0f9, 0x5, 0x1, 0x20, 0xffffffffffffffff, 0x5, [], 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) socket$kcm(0x29, 0x2, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') readv(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x7, 0x0, 0x3ff}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x3, 0x1, 0x8879}, 0x10) [ 648.625237][ T1747] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0xf41, 0x0) 06:15:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x400400, 0x0) r1 = semget(0x0, 0x0, 0x10) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f0000000080)=""/1) readv(r0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x80) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000180)) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="0200005e88bdea00010000000000000002000000000000001000000000000000200000e4c5000000000000d623813a17d86b8000000000000000000000001e734958d4fa0e27cf11b4f07a0d37d06d2c466a6344e027cae436b16d72c0c1a091a1b378e9c52e50c7456066f0156b55559ce29eecafd2e4db1c5dcf12a92793d6da8f51690ce8fa5fc47794373251cf23da4a4a271b72404d81518d089d9407c399f3c2eadd6ae0489b1159bbee5decfd6169bb87554239ced93f5d168d5d70d9ee7e6f581f2ae578a2a5517a91fd2cf6f5faf300000000006d5c19984e3c25141295e5f5bd3c090d509f3d7fe6fcd2454ec58eb3a56eee"], 0x24, 0x0) 06:15:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf41, 0x0) [ 648.779678][ T1764] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000fffffff600"], 0x24, 0x0) 06:15:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0xf41, 0x0) 06:15:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) 06:15:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x400000, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x3, 0x10000, 0x3}}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x7fffffff, 0x4) 06:15:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xf6ffffff}}, 0x24, 0x0) 06:15:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0/file0\x00', r0}, 0x10) 06:15:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) 06:15:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf41, 0x0) [ 649.568080][ T1795] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @null}, [@default, @rose, @rose, @bcast, @netrom, @netrom, @rose, @bcast]}, &(0x7f00000001c0)=0x48, 0x80800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000200)='system.posix_acl_access\x00'}, 0x30) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000280)=r1) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) bind$isdn(r2, &(0x7f0000000080)={0x22, 0xfffffffffffffff8, 0x0, 0x5, 0x3}, 0x6) 06:15:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000000000000000200000000000000100099d9e6e2edb2adfa1b314e3d628cef00"], 0x24, 0x0) 06:15:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) [ 649.722174][ T1819] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000fffffffe00"], 0x24, 0x0) 06:15:22 executing program 1: readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf41, 0x0) 06:15:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf41, 0x0) 06:15:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xfeffffff}}, 0x24, 0x0) 06:15:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x800, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x9, 0x100) socket$isdn(0x22, 0x3, 0x1) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000400)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x200, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) readv(r1, 0x0, 0x13) accept4(r0, &(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000340)=0x80, 0x80800) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80, 0x0) r3 = getpgrp(0x0) setpriority(0x1, r3, 0x5f) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="02000000539c000000000000020000000000000008000300", @ANYRES32=r4, @ANYBLOB="10000400000000002000000000000000"], 0x2c, 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000640)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000180)=r5) sendto$unix(r0, &(0x7f0000000440)="154cb8f2f0de426d6c96fa29a48187132b58e02c27835cbdb15ba9a781acc6ef5d1e9bce919760f47e337091fac2c432869d165d87187c187ae9fa5712b01fd6d1c79d8561b63a9e719e5f295bfbe687c7c2aeb418adfe09fd6deadcc4f538357b923c8a4db7f26470f0e6498d3e1037db67e96ca777954160d38d2ba2194c1908f73723c66e3640fa746bd82d48f1bc39ee678871817ee10d5c6d78fb45a262d6d7a6b1eb97a5724faabc9998a30d1925", 0xb1, 0xc000, &(0x7f0000000500)=@file={0x1, './file1\x00'}, 0x6e) [ 650.465028][ T1843] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0xf41, 0x0) 06:15:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf41, 0x0) 06:15:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="027a00000100ff000000000010000000000000001400"/36], 0x24, 0x0) [ 650.649660][ T1857] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x10000) r0 = eventfd(0x2) readv(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010000000071cc00020000000000000010000000000000002000000000000000"], 0x24, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) prctl$PR_SET_TSC(0x1a, 0x3) 06:15:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf41, 0x0) 06:15:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000008cffffff00"], 0x24, 0x0) 06:15:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x41e5ef32, 0x2000) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000080)=0xd4d2) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r1 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = getegid() r6 = getegid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x4}, [{0x2, 0x5, r1}, {0x2, 0x6, r2}], {0x4, 0xa851927d32fde5f3}, [{0x8, 0x6, r3}, {0x8, 0x2, r4}, {0x8, 0x2, r5}, {0x8, 0x5, r6}, {0x8, 0x2, r7}, {0x8, 0x0, r8}, {0x8, 0x5, r9}], {0x10, 0x4}, {0x20, 0x2}}, 0x6c, 0x2) 06:15:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf41, 0x0) 06:15:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf41, 0x0) 06:15:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xffffff8c}}, 0x24, 0x0) 06:15:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000080)={0x7, 0x1, 0x80, 0x7da0cc14, 0x3f, 0x5, 0x4, "7e26173b4aa07ff362b73ff48e5a563bed863b87", "c7af3a650a1d895592944e7620d486dce2a860f3"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100ecffffff0c0002000000000000001000"/31], 0x24, 0x0) 06:15:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0xf41, 0x0) 06:15:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf41, 0x0) [ 651.540312][ T1889] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) io_setup(0x11, &(0x7f0000000080)=0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x840, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200c0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x88000, 0x0) r5 = syz_open_dev$vivid(&(0x7f00000002c0)='/dev/video#\x00', 0x3, 0x2) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x34001, 0x0) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x101000, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xffff, 0x4000) io_submit(r0, 0x4, &(0x7f0000000580)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x401, r1, &(0x7f0000000940)="56d145f898b96ab7fe978d0ec3721c9181315956df089410c97bc6ba4de57c97b0122922a457cb4096efaf476eeda2ea4f45a86df26a32604997152605021ad9c6cd5a1f0a07a5cb61d5f3a154ffe6f86c4296a4dcbf162cae3c6c31218f5c56cff93db3f69a5122a37cd5f88426623b9fb974014cdedf10839ca95263ae40fd17a71626e661ce2dafbedfad08bb5c3ee5bf0aa167f679dfdadd809b05e0c6f052108befe1bd3ceb1ba18a8867f5a21bd05ad9fbd81b6ecc43c068ad0d67a2769fa62c13666288485a8db5e5cbea64db07a950eec06e5cb0d5d1d8159f63a04d45756107b5d9ac12c6411b80f7fa36e942b953fde324732c243384313d65475fc6e504fd6d79bc6fc559b85c479ba07e7a9fd25921799feeb3213e14a571bcebef0eb4b683310e09d117d45411f1a0f9fdae2054cd00dc3eaf7522a577255e295d0e291a93bc0f22793e0dc26ea4c04910a5408b83d53a8f7b1de079f4eba1cc78d0f2ff166affce4a7b5a5b3cae044030d00bc5a64eaab9904d9a0938c75ef919f53e286a0c1aff35cf669745ac30a705d3af24c884dda08b2702862b2ed29789863ffe041e366d6d3433bc888c1b4e50a079539e1c234608a5f71c1cb56bc3f05636bca4390f9c4451cdbb787eea14320581ff74b9e028a0cd518fc1dac433b2b3ad6d28175fc565d92d3082d518f727d1d4ac2b61ad65765054c4a6bfccc70aed12a865bbb5e5f3627812e2a46500179594b777f5c17ac902865aeb0ebb7737cd1faed434c62dea4485446fc84aa8d49bb43f0ae7a7daedc9a52756d36e87bf5568676de0e5d3339d3562f81454caf57330e46560389faa38a4d11972dc171b559ed945ed8d3927082ca4ec107c22fdd126d207aa7ac94a1136a840b845b55359f3af1c718e40a9409408f7dab1ad3ec16230929d6d64974bf66b9a6085f6745ff2ba2c6e503f767fc8568611273fd9202a1bbd1b4be4a9d966554be4e3eb478d5370eef03ec7c3de9d7c427ef00b7d6557839a83499239eda3306ab97c02bc492c686043e68fe77f7b594a1d19aaf3bd551464a1f739a2e675331149c56b08b3c1b569684cc80700d8bbb949db9c21e4e9ebc3d488f8a65b10867a851b05a644a8fa19003d1c087ee852444feac32087bbe01d31e49bfec35a25a80f158f1d36a26a19b6f96d1b08499c228cbcb04113524c8be10c0906b8cf73c83f731ab0fa719e5d21cffef86394ec6cbaf156b7edaebf52e5dc415b651dd116a8fc6c30b187aa0315b44ce01e654799e1b2436373aec0b0f9af3eb6cbe50b2e55040fbb68dcf5eda2c0e6a2a40d640f5ba9959cb4eb768f66fecb5c56f9bc4228de9f0fcb1f4186bde996600434a303502513bb5352fabf98a9cf145de7d543a0770a01bb8dc28fb5837e629f85e9dc9a6082d56b6df4ed3ee472b6e906a7881db5a33032bb59339a0f646ed6a3fdc02c97150b81075fd18daf556dfe1cf570250ccbf258a08d24d271cc4a74178905649a4e0a28431db3f929ddea590eaa2c09839d77cef5e4f87cf64a752cf4ddfac1073d61f1e2cecbc61c70be70ccf05cee54c79e53bbb80741c7ff6c7fcab2182e3f8bb044b2e9931f9c98017fbd80fb28312823d69b83f41912c785e0aa8c996050d007e5f19292abf0a1158646bb1a07687298cbda1ba095cce2dceb2ede1f8320f982ec4c425626426a1e477627d7eb73c4eb3a8e31641da025d489fbe5cdbe4adb71369d27eb008633a796ac755c4905786daf036f6b4ed9520fa866deb0f44db6cb63ec205ffd191ac9580b20496291d4e2c82599633d7d5af17f408db9af5c8ec35b4e78757e7fb83dd52befe1a418dea35ff2f54f105472330b7a5f7361308a314adb3a116d65aabaeda48142816656973690a4609a89105d65b359c846b3765acce35986efb69930ea600526c02c10f022a74c36178e2470962c8639378b75ab873e7f8d903a6d5b7d0544373333e5cf593ecbe9d13ca417ead102d0e5ec52afdfb6b8b5d9b4118ae006529caff06e06aa500a488c190caa5f226848d7b8aa85eb1766fcad9fd39aab5ef61d939ed1f4f48aa96325253acdb333e3e1c8412ab19afae116405efb8bf15a118ec92b7b8df8e0a13c9f4c67520cde46560e8d68eb1b6fb3681b8d8f1ef5b39534b403091ea859dac320e4bcbfd7bd1a7bf3f82e89cd3eb4006209dab1ea3b83b5974f6c5ae39cd4365e14dfbd71782f3f06b8d332f659b28ef9df68d01ae1be00eb6b3245bf0c6bef94ebc84a40d7811ca2043cc1052b7ee3450c3ffa630d3b767de9e4a9152616f49553256fd4e72132bed53891f78279d9e56dfc238c8c9dab45037ecd4b156251fe5d84e273060aa9d1823e0e1276f2c512af26fe2594fd0b53836320a4c3af35ac232a3e7fbd0014a4ed5160e9781bd065fcd77c774f7f579c9f56fd40a41fa8c3ad0b52655e77245c1e4e15a6dd1ec900be26ba8b342e0b13f165014d1eeffa2908e4dc357ef471df9a33617f8a724c2d4162ed98c8f94ebf812634c637104935fe697b4cd3d31854ae86f56aeab001058b020335fe9506eeb8e36817ffa2d2a187de63acd009420073c0a2f70a87d4bd92bc766ae7d578457f26833565c501674bef1036f991b34ea2379632e06c6809afb521556021e3ae77e604e69f8fbb609ffebf3bf1c6ebd30bad3ff78e9b95734e90fa9bc3c9c54a9c799784edd2892e57a0079dec00ffdcd034c8a98626d0b7a9177286f4488c0f271a759eb7d78d4e230c8cb17e5d44bfc9dd2f04fe499eeb4554149f84e4c040b4de740735af335f896c6ea9fe88b6e2114ade3cbf31afe231088858a995aa5842eda75472c7f005a5d6118b8d0414f865a044b805d4c8af3b93c4e2881aa4624da0deb189d3fe6639ecc1100110d0066906114c2d34bee8089815da43f067b625a37b80144ed6264058b63718df5e4719697e63f916e3309c12cfbdbd5ed26d7b01b9839947272124e4c954b03de305ad6a41f2e8cee08ef769e4c4cc2d46b757c0e0f00da38c4cc66e8cde70dc14dbdc00b4429ba0f1c53a50e9fbbea65e3a3f6590dbcbc4faaa530b0273ca03d07e1ece6ff1377bcb699627bbe85ceceb6a0e16f3d41476bbbb7ff357490811eb904be91fa11d9a1c9a8e1d7099edf5da2da373f3561af3dff111b528fcc0b7a2967846d6f7810f94a05cadf9fa46a9ceba60df96f39e112f0c66147b8e6253672c9750001e4737da9f2ba3fca5899857975b864508673a80ecd97a1282e39cbf91b4ad8957cd5a39fb3db664118f58ac6f5d6747b66bd5f86bf35bfe7351684d85043b49599fdd4e944dfae4ea6524f24fac1ab79d52f340ec1479474eb22f3d6ca1dd8043f5e6746984127d914dfefc652be23178033203def772b6b898e482f53d4d2bcaa00ea8174fcaa38a7476cbccbf4518b3e56d4179a49efcba0400a6d2fae25d9a62a0828c66ca75e94843484fa4a104d5b638e31758a75eb57a0f3a8ea2a448d4417d806a70a149b86aecbf627650cfbf31d9fbbc994d586260d8c9e6dbe26a81f1af672d820b50ecc586013e0f10cbc3c90a3deb41644be5fa45869eef29881d1a6ec9d924d89a70d7ef638e460defb8f6d486fdacb8557b02cd5721748b8a44510526c540ed199766a3dd736f28b5bf0600bac367ac60629a463bbeba3ba307e71bb72a747cb3a809fbc19073ac90bb208fe3f36a5e8671ef791c58f0f1d2bc711ba27c7fd85cd06856928a0d7f8e0a17f44cae5546227fa11e05666b3d2e5eadc11a0c770d4cfaa9ff9aa898b9ce40187635e9700601bc69d2bee4363ea811c9c99ede8c735cba18d76d22d3b365f6e18ac2a6712f1f26272c49f5bae694eda497c6da813d6c2ae2c1c6924f82945677ceca46d8fc7fb9947fc89c632a926b60239e360c82481608be12084c6bbd3646eb59bb39847e1bef9504200d7f01023f9573d412fd4da7d2e6b094b4e3fe9d93d52a49cc7c22a382c27fae7766ae0c52136e141b1d514270ddfbfb9467e1a43731f6377b69e9da4e083a55ba452036cf9aa1167061a6a70c68019c9d502e421917281e3ef00a16fb702858e074cbd7f3fa2f0e9767030f0a471077de35f939f7f1087cf6915a3f6c27e8463897d65b6550ef8a64ba57b2d74e8e62cdb3f39933a52d0d6875809d63f7859fe4e2126e1e670b82e455f167e05c216bfeeddbfb0509b5b258d4c10eea55430fff54f75bdd55f346b9efc06d24239175d8eb5e981fa875be4c38f6050e65b704df7b4c356520e619117c86f42f5f4c88e17bde78d9a29c42d4093c4d16af900deba90620d6c878bf85af6ec75f37e5a9c11155b83b22accc7c71b2c8b60c755339fdb73f1b133f9bea16348d904224f6ff4726e0e54ecf0762737fb21a39c3d6ddffe9d2549e5f7943cb55af604f474a668509e9400c85e27bbb47a1ec9207f0c5256e49b1e2f04cf6d961e2065efe6f65d02cc1ac79f8dcc7ece206dc62688502697a4b3e1eb7496a1029c1e34a9b586fed57dd5c1f135736c51cf1f9130c489d70bbdbb5ebcfa18a1c1d89992487f84c749e33fe015a76e06ac6e0e0fcb4115cd1aa4c17a885348bb4a42a657ce0518e8e5e0e502904498cdc6e628b2a8afdb306490c5a39b4edcb98339f04a90d50bdaebb65ab9a0957201238f0c6ee4382c6898da741778128b630c4552484d164c151a0e7ab996fe9efa5d595f3a82d9f8f56fef94f01fd2e09e99b95897c9ec4d5ce532e0ee55a17976acfc80c58de872091b386038484dc8aab8a88702d420f429a3530beae5998fec2e74445656f54c96788487fb4e198dfc86219889d27bbd4c3c3011edb2cbdc9187ce3a4850d76d614dd7fd51b8e13f9182e53e4d85dfdede30eb17c355632b254ea77c91d9f559e8f232677fd3683b9dc6c295afaafa999ccb2d4f3dd090d91953319f9c17d686c174c912d2d10f1dde479d127f1749247550aa23e1f247cc6e6f311524dc319e965eac35f40b36904e38e46b0198c57b0a7a07db187471d634c3696968948f132d01cd9ccb61ceeac1179184ce7594270a18592b1f629d9fc783fafab6893d1b8b8ac7e3d9edf28d8b012fab9841e058aeeee1da1c5c04a66ffeeaafa41807e3f2204b84ff4ff6b941e5eff2758e0bf03fe0a8c29a0c758e6c7f8a137013a2eb948bb0cf9376ddf486c89467c2a0e31661f1fc36b2c815e0a92901825fdf061b98b03de155d7616d3fda50c25c87c0cbefcf4c3cda423f08678ca498ca7af3afcd7b66250dbae99fe08034ac7106705daa7796432fde0b13e007e59bb61eb74cf071563b7e32affe6f2773977f830e23899d9f80a2609d7debfeb5633907777fbc1a049c0f5688e8cefa7d65beda63206404246e37297e92e21d58859bc622ac86b8255688028d13981d5cfba1e829566d0031ada272cfc5872f25a1500f9b5131aee9c3b372bb48da1a3a52c8bb9225f17c7fda741e86b0547129e244381d10bd4fa485756b28be3999ff35308913e2cfa88af53594b1f7ecc0f24ed6bdaa64991a64b03aac97e89ab1c1c260965fb7f5a3066a569205d841e027defa9c99d8865186ec4695a8b47a5271a95c4c1c62f0dba11c36f750e80a3c5b26504509c9e7183f8475181ae9c11013b76cfb7f1d532077510aa74ad5ce64d48af3765316d62f0f8191496c07aa11907f6e21dbf389309343fe3a1f31863d61bbf846f06f71518ae14993903f00d12cf2f908d645b09731d7f17281be3766670f4fb4344c22a66ba4419f651c69a4a2f820966fbf67b", 0x1000, 0xfffffffffffffffb, 0x0, 0x1, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x5080b8e9, r3, &(0x7f0000000200), 0x0, 0x3ff, 0x0, 0x2, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xbc86323001eac43a, 0x5, r5, &(0x7f0000000300)="e55c0c46ad4b48ce2458422d84c5f7c95ac784bada1eb42cd86d058492f90d9619bb010daf538b7683ba3485b3c18b364f215c164201e933c60906c3db092ddfa2ed0a45c3549ba8fdac980faa677594b3383cb0fd713a913e00ac7e89bd19e52cc972be68cb508c255c259b72a0520bba3f04e743d64a3b711e91b6fa75f1be70fbe43b912d03ebd8e6533789c07cbb569f77decb8a3b116cc4f92eb02723e6c12d805c001eeb3b8e99b725cb355145f305916d7e36030cdff7595d7175acdda512c8c11abf8886ab6c5752c1f7c9cc2877aac4018f03ac687d2225ee40e142580de39921abe2ca90be99d545d90d241be7801adb639efb", 0xf8, 0x7, 0x0, 0x1, r6}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0xffff, r7, &(0x7f00000004c0)="80afedf0974120353efe83dfba2786bfda11e710965a2a29a32aed546ffc71e3196252e259d63d0490", 0x29, 0x1ff, 0x0, 0x1, r8}]) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) write$FUSE_DIRENT(r9, 0x0, 0xb63c667bb5b51836) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf41, 0x0) 06:15:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf41, 0x0) [ 651.759728][ T1909] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000ebffffff00"], 0x24, 0x0) 06:15:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {}, [{0x2, 0x5, r0}, {0x2, 0x2, r0}], {0x2}}, 0x34, 0x0) 06:15:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf41, 0x0) 06:15:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf41, 0x0) 06:15:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xffffffeb}}, 0x24, 0x0) 06:15:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x1c, 0x1, @in6={0xa, 0x4e21, 0x40, @remote, 0xff}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 652.384645][ T1925] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0xf41, 0x0) [ 652.444609][ T1939] QAT: Invalid ioctl 06:15:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf41, 0x0) 06:15:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80800) readv(r0, 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) open_tree(r1, &(0x7f0000000200)='./file0/file0\x00', 0x1000) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x100000000, 0x982d}, 0x8) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 652.538885][ T1943] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf41, 0x0) 06:15:24 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x9, 0x80000) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x81) readv(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x202100) write$FUSE_DIRENT(r1, 0x0, 0x0) 06:15:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000f6ffffff00"], 0x24, 0x0) 06:15:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf41, 0x0) 06:15:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="020000000100000000000000020000000000000010000000000000002000000000000000a9a4d8fc69fbc7e9a5f5d6642a228fe767b3242f707840b1f0959b826646c797a7aa0e53f86911f25abaa47b1bc38873d79c337c2fe23c5bba84b6337d6d9f0a32fc4433fbf72bf5f33a3aa12fcdb1defba738594320ee385091ab51d12c8577f23b2bd2d4d4704348497edd9f2865ccfdad8789f78f50d16d5a7b1235d4c3656e063bc216457264b8797533a90945c91f64e23cf9a3c47851665de50b6e1d19dfbdd5cb929d305fb4be44453b3d9a7765"], 0x24, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1000, 0x121100) connect$vsock_stream(r0, &(0x7f0000000280), 0x10) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000080)={0x1, 0x0, {0x4, 0x7, 0xff, 0x8}}) 06:15:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf41, 0x0) 06:15:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xfffffff6}}, 0x24, 0x0) 06:15:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) ioctl$RTC_PIE_OFF(r1, 0x7006) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='system.posix_acl_access\x00', r0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="02000000010000000000000002001c000000000010000000000000002000000000000000"], 0x1, 0x3) 06:15:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf41, 0x0) 06:15:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) readv(r0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3, 0x88000) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) write$FUSE_DIRENT(r1, 0x0, 0x1a4) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) connect$unix(r1, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 06:15:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0xf41, 0x0) [ 653.454290][ T1969] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:25 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200000) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000180)={0x100000001, 0x7fff, 0xff}) getpeername$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000140)=0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x5a2) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010000000000000002000000000000001000000000000000200000000000263e"], 0x24, 0x0) [ 653.563128][ T1995] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000feffffff00"], 0x24, 0x0) 06:15:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) 06:15:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1004c) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100000000800000020000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x12, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xfffffffe}}, 0x24, 0x0) 06:15:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x1) getpeername$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="020000000100000000000000020000000000000010ff0000000008002000fea19a3870a7050000"], 0x24, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 654.335189][ T2013] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) [ 654.439328][ T2028] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="02000000010000020000000000000000", @ANYRES32=r0, @ANYBLOB="02000000", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r0, @ANYBLOB="020000000000000010000000000000002000000000000000"], 0x3c, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x20, 0x1) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) getdents64(r1, &(0x7f0000000140)=""/225, 0xe1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) 06:15:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) [ 654.716680][ T2041] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 654.921161][ T2047] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000940)=""/4096) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x30) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1, r2}) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x33e, 0x501000) prctl$PR_SET_THP_DISABLE(0x29, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02020000000000000010000000000000002000"/36], 0x19, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'lapb0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000004c0)={0x81d, 0x4, 0x4bce29a6858fb568, 0x1ff, 0x9, 0x10000, 0x1, 0x200, 0x0}, &(0x7f0000000680)=0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000006c0)=@assoc_value={r5, 0x1dd}, &(0x7f0000000700)=0x8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000300)={@local, 0x0}, &(0x7f0000000340)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @empty}, &(0x7f0000000400)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x4e01114bbd3e4d5f, &(0x7f0000000440)={@multicast1, @dev, 0x0}, &(0x7f0000000480)=0xc) recvmsg$kcm(r2, &(0x7f0000000640)={&(0x7f0000000500)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000580)=[{&(0x7f0000001940)=""/4096, 0x1000}], 0x1, &(0x7f00000005c0)=""/71, 0x47}, 0x101) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000780)={'vcan0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000004e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004f40)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000005040)=0xe8) accept4$packet(r0, &(0x7f0000005080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000050c0)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000051c0)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000052c0)=0xe8) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') accept4$packet(r1, &(0x7f0000005340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005380)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000053c0)={'veth1_to_team\x00', 0x0}) getsockname(r1, &(0x7f0000005400)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000005480)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005b80)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000005c80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000006200)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000061c0)={&(0x7f0000005cc0)={0x4f0, r3, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x21}}}]}}, {{0x8, 0x1, r8}, {0x4}}, {{0x8, 0x1, r9}, {0x100, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9b7}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r11}, {0x1ac, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x0, 0x101, 0x4, 0x9}, {0xfff, 0x7, 0x3, 0x3ff}, {0x1f, 0x4, 0x7, 0xd6a}]}}}]}}, {{0x8, 0x1, r14}, {0x7c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff801}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0xc8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x4f0}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 06:15:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf41, 0x0) 06:15:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0xf41, 0x0) 06:15:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x1000000000000}}, 0x24, 0x0) 06:15:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02000002010000000000000002000000000000001000000000000000200000000000000028f8a28a6ef7ec64a308ccdd5c58027a99bccd856b0104acb306a075a1dcfe7af184e99ad7fbad62ece275d6"], 0x24, 0x0) [ 655.249927][ T2058] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf41, 0x0) 06:15:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) accept4$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0x2710, @hyper}, 0x10, 0x80000) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x101000, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0x0, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100120000000000020007000000000010000001000000002000000000000000"], 0x24, 0x0) [ 655.414065][ T2076] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0xf41, 0x0) 06:15:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x40) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0xfff}, &(0x7f00000001c0)=0x8) readahead(r0, 0x5, 0x6) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000020000000000fa21b4141b5d000010000000d30000002000000000000000e001eb2d63b7e5d771adc2e589e9753ca2f4b055be96c6b13eb36f55f74fc9aaa82cd4bb8c33563afdd0f2c9e56ebbb5670dec85c9ff864afc192c63c88191d4f190191e4591c90b6df952b5"], 0x24, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) 06:15:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf41, 0x0) 06:15:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x100000000000000}}, 0x24, 0x0) 06:15:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = getuid() lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRES32=r0, @ANYBLOB="02000300", @ANYRES32=r0, @ANYBLOB="02000200", @ANYRES32=r0, @ANYBLOB="02000400", @ANYRES32=r0, @ANYBLOB="0200021bddda22a800944ae66d48dc46bcd49c4677649613f05e9673a7c8c77db2f990fd5c09cf2ba7e773caea94e83b4a1b3c7f08008a949c6d3baf1bb423259c32052e9aa9b648a8c3276f737583afa7b570643012", @ANYRES32=r0, @ANYBLOB="02000400", @ANYRES32=r0, @ANYBLOB="02000600", @ANYRES32=r0, @ANYBLOB="02000100", @ANYRES32=r0, @ANYBLOB="020000000000000010000000000000002000000000000000"], 0x64, 0x0) [ 656.225033][ T2104] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0xda, 0x1, 0x1}) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhci\x00', 0x101240) readv(r0, 0x0, 0x13) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2000, 0x0) r2 = getpgrp(0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000400)=r2) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000280)={0x0, 0x0, [], @bt={0x1ff, 0x80000000, 0x9, 0xd30, 0x9, 0x9, 0x1, 0x2}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x82, 0x17, &(0x7f0000000140)="890c093f4ca62b87147c89a44087c5683ff8b608a8f71a2b6c3828107ad4ddbedbfeda68c5fd5864331c1fe2992735ccd7d76b884ccca36a9b460b8a71b3b388f68c978ec9b65cb72102adef0ea602cad2ac30cea0355e490db4db65c25b663e44ca4f0174625ae3237689a0510dd4d3ca01409c5d95c69c59c7eb2d4d245db615c8", &(0x7f0000000080)=""/23, 0x4113698}, 0x28) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x1) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x20, 0x4}}, 0x24, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000440)="1dbfaefe4e25e453369d2766f5f6d916", 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x42f1, 0x6, 0x3012, 0x5, 0xc, 0x1, 0x2, 0x5}}) 06:15:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf41, 0x0) 06:15:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) semop(0x0, &(0x7f0000000000)=[{}, {0x0, 0x6}], 0x1f4) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x2}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 656.409390][ T2121] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000fc0)="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", 0x4e0}], 0x1}, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100000000000000020000000000000010100000000000002000000000000000"], 0x24, 0x0) 06:15:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:29 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, 0x0, 0xffffffffffffffa3) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0xf41, 0x0) 06:15:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x200000000000000}}, 0x24, 0x0) 06:15:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="02000000010000be000000000200000000000000100000000000000020e10000007327e62cdc000000"], 0x24, 0x0) 06:15:29 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x48) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f0000000940), 0x1000) socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$nl_crypto(0x10, 0x3, 0x15) readv(r2, 0x0, 0xfffffc3a) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="0200000001000008cfa5000000003ee996cdbc6f215731bf4cd9b2ca532e000200000a00"], 0x24, 0x0) 06:15:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf41, 0x0) 06:15:29 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 657.288153][ T2145] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000001c0)={'veth0_to_bridge\x00', {0x2, 0x4e23, @broadcast}}) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="1b0020000505c1950000f2ffffff000200000000000000a54c58ab1005000000040000001300910db423b08e0e01e2bd62ced78fa022b852fd95f70d6c5e62efa975170e5c49ae94f2e59056ceabef49d2d3b6539bb8cbaa00ec8e6c3b7b7264dfd4364f2e2571c868f37c34fedb5961d7e691ea96162f828b64bb6d1d1e8bef374d988c49c4dc04b9feb5a1b9d1ea8bd3539304dd3acbf8d6dcf4590ade2d9a1d9226580e056d9b6e7fa67523e9f156571ff097e948a26a6ab79df32135c6fbdea3b01b8019"], 0x24, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000200)={0x5, 0x2}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)={0x9}) 06:15:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf41, 0x0) [ 657.402033][ T2166] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x60, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x3b, 0x80) readv(r0, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="02000000010000000000000002000000000000001000ddffffff00002000000000000000"], 0x24, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00', {0x6, 0x7, 0x7ff, 0x3}, 0x1d, [0x2eb800, 0x401, 0x2, 0xdad8, 0x98cc, 0x3, 0x5, 0x7, 0x3, 0x1f, 0x8, 0x4, 0x1, 0x9b35, 0x1, 0xfff, 0xda8c, 0x7f, 0x5, 0x7, 0x10000, 0x7, 0x4, 0x3ff, 0x8, 0x1, 0x401, 0x7ff, 0x0, 0x4, 0x7, 0x0, 0x0, 0x4, 0xfff, 0x8, 0x100, 0xfff, 0xfea3d40000000000, 0x7f, 0x5, 0x5c, 0x401, 0x3f, 0x46, 0x100000000, 0x7fff, 0x1ff, 0xfff, 0x7, 0x4, 0x9, 0x200, 0x8000, 0x80000001, 0x9, 0xfffffffffffff800, 0x8, 0x1, 0x3f, 0x9, 0x2, 0x8001, 0x6], [0x100000001, 0x1, 0x2, 0x2c, 0x2, 0x20, 0x53, 0x54c6, 0xffffffffb54edbcc, 0x0, 0x1, 0x4, 0x1, 0x8001, 0x9624, 0x9, 0x2, 0x3, 0xfffffffffffffffb, 0x7fff, 0x8, 0x4, 0x401, 0x3, 0x6, 0x6, 0xe2, 0x6, 0x2, 0x3, 0x9a2a, 0x100000001, 0x2, 0x9, 0x4, 0x400, 0x4, 0x7, 0x2d, 0x81, 0x1f, 0x81, 0x401, 0x6, 0x2, 0x6, 0x2, 0x44, 0x7, 0x4d, 0x7, 0x4, 0x4e5, 0xffffffff, 0x100000000, 0xa27e, 0x10001, 0x1, 0x3, 0x18ec, 0x8, 0x200, 0x5, 0x1ff], [0x0, 0x0, 0x8, 0x80000000, 0x9, 0xfbb, 0x81, 0xe5a, 0x6c74, 0x8, 0x9, 0x867, 0x4, 0x800, 0x8, 0x81, 0x0, 0x10000, 0x3, 0x1ff, 0x8, 0xd10b, 0x6d, 0x2a2f, 0x7, 0x5, 0x5, 0x5, 0x0, 0xffff, 0x2bf5, 0x2, 0x6, 0xffffffffffff9f16, 0x81, 0x22cf, 0x100000001, 0x8, 0x20, 0x2, 0xffff, 0xaea, 0x0, 0x8, 0xfffffffffffff800, 0x3, 0x9, 0x100000001, 0x100000000, 0x1, 0x1, 0x2, 0x9, 0x4, 0x47, 0x400000000000000, 0x1, 0x6, 0x0, 0x10000, 0xfffffffffffffffe, 0x2, 0x1000, 0x8], [0x1, 0x7ff, 0x3, 0xfff, 0x7, 0x7fff, 0x4, 0x10001, 0x8, 0x7, 0x9, 0x9, 0x9a5a, 0x8, 0xec4, 0x3, 0x5, 0x1000, 0x7, 0x0, 0x7, 0x1000, 0x5, 0x16, 0x2, 0x9, 0x3b, 0x7fffffff, 0x9, 0x6, 0x3, 0x4, 0x7, 0x4, 0x7, 0x4, 0x0, 0x6, 0x7fff, 0x2, 0x40, 0x0, 0x1, 0x0, 0x159, 0x101, 0x4, 0x7, 0x32f, 0x5, 0x3, 0xff, 0xfffffffff2fc26b3, 0xf33, 0xa58, 0x8, 0x8, 0x1f, 0x3f, 0xcf40, 0x6, 0x6, 0xffffffff]}, 0x45c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18200, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000600)={0x0, 0x108e}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x200000007) 06:15:29 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0xf41, 0x0) 06:15:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x300000000000000}}, 0x24, 0x0) 06:15:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0xc7e6, 0x20}, {0x3ff, 0x8}]}, 0x14, 0x18fe61ea1a9df283) r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40128}, 0xc, &(0x7f0000000440)={&(0x7f0000000240)={0x1e8, r1, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x93}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}]}, @TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xbbc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x52a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xee}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7dd1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x20000000}, 0x48001) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 658.157503][ T2188] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2800008}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x148, r1, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6f81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @remote, 0x5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x30c}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x19}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x24bbe171df02dbdf}, 0x4000) write$FUSE_DIRENT(r0, 0x0, 0xfed9) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 06:15:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 658.346225][ T2204] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) getresuid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa, &(0x7f0000000680)=[{&(0x7f0000000140)="9ad6ab7698a73d0cf60b5dcbd53b371e1c4e11980c81ddf3c68982104812b3cd667d2b4158625a46bd88b45f4dc796289a4ec7ca793d254fcc2172bd56e90f48c0a9a4a4eee59f12e391bb5b6aae6d1fd81fd48b1498b113216d3c51e0d985e8d30e11eb1d6b97e9fdacbf89d831a5b3be6ce5bc2d1f05585ea8e0340c6de38e6bb819c082b86d92ef8c639a978ab52b4eb256b406c0902396da8dfda221283762e6c4ee946ce4638e42434c05fd2f5ee4e5e92dd12d91d2efe0a550613de192146349763d2ea0c25d1440b0d0", 0xcd, 0x35f}, {&(0x7f0000000240), 0x0, 0x8}, {&(0x7f0000000280)="8194df85ee7f4c1cc3dc0cf42d6d1a93c7e67eff580be8d7ff4c901b38486b91e24c256855cf11515593d3dc61a92a0a6d4482e10b32c56b728133adfb1767fab45d1b71b73b1e10fb5ae982f13db3de74558a08756c944bf3fc1bbb79235906de3ab4bf9838db61ff72828bfe7de0b91347156597dddbb8f7d7fb379b32da5194b8a44ccacd651c28f6e4a1", 0x8c, 0x2}, {&(0x7f0000000340)="8fa4ae3c0913a538247359839e2dc4141978b287e0398bc95dc0647bb59c03730a41a6c7a08734515e00ea19527bfc69dbfd542dc0f121d88f7e37a178188673f85626f6c1fc1a3460bec17906f9fae815960d48076675eae6b7f2dcc25d088a6ba6aeceb79517e28a22ebcad39e5c341104043e8d127458e4bcd055b974c6ebc9615eb26871dec1a907ac15976febf85bda10c1814c9504275a32b1cfc5d93162fb3335de6b4516b890fb482be33c1085acd9593ef6a2670c77a4a93d8788e7f64cf88fe0309e63302e03a5e7422f74d0cf1ade150f4b4b90a5277a1ca27ce91243ec17e2a9a4156471e2a50987ae1dc0db3084", 0xf4, 0x4}, {&(0x7f0000000440)="6e116fb106b6e5d74e4310ee7f67b1fb7ad89f7cde20d1fc119750d12dec83c0201ac6c813dbe4f1f0ac2f05ad3c1b174e8bfd5cad17ae308b66b36ac60dba6b998672541b3e6612ecdfd4138e14e15f102660ec9485e474918eaaf9c7f3e996f31eb9b867cdd2c42d4e60c51eca1bc360", 0xffffffffffffff62, 0x10000}, {&(0x7f0000000940)="4984a44524ba767ffeed0e8bc60ac4cfb1a84fe6e15ef17df1d7adb0b8f6ca97cb002105f50caa44f553d1e189ac3d52543c76a978bc709261da3c7ad93861d6a1c959566960eb11a888290df7eb3cdc792ef298c0d9302bd2670dd675981453bd3c93919d49976dcec02fccdcb7f2de629f6784d810b95d69c8e43fe1543d6d757d80760e9cec124e098f29f3a09cf69af79bde706a6c236e8b22bef203e84a9ef97170a465d9ef2e2a84538d654705936c8ca710dcc7fe547a88ab13c053ef1fb191abbafcd062d212c144f58ae8823eaea2614094bd2d3e17a0e60bcc2f14d5b8b4417c06302686557c3934217da533e31e3b4c6d3421e2ced1df7f59a466da2922df2f9678fcc4c3d30249f3c9ed6f9be3a4303e0df27c67c90bdff3cbb5f18937ce1d82d6090364cf04d6aeb8c7b2ff60e0c76f13a43fdd6968efd1b3a4c83f232d9c547ecd9beb46e328a7f0f7ee84547c4133338a6edd9a2d1136784e51d212ae681593a5f1bd316f34280086317ee69a3db3e10659c61c09dc9e393e7467c7c2b689e07f369a2be0731733a9b28b36117257c8d04f5f8e3c024cdf9299020313821aa8f4ab56816fb681e418e9022aa074494c1b1fa2fa536e6b7b5751defc32cf8bf96a7a3e8dcb982ba2fc943416028e5f065811f0d39d7579a3ac702007a5d3aea62ddf45cd86bd59103f035520663cf7ded0a364754d3646b8cd7661cfa1fb6c87fbe9f5a9b6d16f06d46c87663ef67e22765971db8133d5597d5836a99d10c9c47f4698a5301eccd29fc9809d182d2da937f598eab478683c62c149f49b325e8f0cd1d5ef517a4cac86e67af34a77ba8dcc5ca6ab3c2c1c1f1369e70a3ef1fc15cf965c8f720c8fe23a7c92ca7936b7b332787c686038d5052af7a0b8f40c5992847c9f6ee965ffbfcc875384dca7e8f8d6592aa7a5b61af18d7bea103f7e261c425973140418d4edd5720ce19f715e687158786c85273f2959c18b9ac3ecb3457a5bb82cf707cbd4a1557c93c8ea0bb71adc4f6fd70b6049def6b963d54388e862325f7e6e1fd599177a14ab249f7b725461a019c63e11703ea40cff78103fd114b80103c08aa5a4ae3875c6c4cb15e60cfa28b802b37d4c4c390308e07ec36bdc7671a1bd76245f2686fd33203ac7e1f4891bb6d00b1c58982bfa97ea32cdf70397e77eb1fc4de1a8587dc1191f5e54308c71d11ed6f50e7045dfb53fb8acdc709a2d862a96d183f93d8cc63ad46af9d993695fd965d67d52d65f37fab743a9309941884854038bf7b32e6ed677e36396e94ca344981dc671cce7344b4bba8c37b4c393977669beb9cc9e18ad94fdf4b82e9f563dac09ccdb59c78923d3a5e8d64ef3a67dbba08e7a2bd43902d97f5837388d27601f085206203b17d07bcb1110e0f9584c75459fbe45be7c195f23071ffc5e3ff185537f4ca3b0251e7b674bc2b4f0dd1b131da40940a81f8292b9347c6b3a70ba416fbd8db062153a0e183106aff57c266e2ed59d2b3635d86b772ee51a033c39e91821f35b9c00c1804020f2e55cb82b4aafc8c8b933a06b98d8fad648656d3b0b0d8ce5fd78e4fd11fd2ef79501bf08658ec384d11581b1ac3fa7c56644e4579a9da6ef80a4cabdb8f6e1524a6eeb92aebf53d58880fc47c37bc3f0c83f71a71427a3557750479c03201a592fd3001cadd58087ecbf32ac06d987e8dd5fffc0b4967d28a0d6dc09a9a9cc8b14bd1263cc8e44486e2340bfdb87d76053b653df53c1ca851be4c9465c6c04d4d7a6768d60dfd5d95aa517bfb873a26b3a889e0e6666d21aa856fdfb3f7b666193116258c67328f159854f977ce4d8a43b2076045b3c766694da6c0c36d7339035973278861611120a432aff45c5320e551ecc8787b70ccb578e0b796054da604498715c0f82309b0807c19f3df3958293fe23f63cbaed6dd4b8abb1ab69edb3d84c25f8e0afbbc55ac43daf13f70a291f4d037285b1dbfd88daf60074171c1d3707025a7cfac32cecb3c505859aeb6a6e003ff7ae06577fd0206a2e14bb7e5ad746f06ef4f6cffbd3396a66fb5850a7cb01f2d612bb45c667a1feea58e2492216638a95923790bbb46710b174a38360f47496783a49e11aa8a51df70385b771a1dbfea7e3dfb97eb38aba4029bf02ed207beb0faa2651a1c18ff1627945aa562ece20157825209fb9c00391f834339401e94e0e61924f81b9e2a9223c64bb2697e19e32a5e9b7a23acedd458c8e0f6c1d5df85181d81d314d2214a6cb57d51307ae6a41cd2676528ad3a76a9c6874d7bf848af7af8eced34b2e253c0689b54972701a3614e0c42d15f43a3d6adfe658ee490767679e3d6b2870fe4bc745feb91e9b7471a15b4e0633beb26178a2fd37217341ec729eed1ec9ed754546a58dd0c6272c89a677cf10b2718c03070f91c7bf4581fc7b81dbcd74b7377b642a50e6a88a095765d64016dce952ab2a00a8af67fabb25323826105f7f25c9a855f6cdcfe00745378e1e6a9ba5ece172c7757fb0138213ce863431cefb26be60441832c1219798e42aae3d60f33bf83b012d88b62e8ed4abf64dc07695caad3bc5bf4851134d1b9da5dbbda4f9a284a913c50eddeac0f2f4706ed286031439b19063e61293ea583156b178d765e1cd196dc3109ca6bdd0a8a0411ea887cee7e602ca07e822dc506bd78027599bc5a121de2df06ae87575738a465807820070159e6f1bef20c18d7d78b048af536f4411fa5453d7ea23fc29ae27a5943f3713b6520342d092d0516ea23af6258a8cb239db2721cfe91e684493e5a4c95e22376cf4c36913e53d62ab36473691b1674a4f15537034acfc8f0840d3c8f1d2e9c7c2471edfb76a54371ff66513c42484aa6494bf64ce0ed7b54c8f0def8a05d3019cf1214dc5a18177099d82086a39622116b1ece333b4f8a95329f116de5fde93da852344ec41c4200b3cb1012886473e50be25b3bde88c88647fc08362c2f0a50a608467eadc92a3d2adee225d41443ef8b47e8461fda2947f82f87207c8c85b12c3c4f2debcbb35f6c83ffadfab19c71b1997cbf137303de2bb59390a02be0206dc05c5d2091a1a5f2b2c8127e5c78cff250a8c78e87243659baafe6ac3f93b9ce70e5b01412cf1239f00b1793ca9d47b2a29c2c65a8a7fdf3d7685244ac6933cee259a92ea20324908c1fb98039c8d16534cb1b21b4ca500e9a16fa690fd2e907128710ba81e9eea57460787a334626abf7e3f53f956c7d60d142e003a6acb50f265858cfa987e2d1c9fc0601608db112eb9e193479dfcf9e56bf7bfa2b5c74b6797946d3c0c5e7f9340cdff310a089483358b3ea767f659324c11804d50ef94468cf494c42ec31683e95b284fa4636c80e0357a6def602a07debd1d83ffa58311e740a6f89587bf2ebf586642c0045c404c7b206d91672b4389b590a959548cda62e8df3e52cee3be78fe32ac866816cbebe2b092fb0e8acdfeb3853b1e791c630b1c206341a399171481644c9112a85ff7aa02be12d59164bea83847238fd7463112e5a2aaf6576065d021eaece77269de8f82076094bd9061c97d9874b32b856f3cd174a8ca1eb13151c215d40f29e4c5005c2fa4474c11fddb46beb6eab56d014fd2234ac56a10033ab88deca3a77813346faa63dd1212c0681f824e75cfd498cdc7d0a94932401bfda826ec28369fd7cc416acc159e535c319fe9f8cd4fb262edf593df86ecbe45113505f8b48453ab5a036b7a7a5224727460fc5041558ecda5d7fbe5f9feac0f49f680a516566ff51af49ea2e9b0b0449db844d69b89808438bce58e9da3dd45b13cd7e8a912b28e1fd16bc6b74da341dbc0235291c99a33d5be4236cdbc79f05bf4c979172e9be76d1ac3f7c025918a1b492ca7a3d66c51d667befc089dd05f9d54510e3fa96e11224916df8db1b09a6fd2dfecf2c4772fb0999d22bfbfea1288ae452574d73512e82544b80e66c8af9c14bc5171f63740c6428920c8e74cc27618f0933214de30c7a95da32a03e09628847f202892cc12a51f8fdcace5d30d586cbb1064c91c854be81376a932d4b0c18da6557d9a5e11e3745f09b66ce55be3d5d34b628dcef1b6e64c5ab59401ec454ba0d049a6e9d937559ce9a796f2e4d38a69d7616f0e7060ec74f7dede69a3ceebac47f17dee04635700fc227cf17d44cec34d6a1ebf0bc3e023dce7cff0eec6ff8cc77df09ea722e3ff2fdd3b36fe6a2a6586be11a9d0ae43aea361d49b360ddff46efd2815db8e66b04ab6eee4eaf15e0a3004e323e87244f826204c2686f047ada69b1a0c57f1619ce4c24c29aecc1b594702beaf5adf4394acad8dbd9d97c3ccbe41d7e352334b66e751267a4a13e9a5cff9d0ede24285545eb12da5f4fabe3b806a7846f116695453fa8a68b0b71270679292715c95ad7f239a3d479c8bf1e16d3bea385857bf90dd945a642573d762b57e615f5f6e1219a755c76ac1a2a28bbd00d08e1dc3d93111c4c5983ba5d2384477c1ba1e48e1b979fcba565b0456d9df70849318212ce4b02a1ff9664cf5d8d57d9155ba45ce23169b76d8221c2dc6909c1d81ac0156bfaac8a5140224cbf8414bd09bf9aa8e5d7a8201adab5f667aa6dc4dde4fa7a928a7a10ee3e52c8e840ac56c1e30d02d0999fb673382a33535a5ba84685ba457d295c9fd92d8c3c73057b94da92b285d285332668d056ff06dea109df18419227a6268267d1892613de4edddbf506cf643270ce3b19594409049a66622c44a007a5dfc828c42484ccd7b29d88a693a2c49e204aa24d88397ff632b0ac121f533cf3ee2844fcf4ad016554471fd207e9b779e435d0a013a2f28d3abb6a126a1f733e18ea18ae1d99235bed2df0156c6207d5b14a55bc0c025f361d644d45f3dd8be665fcfc8afc8bf663da8c3bb52c34aa83ff1fecfbaf4f34a556fdca2382fa5d7da8381d1bbf7f079291d6b0f38924db0753eca925a4dc49c41e735aad24f4678051074e68136c93edc15eabd3f3c1ca107860bb2b2d0d9d57688b4708187d02a2b15ece477506682a0c4798f2b3cc833b965baeb58d84f8fad4757f4cc0f278d068f6964f82fd4772cfbba6d9fc8c7c5dc37045c8af786d03a0d02b84db61c41f916f1cea2f49e71952dc94e950842279aaa22097c8af6f36895352f7ccbd7100c2e2e59f1f4dcde0221db64a1658adf7dcba021e793178f582d27c4306ce483c9c5bea71eebe0fe21a39998e3acf656e50e3496859f15129f3719d017c01b7d5613d3318d85f447a06a0dbcfb58a3a76c53a0a92da228e01b121254283c9a5624439156a8c9b7cf3b104b494c2ca1ed42735d83ae7afaac88d312c45e753ad705382c85081303a253f3b408c074bf67d0ead70fa8e5121dc6f570d2dbcb267f7209a7a9ae5307dd6fb64fabe7c5a1ee0f01a417f61fbd46269081fb72fc5f79bc1024d091db7ee3519f5b6da10f073c14c45faa7a537ada091549f06f67ea1be989197c9195a72b33887abfb53d61497371d72a442b199525f3eddad8f0983cfbcc44ba4dacb53f6158daf42b4372bc33c8e262c6ef9f13607dc3e0ec48a348b8b448d1fb7c35ec783027af0b8fad76543b5e7b29a588c65ee2e4265452689b77dfd16c903c78c1820b430afd79220b55d9aad394b98fb669969dddfbdedcf276b623b7ff7213250199ae8af36c9aa4585e72ba29547f58f6dd077e2bdbce2ccf1b0593418159fb024ff48f1f731a9698c65e1fe7de57d70190cb726e2044881798aa3e4c50a8cd6f89401812cccaf63a66f2", 0xffd, 0x3f}, {&(0x7f00000004c0)="70b1c7f2d30ad4c011791028b6a1e6d373b284edbe4a8d9d868f3e37194531ebf7f5729ccdb962eef3194a18acba59a5ebcb", 0x32, 0xfff}, {&(0x7f0000000500)="a9c161bb21943dab8395d31cd4679504aa0b717f67fabaacd7b4639c598ec2aa0db3284589bc234c00d3b03a180c097fee3a2e4d69a921817c1848dacf10576ed65b66250bc1fe75711801d5c4d52672a83e4ee354162ba77cfd49b589d5b694f357cf207d5ac67ffeda0aceb20f2c9ad8566d7e3154b82a41c3433e71dbcdee183ca3d35e643a0f64b16e311833789a2a13c36a680706f170a96bf7eba5db26f8410f4dc7", 0xa5, 0x146}, {&(0x7f00000005c0)="30c4e082dd6855ac22ee39ccbd9bbbb6ed6bba61e7a852275889e6078aa0983bc0129f917d3ca8ab88cd2a0090ddd4141b641b6aa9a648321a54d79559358399ad042d89170cb61d75e59c75631041faf6b9cefb66406a8db9394664dbce798850cb3a435d2e1ef3b76894b9a3adafe578554966de", 0x75, 0x1}, {&(0x7f0000000640)="0d16ac089cb323fd18b4f0a73e358aec2dcbae", 0x13, 0x2}], 0x60000, &(0x7f0000001a00)={[{@shortname_mixed='shortname=mixed'}, {@uni_xlateno='uni_xlate=0'}, {@utf8no='utf8=0'}, {@uni_xlate='uni_xlate=1'}, {@uni_xlateno='uni_xlate=0'}], [{@audit='audit'}]}) getgroups(0x4, &(0x7f00000019c0)=[0xee00, 0xee00, 0xffffffffffffffff, 0xee00]) lchown(&(0x7f0000000240)='./file0\x00', r0, r1) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100000000004000020000000000000010000000000000030000000000000000"], 0x24, 0x0) r2 = syz_open_dev$radio(&(0x7f0000001980)='/dev/radio#\x00', 0x3, 0x2) getpeername$inet6(r2, &(0x7f00000008c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000001940)=0x1c) 06:15:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x68, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 658.581963][ T2220] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 658.724345][ T2224] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7f, 0x400000) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x7) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x700000000000000}}, 0x24, 0x0) 06:15:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0x3, 0x300) readv(r0, 0x0, 0xfffffffffffffff2) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x208080, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000440)='nbd\x00') openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x240000, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x8, 0x8000) r6 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x8000, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x222001, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x94, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xfffffffffffffffb}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000000) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="0200000001000000000000000200000000000000100000000000006c4c48f97f00000000"], 0x24, 0x0) 06:15:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 659.209965][ T2240] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f0000000080)) readv(r0, 0x0, 0x549) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:15:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="020000000100000000000000020000000000d824a1f63ebf05fdb04cf70000100000000000000020000000000000005491adff01000065eaee3c7c56940b2e9a040ebc23451e5c58012400e1c488f6d56fbd678162b77eaf357cf334c5482a4d6c5043d0112319c98871985a797fd853a05434dd52b5e87d40cc1d19fae471b30d188954502ecca3965971a2a8b6e84fd6ac3dabe82777bbf901ef1a5c29ff24"], 0x24, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7, 0x10000) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x2) write$FUSE_WRITE(r0, &(0x7f0000000140)={0x18, 0x0, 0x7, {0x400000000}}, 0x18) [ 659.414124][ T2257] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x3ff, @dev={0xfe, 0x80, [], 0x28}, 0x80}}, [0x2, 0x18, 0x4, 0x80000000, 0x5, 0x9, 0x846c, 0x9, 0x1f, 0x4, 0x0, 0x9, 0x9, 0x7, 0x6]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000280)={r2, 0x3}, &(0x7f00000002c0)=0x8) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2, 0x0) write$FUSE_DIRENT(r3, 0x0, 0xdbd1abc040a75c6) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) r4 = msgget(0x2, 0x5781b3f695ef70db) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000500)={0x7d, "e91b6dc0b7d9d4dcb52ad7ec4585a943a714a817d10e72cce39fe48a5ac01fe12b4bd6096ca1d3269b52db10e9b0da11378f90499c990ad047691f56499874d4bfb24e5714a72e0719e00fa7f57b859afd20bf0b851f53676fc640f8628395fb6442f4c07586970df3c0f2cfe05d0174334138fd8c72c7517b9403c5a28a2a70"}) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000400)=""/216) read(r1, &(0x7f00000005c0)=""/17, 0x11) 06:15:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x74, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x4000000000000000}}, 0x24, 0x0) 06:15:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:15:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0xdac9) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 660.179678][ T2282] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 660.328930][ T2299] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:32 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x80, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x42d846b71c678429) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0xffffffffffffffc0, 0x84000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0xdd004c0c4f6e8e5d, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x244000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x100000002) readv(0xffffffffffffffff, 0x0, 0xffffffe5) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="020000000100000000000a0000002000000000000000552afb4d35ca8ecd5ce31e895dcebd218af2938ea604cce3b3b4fa736b6481bed2dd1f8da4b7d6ec23fde1d78412a4c302e5f6324f0e39d92a9d678e7d7740"], 0x24, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x8) 06:15:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 660.658064][ T2310] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 660.788909][ T2315] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000040)=@sco, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/21, 0x15}, {&(0x7f0000000180)=""/113, 0x71}, {&(0x7f0000000200)=""/44, 0x2c}, {&(0x7f0000000240)=""/122, 0x7a}, {&(0x7f00000002c0)=""/15, 0xf}, {&(0x7f0000000300)=""/12, 0xc}], 0x6, &(0x7f00000003c0)=""/28, 0x1c}, 0x2000) r1 = syz_open_dev$usb(&(0x7f0000000440)='/dev/bus/usb/00#/00#\x00', 0x9, 0x20000) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000480)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 06:15:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x90, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0x8cffffff00000000}}, 0x24, 0x0) 06:15:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 06:15:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) [ 661.117450][ T2334] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 06:15:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x138, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) [ 661.354190][ T2355] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 661.503923][ T2364] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000ff"], 0x24, 0x0) 06:15:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 06:15:33 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1a8, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xebffffff00000000}}, 0x24, 0x0) 06:15:34 executing program 1: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) [ 662.079619][ T2378] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 06:15:34 executing program 1: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:34 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:34 executing program 1: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) [ 662.252784][ T2394] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 06:15:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000ff"], 0x24, 0x0) 06:15:34 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:34 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x257, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 06:15:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xf6ffffff00000000}}, 0x24, 0x0) 06:15:34 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 663.052823][ T2415] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:35 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x1001, 0x0) 06:15:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 663.205081][ T2434] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 06:15:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000ff"], 0x24, 0x0) 06:15:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 06:15:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xfeffffff00000000}}, 0x24, 0x0) 06:15:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) [ 664.040271][ T2452] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 06:15:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 664.189734][ T2471] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000ff"], 0x24, 0x0) 06:15:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:15:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 06:15:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x380, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 06:15:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x10, 0x0, 0xffffffff00000000}}, 0x24, 0x0) 06:15:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 665.016191][ T2492] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 06:15:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 665.152727][ T2512] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000000000ff"], 0x24, 0x0) 06:15:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 06:15:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f1, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 06:15:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x2}}, 0x24, 0x0) 06:15:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x4}}, 0x24, 0x0) 06:15:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 665.978534][ T2540] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 06:15:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x8}}, 0x24, 0x0) [ 666.111764][ T2556] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 06:15:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f2, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x10}}, 0x24, 0x0) 06:15:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000002000000"], 0x24, 0x0) 06:15:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 06:15:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x2}}, 0x24, 0x0) 06:15:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 666.953536][ T2575] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 06:15:38 executing program 1: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:39 executing program 1: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) [ 667.101206][ T2598] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 06:15:39 executing program 1: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3fe, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:39 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) [ 667.345424][ T2615] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 667.481446][ T2621] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000003000000"], 0x24, 0x0) 06:15:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 06:15:39 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 06:15:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x3}}, 0x24, 0x0) 06:15:39 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) [ 667.874590][ T2632] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 06:15:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 06:15:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) [ 668.078184][ T2653] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 06:15:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000007000000"], 0x24, 0x0) 06:15:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 06:15:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 06:15:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x7}}, 0x24, 0x0) 06:15:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 668.840043][ T2675] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 06:15:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}, [], {}, {0x10}}, 0x24, 0x0) 06:15:40 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 668.975315][ T2691] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000030000"], 0x24, 0x0) 06:15:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 06:15:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 06:15:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x300}}, 0x24, 0x0) 06:15:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x700}}, 0x24, 0x0) [ 669.794087][ T2712] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 06:15:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 06:15:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:41 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x4000}}, 0x24, 0x0) [ 669.952179][ T2731] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000070000"], 0x24, 0x0) 06:15:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 06:15:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 06:15:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x880, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:42 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x1000000}}, 0x24, 0x0) 06:15:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 670.761847][ T2754] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 06:15:42 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 06:15:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 671.022500][ T2770] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 06:15:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 06:15:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000003f0000"], 0x24, 0x0) 06:15:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x900, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 06:15:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x2000000}}, 0x24, 0x0) 06:15:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 671.788546][ T2796] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 671.917736][ T2809] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 06:15:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000400000"], 0x24, 0x0) 06:15:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:44 executing program 2: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 06:15:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x3000000}}, 0x24, 0x0) 06:15:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:44 executing program 2: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 06:15:44 executing program 2: lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 672.736243][ T2830] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:44 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 06:15:44 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 672.929711][ T2848] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000001"], 0x24, 0x0) 06:15:45 executing program 2: mkdirat(0xffffffffffffff9c, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 06:15:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:45 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x7000000}}, 0x24, 0x0) 06:15:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 673.684095][ T2868] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 06:15:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 673.879662][ T2880] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000002"], 0x24, 0x0) 06:15:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 06:15:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x40000000}}, 0x24, 0x0) 06:15:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 674.673700][ T2897] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 674.795073][ T2915] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000003"], 0x24, 0x0) 06:15:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000070000000000"], 0x24, 0x0) 06:15:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 06:15:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x8cffffff}}, 0x24, 0x0) 06:15:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xebffffff}}, 0x24, 0x0) 06:15:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 675.608074][ T2937] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xf6ffffff}}, 0x24, 0x0) 06:15:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 06:15:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xfeffffff}}, 0x24, 0x0) [ 675.744130][ T2951] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 675.999936][ T2966] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 676.127154][ T2969] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000007"], 0x24, 0x0) 06:15:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xffffff8c}}, 0x24, 0x0) 06:15:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 06:15:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf42, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x0) write$FUSE_DIRENT(r0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) 06:15:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xffffffeb}}, 0x24, 0x0) 06:15:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(0xffffffffffffffff, 0x0, 0x7, 0x0) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) stat(&(0x7f0000000480)='./file0/file0\x00', 0x0) [ 676.592997][ T2985] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:48 executing program 1: readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xfffffff6}}, 0x24, 0x0) 06:15:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000000000003f"], 0x24, 0x0) 06:15:48 executing program 1: readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 676.743440][ T3001] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xfffffffe}}, 0x24, 0x0) 06:15:48 executing program 1: readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 676.954290][ T3022] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 677.079371][ T3025] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:49 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:49 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x1000000000000}}, 0x24, 0x0) 06:15:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 677.367962][ T3032] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 677.393953][ T3037] FAULT_INJECTION: forcing a failure. [ 677.393953][ T3037] name failslab, interval 1, probability 0, space 0, times 0 [ 677.407804][ T3037] CPU: 0 PID: 3037 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 677.415724][ T3037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.425784][ T3037] Call Trace: [ 677.429083][ T3037] dump_stack+0x1d8/0x2f8 [ 677.433421][ T3037] should_fail+0x555/0x770 [ 677.437844][ T3037] __should_failslab+0x11a/0x160 [ 677.442783][ T3037] ? __se_sys_memfd_create+0x10a/0x4b0 [ 677.448246][ T3037] should_failslab+0x9/0x20 [ 677.452753][ T3037] __kmalloc+0x7a/0x340 [ 677.456917][ T3037] __se_sys_memfd_create+0x10a/0x4b0 [ 677.462201][ T3037] ? do_syscall_64+0x1d/0x140 [ 677.466874][ T3037] __x64_sys_memfd_create+0x5b/0x70 [ 677.472080][ T3037] do_syscall_64+0xfe/0x140 [ 677.476588][ T3037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.482477][ T3037] RIP: 0033:0x459829 [ 677.486375][ T3037] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.506000][ T3037] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 06:15:49 executing program 0 (fault-call:1 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:49 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 677.514409][ T3037] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 677.522377][ T3037] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 677.530352][ T3037] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 677.538319][ T3037] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a9ab3e6d4 [ 677.546299][ T3037] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:49 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 677.639151][ T3044] FAULT_INJECTION: forcing a failure. [ 677.639151][ T3044] name failslab, interval 1, probability 0, space 0, times 0 [ 677.658002][ T3042] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 677.658482][ T3047] FAULT_INJECTION: forcing a failure. [ 677.658482][ T3047] name failslab, interval 1, probability 0, space 0, times 0 06:15:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000040"], 0x24, 0x0) 06:15:49 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 677.670712][ T3044] CPU: 1 PID: 3044 Comm: syz-executor.0 Not tainted 5.3.0-rc4+ #74 [ 677.691323][ T3044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.691328][ T3044] Call Trace: [ 677.691344][ T3044] dump_stack+0x1d8/0x2f8 [ 677.691359][ T3044] should_fail+0x555/0x770 [ 677.691372][ T3044] __should_failslab+0x11a/0x160 [ 677.691383][ T3044] ? getname_flags+0xba/0x640 [ 677.691394][ T3044] should_failslab+0x9/0x20 [ 677.691405][ T3044] kmem_cache_alloc+0x56/0x2e0 [ 677.691416][ T3044] getname_flags+0xba/0x640 [ 677.691428][ T3044] user_path_at_empty+0x2d/0x50 [ 677.691440][ T3044] path_setxattr+0x51/0x1c0 [ 677.691452][ T3044] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 677.691463][ T3044] __x64_sys_lsetxattr+0xc2/0xe0 [ 677.691477][ T3044] do_syscall_64+0xfe/0x140 [ 677.691489][ T3044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.691498][ T3044] RIP: 0033:0x459829 [ 677.691512][ T3044] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.704915][ T3044] RSP: 002b:00007f0463aa4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 677.704925][ T3044] RAX: ffffffffffffffda RBX: 00007f0463aa4c90 RCX: 0000000000459829 [ 677.704931][ T3044] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 [ 677.704937][ T3044] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 677.704943][ T3044] R10: 0000000000000024 R11: 0000000000000246 R12: 00007f0463aa56d4 [ 677.704949][ T3044] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 [ 677.715497][ T3047] CPU: 1 PID: 3047 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 677.847330][ T3047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.857378][ T3047] Call Trace: [ 677.860675][ T3047] dump_stack+0x1d8/0x2f8 [ 677.865025][ T3047] should_fail+0x555/0x770 [ 677.869441][ T3047] __should_failslab+0x11a/0x160 [ 677.874387][ T3047] ? shmem_alloc_inode+0x1b/0x40 [ 677.879325][ T3047] should_failslab+0x9/0x20 [ 677.883832][ T3047] kmem_cache_alloc+0x56/0x2e0 [ 677.888603][ T3047] ? shmem_fallocate+0xc90/0xc90 [ 677.893539][ T3047] shmem_alloc_inode+0x1b/0x40 [ 677.898302][ T3047] ? shmem_fallocate+0xc90/0xc90 [ 677.903235][ T3047] new_inode_pseudo+0x68/0x240 [ 677.908005][ T3047] new_inode+0x28/0x1c0 [ 677.912164][ T3047] ? __kasan_check_read+0x11/0x20 [ 677.917186][ T3047] shmem_get_inode+0x11b/0x700 [ 677.921954][ T3047] ? __alloc_fd+0x58f/0x630 [ 677.926463][ T3047] __shmem_file_setup+0x129/0x280 [ 677.931483][ T3047] shmem_file_setup+0x2f/0x40 [ 677.936157][ T3047] __se_sys_memfd_create+0x28e/0x4b0 [ 677.941435][ T3047] ? do_syscall_64+0x1d/0x140 [ 677.946110][ T3047] __x64_sys_memfd_create+0x5b/0x70 [ 677.951305][ T3047] do_syscall_64+0xfe/0x140 [ 677.955808][ T3047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.961698][ T3047] RIP: 0033:0x459829 [ 677.965589][ T3047] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:15:49 executing program 0 (fault-call:1 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 677.985287][ T3047] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 677.993697][ T3047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 678.001678][ T3047] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 678.009640][ T3047] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 678.017603][ T3047] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a9ab3e6d4 [ 678.025587][ T3047] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:49 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 678.084507][ T3054] FAULT_INJECTION: forcing a failure. [ 678.084507][ T3054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 678.097744][ T3054] CPU: 1 PID: 3054 Comm: syz-executor.0 Not tainted 5.3.0-rc4+ #74 [ 678.105635][ T3054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.115688][ T3054] Call Trace: [ 678.118991][ T3054] dump_stack+0x1d8/0x2f8 [ 678.123331][ T3054] should_fail+0x555/0x770 [ 678.127757][ T3054] should_fail_alloc_page+0x55/0x60 [ 678.132954][ T3054] prepare_alloc_pages+0x283/0x470 [ 678.138071][ T3054] __alloc_pages_nodemask+0xb2/0x5d0 [ 678.143361][ T3054] kmem_getpages+0x56/0xa20 [ 678.143372][ T3054] ? trace_lock_release+0x135/0x1a0 [ 678.143383][ T3054] cache_grow_begin+0x7e/0x2c0 [ 678.143397][ T3054] cache_alloc_refill+0x311/0x3f0 [ 678.153070][ T3054] ? check_preemption_disabled+0xb7/0x2a0 [ 678.168617][ T3054] kmem_cache_alloc+0x2b9/0x2e0 [ 678.173472][ T3054] ? getname_flags+0xba/0x640 [ 678.178151][ T3054] getname_flags+0xba/0x640 [ 678.182678][ T3054] user_path_at_empty+0x2d/0x50 [ 678.187530][ T3054] path_setxattr+0x51/0x1c0 [ 678.192036][ T3054] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 678.197755][ T3054] __x64_sys_lsetxattr+0xc2/0xe0 [ 678.202695][ T3054] do_syscall_64+0xfe/0x140 [ 678.207211][ T3054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.213097][ T3054] RIP: 0033:0x459829 06:15:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x100000000000000}}, 0x24, 0x0) 06:15:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 678.216998][ T3054] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.236603][ T3054] RSP: 002b:00007f0463aa4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 678.245019][ T3054] RAX: ffffffffffffffda RBX: 00007f0463aa4c90 RCX: 0000000000459829 [ 678.252994][ T3054] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 [ 678.260958][ T3054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 678.268929][ T3054] R10: 0000000000000024 R11: 0000000000000246 R12: 00007f0463aa56d4 [ 678.276896][ T3054] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 06:15:50 executing program 0 (fault-call:1 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 678.317365][ T3059] FAULT_INJECTION: forcing a failure. [ 678.317365][ T3059] name failslab, interval 1, probability 0, space 0, times 0 [ 678.340486][ T3059] CPU: 1 PID: 3059 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 678.348391][ T3059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.348396][ T3059] Call Trace: [ 678.348414][ T3059] dump_stack+0x1d8/0x2f8 [ 678.348433][ T3059] should_fail+0x555/0x770 [ 678.370476][ T3059] __should_failslab+0x11a/0x160 [ 678.375414][ T3059] ? security_inode_alloc+0x36/0x1e0 [ 678.380701][ T3059] should_failslab+0x9/0x20 [ 678.385206][ T3059] kmem_cache_alloc+0x56/0x2e0 [ 678.389974][ T3059] security_inode_alloc+0x36/0x1e0 [ 678.395098][ T3059] inode_init_always+0x3b5/0x8d0 [ 678.400036][ T3059] ? shmem_fallocate+0xc90/0xc90 [ 678.404972][ T3059] new_inode_pseudo+0x7f/0x240 [ 678.409758][ T3059] new_inode+0x28/0x1c0 [ 678.413911][ T3059] ? __kasan_check_read+0x11/0x20 [ 678.418934][ T3059] shmem_get_inode+0x11b/0x700 [ 678.423695][ T3059] ? __alloc_fd+0x58f/0x630 [ 678.428195][ T3059] __shmem_file_setup+0x129/0x280 [ 678.433309][ T3059] shmem_file_setup+0x2f/0x40 [ 678.437996][ T3059] __se_sys_memfd_create+0x28e/0x4b0 [ 678.443278][ T3059] ? do_syscall_64+0x1d/0x140 [ 678.447960][ T3059] __x64_sys_memfd_create+0x5b/0x70 [ 678.453155][ T3059] do_syscall_64+0xfe/0x140 [ 678.457676][ T3059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.463559][ T3059] RIP: 0033:0x459829 [ 678.467459][ T3059] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.487069][ T3059] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 678.495478][ T3059] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 678.503448][ T3059] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 06:15:50 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 678.511420][ T3059] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 678.519388][ T3059] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a9ab3e6d4 [ 678.527362][ T3059] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 678.578234][ T3063] FAULT_INJECTION: forcing a failure. [ 678.578234][ T3063] name failslab, interval 1, probability 0, space 0, times 0 [ 678.591307][ T3063] CPU: 1 PID: 3063 Comm: syz-executor.0 Not tainted 5.3.0-rc4+ #74 [ 678.599300][ T3063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.599305][ T3063] Call Trace: [ 678.599324][ T3063] dump_stack+0x1d8/0x2f8 [ 678.599344][ T3063] should_fail+0x555/0x770 [ 678.616980][ T3063] __should_failslab+0x11a/0x160 [ 678.617004][ T3063] should_failslab+0x9/0x20 [ 678.631271][ T3063] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 678.634358][ T3070] FAULT_INJECTION: forcing a failure. [ 678.634358][ T3070] name failslab, interval 1, probability 0, space 0, times 0 [ 678.636998][ T3063] ? __kmalloc_node+0x3c/0x60 [ 678.637011][ T3063] __kmalloc_node+0x3c/0x60 [ 678.637028][ T3063] kvmalloc_node+0xcc/0x130 [ 678.654290][ T3063] setxattr+0x1c5/0x440 [ 678.654305][ T3063] ? lock_acquire+0x158/0x250 [ 678.654319][ T3063] ? mnt_want_write+0x4a/0xa0 [ 678.676855][ T3063] ? check_preemption_disabled+0x47/0x2a0 [ 678.682469][ T3066] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 678.682577][ T3063] ? preempt_count_add+0x69/0x160 [ 678.700159][ T3063] ? __mnt_want_write+0x207/0x280 [ 678.700173][ T3063] path_setxattr+0x10b/0x1c0 [ 678.700191][ T3063] __x64_sys_lsetxattr+0xc2/0xe0 [ 678.714706][ T3063] do_syscall_64+0xfe/0x140 [ 678.719213][ T3063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.725095][ T3063] RIP: 0033:0x459829 [ 678.725105][ T3063] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.725116][ T3063] RSP: 002b:00007f0463aa4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 678.751859][ T3063] RAX: ffffffffffffffda RBX: 00007f0463aa4c90 RCX: 0000000000459829 [ 678.751865][ T3063] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 06:15:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 678.751871][ T3063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 678.751876][ T3063] R10: 0000000000000024 R11: 0000000000000246 R12: 00007f0463aa56d4 [ 678.751882][ T3063] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 [ 678.761110][ T3070] CPU: 1 PID: 3070 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 678.784737][ T3070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.784742][ T3070] Call Trace: [ 678.784758][ T3070] dump_stack+0x1d8/0x2f8 [ 678.784776][ T3070] should_fail+0x555/0x770 [ 678.800716][ T3070] __should_failslab+0x11a/0x160 [ 678.800729][ T3070] ? __d_alloc+0x2d/0x6e0 [ 678.800741][ T3070] should_failslab+0x9/0x20 [ 678.800751][ T3070] kmem_cache_alloc+0x56/0x2e0 [ 678.800762][ T3070] __d_alloc+0x2d/0x6e0 [ 678.800777][ T3070] ? lockdep_init_map+0x2a/0x680 [ 678.858210][ T3070] d_alloc_pseudo+0x1d/0x70 [ 678.862713][ T3070] alloc_file_pseudo+0xc3/0x260 [ 678.867583][ T3070] __shmem_file_setup+0x1a2/0x280 [ 678.872605][ T3070] shmem_file_setup+0x2f/0x40 [ 678.877282][ T3070] __se_sys_memfd_create+0x28e/0x4b0 [ 678.882563][ T3070] ? do_syscall_64+0x1d/0x140 [ 678.887241][ T3070] __x64_sys_memfd_create+0x5b/0x70 [ 678.892438][ T3070] do_syscall_64+0xfe/0x140 [ 678.896950][ T3070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.902839][ T3070] RIP: 0033:0x459829 [ 678.906731][ T3070] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:15:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 678.926331][ T3070] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 678.934743][ T3070] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 678.942712][ T3070] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 678.950675][ T3070] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 678.958637][ T3070] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a9ab3e6d4 [ 678.966618][ T3070] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000ffffff8c"], 0x24, 0x0) 06:15:50 executing program 0 (fault-call:1 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:50 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x200000000000000}}, 0x24, 0x0) 06:15:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 679.117623][ T3081] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 679.210470][ T3095] FAULT_INJECTION: forcing a failure. [ 679.210470][ T3095] name failslab, interval 1, probability 0, space 0, times 0 [ 679.250332][ T3095] CPU: 0 PID: 3095 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 679.258266][ T3095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.268323][ T3095] Call Trace: [ 679.271625][ T3095] dump_stack+0x1d8/0x2f8 [ 679.275980][ T3095] should_fail+0x555/0x770 [ 679.280430][ T3095] __should_failslab+0x11a/0x160 [ 679.285384][ T3095] ? __alloc_file+0x2c/0x390 [ 679.289986][ T3095] should_failslab+0x9/0x20 [ 679.294505][ T3095] kmem_cache_alloc+0x56/0x2e0 [ 679.299268][ T3095] ? trace_lock_release+0x135/0x1a0 [ 679.304470][ T3095] __alloc_file+0x2c/0x390 [ 679.308893][ T3095] alloc_empty_file+0xac/0x1b0 [ 679.313662][ T3095] alloc_file+0x60/0x4c0 [ 679.317927][ T3095] alloc_file_pseudo+0x1d4/0x260 [ 679.322883][ T3095] __shmem_file_setup+0x1a2/0x280 [ 679.327922][ T3095] shmem_file_setup+0x2f/0x40 [ 679.332606][ T3095] __se_sys_memfd_create+0x28e/0x4b0 [ 679.337890][ T3095] ? do_syscall_64+0x1d/0x140 [ 679.342568][ T3095] __x64_sys_memfd_create+0x5b/0x70 [ 679.347919][ T3095] do_syscall_64+0xfe/0x140 [ 679.352429][ T3095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.358314][ T3095] RIP: 0033:0x459829 [ 679.362205][ T3095] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.381811][ T3095] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 679.390229][ T3095] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 679.398231][ T3095] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 06:15:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='tystem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 679.406206][ T3095] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 679.414179][ T3095] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a9ab3e6d4 [ 679.422153][ T3095] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='uystem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 679.474914][ T3106] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 679.583205][ T3119] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000ffffffeb"], 0x24, 0x0) 06:15:51 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='syttem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x300000000000000}}, 0x24, 0x0) [ 680.061049][ T3131] FAULT_INJECTION: forcing a failure. [ 680.061049][ T3131] name failslab, interval 1, probability 0, space 0, times 0 [ 680.119866][ T3131] CPU: 1 PID: 3131 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 680.127850][ T3131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.138005][ T3131] Call Trace: [ 680.141438][ T3131] dump_stack+0x1d8/0x2f8 [ 680.145979][ T3131] should_fail+0x555/0x770 [ 680.150417][ T3131] __should_failslab+0x11a/0x160 [ 680.150508][ T3131] ? security_file_alloc+0x36/0x200 [ 680.150553][ T3131] should_failslab+0x9/0x20 [ 680.150604][ T3131] kmem_cache_alloc+0x56/0x2e0 [ 680.150630][ T3131] security_file_alloc+0x36/0x200 [ 680.150648][ T3131] __alloc_file+0xde/0x390 [ 680.165295][ T3131] alloc_empty_file+0xac/0x1b0 [ 680.165338][ T3131] alloc_file+0x60/0x4c0 [ 680.165385][ T3131] alloc_file_pseudo+0x1d4/0x260 [ 680.165402][ T3131] __shmem_file_setup+0x1a2/0x280 [ 680.165431][ T3131] shmem_file_setup+0x2f/0x40 [ 680.203616][ T3131] __se_sys_memfd_create+0x28e/0x4b0 [ 680.208910][ T3131] ? do_syscall_64+0x1d/0x140 [ 680.213683][ T3131] __x64_sys_memfd_create+0x5b/0x70 [ 680.218963][ T3131] do_syscall_64+0xfe/0x140 [ 680.223546][ T3131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.229482][ T3131] RIP: 0033:0x459829 [ 680.233405][ T3131] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.253955][ T3131] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 680.253966][ T3131] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 06:15:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='syutem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:52 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 680.253972][ T3131] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 680.253978][ T3131] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 680.253990][ T3131] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a9ab3e6d4 [ 680.253996][ T3131] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 680.264387][ T3132] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 06:15:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='syssem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000fffffff6"], 0x24, 0x0) [ 680.403815][ T3152] FAULT_INJECTION: forcing a failure. [ 680.403815][ T3152] name failslab, interval 1, probability 0, space 0, times 0 06:15:52 executing program 1 (fault-call:3 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 680.467681][ T3152] CPU: 1 PID: 3152 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 680.475612][ T3152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.485668][ T3152] Call Trace: [ 680.488966][ T3152] dump_stack+0x1d8/0x2f8 [ 680.493314][ T3152] should_fail+0x555/0x770 [ 680.497740][ T3152] __should_failslab+0x11a/0x160 [ 680.502683][ T3152] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 680.508409][ T3152] should_failslab+0x9/0x20 [ 680.512908][ T3152] __kmalloc+0x7a/0x340 [ 680.517073][ T3152] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 680.522816][ T3152] tomoyo_realpath_from_path+0xdc/0x7c0 [ 680.528363][ T3152] tomoyo_path_perm+0x192/0x850 [ 680.533215][ T3152] ? trace_lock_release+0x135/0x1a0 [ 680.538448][ T3152] tomoyo_path_truncate+0x1c/0x20 [ 680.543469][ T3152] security_path_truncate+0xd5/0x150 [ 680.548760][ T3152] do_sys_ftruncate+0x493/0x710 [ 680.553619][ T3152] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 680.559423][ T3152] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 680.564880][ T3152] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 680.570603][ T3152] ? trace_hardirqs_off_caller+0x58/0x80 [ 680.576236][ T3152] ? do_syscall_64+0x1d/0x140 [ 680.580924][ T3152] __x64_sys_ftruncate+0x60/0x70 [ 680.585875][ T3152] do_syscall_64+0xfe/0x140 [ 680.590384][ T3152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.596281][ T3152] RIP: 0033:0x4597f7 [ 680.600176][ T3152] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.619779][ T3152] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 680.628194][ T3152] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 680.636173][ T3152] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 680.644147][ T3152] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 680.652207][ T3152] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 06:15:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system/posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 680.660179][ T3152] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 680.673841][ T3152] ERROR: Out of memory at tomoyo_realpath_from_path. [ 680.721471][ T3170] FAULT_INJECTION: forcing a failure. [ 680.721471][ T3170] name failslab, interval 1, probability 0, space 0, times 0 [ 680.740159][ T3170] CPU: 0 PID: 3170 Comm: syz-executor.1 Not tainted 5.3.0-rc4+ #74 [ 680.748080][ T3170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.748093][ T3170] Call Trace: [ 680.758299][ T3164] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 680.761430][ T3170] dump_stack+0x1d8/0x2f8 [ 680.761445][ T3170] should_fail+0x555/0x770 [ 680.761463][ T3170] __should_failslab+0x11a/0x160 [ 680.779039][ T3170] ? getname_flags+0xba/0x640 [ 680.793729][ T3170] should_failslab+0x9/0x20 [ 680.798235][ T3170] kmem_cache_alloc+0x56/0x2e0 [ 680.803029][ T3170] getname_flags+0xba/0x640 [ 680.807540][ T3170] user_path_at_empty+0x2d/0x50 [ 680.812393][ T3170] path_setxattr+0x51/0x1c0 [ 680.817422][ T3170] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 680.823142][ T3170] __x64_sys_lsetxattr+0xc2/0xe0 [ 680.828080][ T3170] do_syscall_64+0xfe/0x140 [ 680.832595][ T3170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.838493][ T3170] RIP: 0033:0x459829 [ 680.842387][ T3170] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.861991][ T3170] RSP: 002b:00007fedfcca5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd 06:15:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.potix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x700000000000000}}, 0x24, 0x0) [ 680.870402][ T3170] RAX: ffffffffffffffda RBX: 00007fedfcca5c90 RCX: 0000000000459829 [ 680.878400][ T3170] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 [ 680.886375][ T3170] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 680.894521][ T3170] R10: 0000000000000024 R11: 0000000000000246 R12: 00007fedfcca66d4 [ 680.902495][ T3170] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 06:15:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000fffffffe"], 0x24, 0x0) 06:15:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.pouix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:52 executing program 1 (fault-call:3 fault-nth:1): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:52 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_accets\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 681.109271][ T3192] FAULT_INJECTION: forcing a failure. [ 681.109271][ T3192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.122513][ T3192] CPU: 0 PID: 3192 Comm: syz-executor.1 Not tainted 5.3.0-rc4+ #74 [ 681.130409][ T3192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.140468][ T3192] Call Trace: [ 681.140875][ T3195] FAULT_INJECTION: forcing a failure. [ 681.140875][ T3195] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.143770][ T3192] dump_stack+0x1d8/0x2f8 [ 681.161277][ T3192] should_fail+0x555/0x770 [ 681.165706][ T3192] should_fail_alloc_page+0x55/0x60 [ 681.170898][ T3192] prepare_alloc_pages+0x283/0x470 [ 681.176004][ T3192] __alloc_pages_nodemask+0xb2/0x5d0 [ 681.181287][ T3192] kmem_getpages+0x56/0xa20 [ 681.185775][ T3192] ? trace_lock_release+0x135/0x1a0 [ 681.190983][ T3192] cache_grow_begin+0x7e/0x2c0 [ 681.195738][ T3192] cache_alloc_refill+0x311/0x3f0 [ 681.200751][ T3192] ? check_preemption_disabled+0xb7/0x2a0 [ 681.206464][ T3192] kmem_cache_alloc+0x2b9/0x2e0 [ 681.211308][ T3192] ? getname_flags+0xba/0x640 [ 681.215975][ T3192] getname_flags+0xba/0x640 [ 681.220470][ T3192] user_path_at_empty+0x2d/0x50 [ 681.225342][ T3192] path_setxattr+0x51/0x1c0 [ 681.229837][ T3192] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 681.235549][ T3192] __x64_sys_lsetxattr+0xc2/0xe0 [ 681.240500][ T3192] do_syscall_64+0xfe/0x140 [ 681.244993][ T3192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.250873][ T3192] RIP: 0033:0x459829 [ 681.254761][ T3192] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.274366][ T3192] RSP: 002b:00007fedfcca5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 681.282771][ T3192] RAX: ffffffffffffffda RBX: 00007fedfcca5c90 RCX: 0000000000459829 [ 681.290837][ T3192] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 [ 681.298820][ T3192] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 681.306876][ T3192] R10: 0000000000000024 R11: 0000000000000246 R12: 00007fedfcca66d4 [ 681.314957][ T3192] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 [ 681.322978][ T3195] CPU: 1 PID: 3195 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 681.330883][ T3195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.341058][ T3195] Call Trace: [ 681.344354][ T3195] dump_stack+0x1d8/0x2f8 [ 681.348827][ T3195] should_fail+0x555/0x770 [ 681.353255][ T3195] should_fail_alloc_page+0x55/0x60 [ 681.353266][ T3195] prepare_alloc_pages+0x283/0x470 [ 681.353281][ T3195] __alloc_pages_nodemask+0xb2/0x5d0 [ 681.368929][ T3195] kmem_getpages+0x56/0xa20 [ 681.373439][ T3195] cache_grow_begin+0x7e/0x2c0 [ 681.378211][ T3195] cache_alloc_refill+0x311/0x3f0 [ 681.383236][ T3195] ? check_preemption_disabled+0xb7/0x2a0 [ 681.389086][ T3195] __kmalloc+0x318/0x340 [ 681.393328][ T3195] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 681.393341][ T3195] tomoyo_realpath_from_path+0xdc/0x7c0 [ 681.393359][ T3195] tomoyo_path_perm+0x192/0x850 [ 681.404611][ T3195] ? trace_lock_release+0x135/0x1a0 [ 681.404638][ T3195] tomoyo_path_truncate+0x1c/0x20 [ 681.419653][ T3195] security_path_truncate+0xd5/0x150 [ 681.424955][ T3195] do_sys_ftruncate+0x493/0x710 [ 681.428118][ T3203] FAULT_INJECTION: forcing a failure. [ 681.428118][ T3203] name failslab, interval 1, probability 0, space 0, times 0 [ 681.429814][ T3195] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 681.429826][ T3195] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 681.429834][ T3195] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 681.429841][ T3195] ? trace_hardirqs_off_caller+0x58/0x80 [ 681.429849][ T3195] ? do_syscall_64+0x1d/0x140 [ 681.429866][ T3195] __x64_sys_ftruncate+0x60/0x70 [ 681.475034][ T3195] do_syscall_64+0xfe/0x140 [ 681.479634][ T3195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.485554][ T3195] RIP: 0033:0x4597f7 [ 681.489446][ T3195] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:15:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_acceus\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:53 executing program 1 (fault-call:3 fault-nth:2): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 681.509051][ T3195] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 681.517465][ T3195] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 681.525467][ T3195] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 681.533436][ T3195] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 681.541409][ T3195] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 681.549404][ T3195] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 681.558196][ T3203] CPU: 0 PID: 3203 Comm: syz-executor.1 Not tainted 5.3.0-rc4+ #74 [ 681.566100][ T3203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.574208][ T3190] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 681.576166][ T3203] Call Trace: [ 681.576186][ T3203] dump_stack+0x1d8/0x2f8 [ 681.576201][ T3203] should_fail+0x555/0x770 [ 681.576216][ T3203] __should_failslab+0x11a/0x160 [ 681.576234][ T3203] should_failslab+0x9/0x20 [ 681.610195][ T3203] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 681.615934][ T3203] ? __kmalloc_node+0x3c/0x60 [ 681.620618][ T3203] __kmalloc_node+0x3c/0x60 [ 681.625123][ T3203] kvmalloc_node+0xcc/0x130 [ 681.629630][ T3203] setxattr+0x1c5/0x440 [ 681.633794][ T3203] ? lock_acquire+0x158/0x250 [ 681.638982][ T3203] ? mnt_want_write+0x4a/0xa0 [ 681.643660][ T3203] ? check_preemption_disabled+0x47/0x2a0 [ 681.649379][ T3203] ? preempt_count_add+0x69/0x160 [ 681.654401][ T3203] ? __mnt_want_write+0x207/0x280 [ 681.659433][ T3203] path_setxattr+0x10b/0x1c0 [ 681.664029][ T3203] __x64_sys_lsetxattr+0xc2/0xe0 [ 681.668971][ T3203] do_syscall_64+0xfe/0x140 [ 681.673494][ T3203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.679385][ T3203] RIP: 0033:0x459829 [ 681.683279][ T3203] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.702911][ T3203] RSP: 002b:00007fedfcca5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd 06:15:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_accest\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:53 executing program 1 (fault-call:3 fault-nth:3): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 681.711327][ T3203] RAX: ffffffffffffffda RBX: 00007fedfcca5c90 RCX: 0000000000459829 [ 681.719388][ T3203] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 [ 681.727373][ T3203] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 681.735347][ T3203] R10: 0000000000000024 R11: 0000000000000246 R12: 00007fedfcca66d4 [ 681.743316][ T3203] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 06:15:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_accesu\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x4000000000000000}}, 0x24, 0x0) 06:15:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010000000200000004000000000000001000000000000000200000008cffffff"], 0x24, 0x0) 06:15:53 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 681.889410][ T3219] FAULT_INJECTION: forcing a failure. [ 681.889410][ T3219] name failslab, interval 1, probability 0, space 0, times 0 [ 681.931180][ T3224] FAULT_INJECTION: forcing a failure. [ 681.931180][ T3224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.932682][ T3219] CPU: 0 PID: 3219 Comm: syz-executor.1 Not tainted 5.3.0-rc4+ #74 [ 681.952310][ T3219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.952315][ T3219] Call Trace: [ 681.952334][ T3219] dump_stack+0x1d8/0x2f8 [ 681.952348][ T3219] should_fail+0x555/0x770 [ 681.952361][ T3219] __should_failslab+0x11a/0x160 [ 681.952374][ T3219] ? posix_acl_alloc+0x31/0xd0 [ 681.952384][ T3219] should_failslab+0x9/0x20 [ 681.952394][ T3219] __kmalloc+0x7a/0x340 [ 681.952405][ T3219] ? smk_access+0x18c/0x4f0 [ 681.952421][ T3219] posix_acl_alloc+0x31/0xd0 [ 681.979399][ T3219] posix_acl_from_xattr+0xf7/0x4c0 [ 681.979417][ T3219] posix_acl_xattr_set+0x39/0x380 [ 681.992794][ T3219] ? posix_acl_xattr_get+0x520/0x520 [ 681.992804][ T3219] __vfs_setxattr+0x3f1/0x430 [ 681.992818][ T3219] __vfs_setxattr_noperm+0x11b/0x3e0 [ 682.006967][ T3219] ? security_inode_setxattr+0x1b7/0x200 [ 682.006980][ T3219] setxattr+0x33e/0x440 [ 682.007000][ T3219] ? lock_acquire+0x158/0x250 [ 682.027230][ T3219] ? mnt_want_write+0x4a/0xa0 [ 682.027243][ T3219] ? check_preemption_disabled+0x47/0x2a0 [ 682.027259][ T3219] ? preempt_count_add+0x69/0x160 [ 682.046326][ T3219] ? __mnt_want_write+0x207/0x280 [ 682.046341][ T3219] path_setxattr+0x10b/0x1c0 [ 682.046355][ T3219] __x64_sys_lsetxattr+0xc2/0xe0 [ 682.066670][ T3219] do_syscall_64+0xfe/0x140 [ 682.066685][ T3219] entry_SYSCALL_64_after_hwframe+0x49/0xbe 06:15:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x02', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 682.066698][ T3219] RIP: 0033:0x459829 [ 682.085863][ T3219] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.105551][ T3219] RSP: 002b:00007fedfcca5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 682.105561][ T3219] RAX: ffffffffffffffda RBX: 00007fedfcca5c90 RCX: 0000000000459829 [ 682.105566][ T3219] RDX: 0000000020000900 RSI: 0000000020000100 RDI: 00000000200000c0 [ 682.105570][ T3219] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 682.105576][ T3219] R10: 0000000000000024 R11: 0000000000000246 R12: 00007fedfcca66d4 [ 682.105581][ T3219] R13: 00000000004c5c64 R14: 00000000004da528 R15: 0000000000000003 [ 682.113498][ T3224] CPU: 0 PID: 3224 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 682.122107][ T3224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.122112][ T3224] Call Trace: [ 682.122129][ T3224] dump_stack+0x1d8/0x2f8 [ 682.122144][ T3224] should_fail+0x555/0x770 [ 682.122158][ T3224] should_fail_alloc_page+0x55/0x60 [ 682.122168][ T3224] prepare_alloc_pages+0x283/0x470 [ 682.122183][ T3224] __alloc_pages_nodemask+0xb2/0x5d0 [ 682.143309][ T3229] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 682.146206][ T3224] ? percpu_counter_add_batch+0x153/0x170 [ 682.146229][ T3224] alloc_pages_vma+0x4f7/0xca0 [ 682.175398][ T3224] shmem_alloc_and_acct_page+0x42c/0xbc0 [ 682.175424][ T3224] shmem_getpage_gfp+0x1270/0x2c00 [ 682.175448][ T3224] shmem_write_begin+0xcb/0x1b0 [ 682.184332][ T3224] generic_perform_write+0x25d/0x4e0 [ 682.184351][ T3224] __generic_file_write_iter+0x24b/0x520 [ 682.184365][ T3224] generic_file_write_iter+0x445/0x5d0 [ 682.184381][ T3224] __vfs_write+0x5a1/0x740 [ 682.212510][ T3224] vfs_write+0x275/0x590 [ 682.212524][ T3224] __x64_sys_pwrite64+0x162/0x1d0 [ 682.212537][ T3224] do_syscall_64+0xfe/0x140 [ 682.212555][ T3224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.228654][ T3224] RIP: 0033:0x413777 [ 682.243853][ T3224] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 682.243859][ T3224] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 682.243869][ T3224] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 682.243875][ T3224] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 06:15:54 executing program 1 (fault-call:3 fault-nth:4): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000ebffffff"], 0x24, 0x0) 06:15:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x8cffffff00000000}}, 0x24, 0x0) [ 682.243880][ T3224] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 682.243886][ T3224] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 682.243896][ T3224] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x03', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='tystem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\a', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:54 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 682.549690][ T3249] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue [ 682.570923][ T3270] FAULT_INJECTION: forcing a failure. [ 682.570923][ T3270] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.599309][ T3270] CPU: 1 PID: 3270 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 682.607412][ T3270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.617473][ T3270] Call Trace: [ 682.620775][ T3270] dump_stack+0x1d8/0x2f8 [ 682.625377][ T3270] should_fail+0x555/0x770 [ 682.629827][ T3270] should_fail_alloc_page+0x55/0x60 [ 682.635034][ T3270] prepare_alloc_pages+0x283/0x470 [ 682.640151][ T3270] __alloc_pages_nodemask+0xb2/0x5d0 [ 682.645442][ T3270] ? percpu_counter_add_batch+0x153/0x170 [ 682.651170][ T3270] alloc_pages_vma+0x4f7/0xca0 [ 682.655980][ T3270] shmem_alloc_and_acct_page+0x42c/0xbc0 [ 682.661638][ T3270] shmem_getpage_gfp+0x1270/0x2c00 [ 682.666768][ T3270] shmem_write_begin+0xcb/0x1b0 [ 682.671625][ T3270] generic_perform_write+0x25d/0x4e0 [ 682.676926][ T3270] __generic_file_write_iter+0x24b/0x520 [ 682.682574][ T3270] generic_file_write_iter+0x445/0x5d0 [ 682.688043][ T3270] __vfs_write+0x5a1/0x740 [ 682.692503][ T3270] vfs_write+0x275/0x590 [ 682.696839][ T3270] __x64_sys_pwrite64+0x162/0x1d0 [ 682.701877][ T3270] do_syscall_64+0xfe/0x140 [ 682.706388][ T3270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.712301][ T3270] RIP: 0033:0x413777 [ 682.716198][ T3270] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 682.735811][ T3270] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 06:15:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3801, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='uystem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 682.749544][ T3270] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 682.757525][ T3270] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 682.765595][ T3270] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 682.774385][ T3270] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 682.782380][ T3270] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='syttem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 682.965372][ T3284] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 683.117242][ T3289] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000f6ffffff"], 0x24, 0x0) 06:15:55 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='syutem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xebffffff00000000}}, 0x24, 0x0) [ 683.337631][ T3308] FAULT_INJECTION: forcing a failure. [ 683.337631][ T3308] name failslab, interval 1, probability 0, space 0, times 0 [ 683.339654][ T3303] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 683.350263][ T3308] CPU: 0 PID: 3308 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 683.350270][ T3308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.350274][ T3308] Call Trace: [ 683.350293][ T3308] dump_stack+0x1d8/0x2f8 [ 683.350308][ T3308] should_fail+0x555/0x770 [ 683.350326][ T3308] __should_failslab+0x11a/0x160 [ 683.397927][ T3308] ? xas_create+0x1197/0x1910 [ 683.402610][ T3308] should_failslab+0x9/0x20 [ 683.407143][ T3308] kmem_cache_alloc+0x56/0x2e0 [ 683.411944][ T3308] xas_create+0x1197/0x1910 [ 683.416459][ T3308] xas_create_range+0x142/0x700 [ 683.421323][ T3308] shmem_add_to_page_cache+0x8e1/0x1230 [ 683.426918][ T3308] shmem_getpage_gfp+0x184b/0x2c00 [ 683.432049][ T3308] shmem_write_begin+0xcb/0x1b0 [ 683.436903][ T3308] generic_perform_write+0x25d/0x4e0 [ 683.442195][ T3308] __generic_file_write_iter+0x24b/0x520 [ 683.447835][ T3308] generic_file_write_iter+0x445/0x5d0 [ 683.453428][ T3308] __vfs_write+0x5a1/0x740 [ 683.453452][ T3308] vfs_write+0x275/0x590 [ 683.462093][ T3308] __x64_sys_pwrite64+0x162/0x1d0 [ 683.462108][ T3308] do_syscall_64+0xfe/0x140 [ 683.462131][ T3308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.462140][ T3308] RIP: 0033:0x413777 06:15:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 683.462150][ T3308] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 683.462155][ T3308] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 683.462163][ T3308] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 683.462169][ T3308] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 683.462181][ T3308] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 06:15:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='syssem.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 683.471701][ T3308] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 683.471706][ T3308] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:55 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xf6ffffff00000000}}, 0x24, 0x0) 06:15:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system/posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 683.619297][ T3319] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000feffffff"], 0x24, 0x0) 06:15:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.potix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:56 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 684.397184][ T3345] FAULT_INJECTION: forcing a failure. [ 684.397184][ T3345] name failslab, interval 1, probability 0, space 0, times 0 06:15:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 684.436258][ T3346] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.pouix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 684.501226][ T3345] CPU: 1 PID: 3345 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 684.509250][ T3345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.519309][ T3345] Call Trace: [ 684.522612][ T3345] dump_stack+0x1d8/0x2f8 [ 684.527238][ T3345] should_fail+0x555/0x770 [ 684.531671][ T3345] __should_failslab+0x11a/0x160 [ 684.536744][ T3345] ? getname_flags+0xba/0x640 [ 684.541431][ T3345] should_failslab+0x9/0x20 [ 684.545939][ T3345] kmem_cache_alloc+0x56/0x2e0 [ 684.550707][ T3345] ? check_preemption_disabled+0xb7/0x2a0 [ 684.556433][ T3345] getname_flags+0xba/0x640 [ 684.560941][ T3345] getname+0x19/0x20 [ 684.564924][ T3345] do_sys_open+0x261/0x560 [ 684.569353][ T3345] __x64_sys_open+0x87/0x90 [ 684.573868][ T3345] do_syscall_64+0xfe/0x140 [ 684.578376][ T3345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.584299][ T3345] RIP: 0033:0x413711 06:15:56 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xfeffffff00000000}}, 0x24, 0x0) [ 684.588198][ T3345] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 684.607799][ T3345] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 684.607810][ T3345] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 684.607816][ T3345] RDX: 00007f5a9ab3db0a RSI: 0000000000000002 RDI: 00007f5a9ab3db00 [ 684.607821][ T3345] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 684.607827][ T3345] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 06:15:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_accets\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xff', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 684.607839][ T3345] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:56 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xff', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 684.723500][ T3371] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 684.789159][ T3382] FAULT_INJECTION: forcing a failure. [ 684.789159][ T3382] name failslab, interval 1, probability 0, space 0, times 0 [ 684.816468][ T3382] CPU: 1 PID: 3382 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 684.824390][ T3382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.834441][ T3382] Call Trace: [ 684.834460][ T3382] dump_stack+0x1d8/0x2f8 [ 684.834476][ T3382] should_fail+0x555/0x770 [ 684.834501][ T3382] __should_failslab+0x11a/0x160 [ 684.846488][ T3382] ? security_file_alloc+0x36/0x200 [ 684.846502][ T3382] should_failslab+0x9/0x20 [ 684.846512][ T3382] kmem_cache_alloc+0x56/0x2e0 [ 684.846529][ T3382] security_file_alloc+0x36/0x200 [ 684.870888][ T3382] __alloc_file+0xde/0x390 [ 684.875309][ T3382] alloc_empty_file+0xac/0x1b0 [ 684.880071][ T3382] path_openat+0x9e/0x4460 [ 684.884487][ T3382] ? __kasan_kmalloc+0x178/0x1b0 [ 684.889433][ T3382] ? __kasan_kmalloc+0x11c/0x1b0 [ 684.894367][ T3382] ? kasan_slab_alloc+0xf/0x20 [ 684.899128][ T3382] ? kmem_cache_alloc+0x1f5/0x2e0 [ 684.904155][ T3382] ? getname+0x19/0x20 [ 684.908223][ T3382] ? do_sys_open+0x261/0x560 [ 684.912839][ T3382] ? do_syscall_64+0xfe/0x140 [ 684.917515][ T3382] ? trace_lock_release+0x135/0x1a0 [ 684.922713][ T3382] ? generic_file_write_iter+0x450/0x5d0 [ 684.928357][ T3382] ? __kasan_check_write+0x14/0x20 [ 684.933478][ T3382] ? trace_lock_release+0x135/0x1a0 [ 684.938678][ T3382] ? __alloc_fd+0x58f/0x630 [ 684.943186][ T3382] do_filp_open+0x192/0x3d0 [ 684.947701][ T3382] ? _raw_spin_unlock+0x2c/0x50 [ 684.952561][ T3382] do_sys_open+0x29f/0x560 [ 684.956990][ T3382] __x64_sys_open+0x87/0x90 [ 684.961493][ T3382] do_syscall_64+0xfe/0x140 [ 684.966003][ T3382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.971905][ T3382] RIP: 0033:0x413711 [ 684.975802][ T3382] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 684.995497][ T3382] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 685.003918][ T3382] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 685.011896][ T3382] RDX: 00007f5a9ab3db0a RSI: 0000000000000002 RDI: 00007f5a9ab3db00 [ 685.019882][ T3382] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 685.027851][ T3382] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 685.035824][ T3382] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_acceus\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xff', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x420f, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:57 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x8c', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_accest\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 685.397984][ T3390] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 685.423110][ T3398] FAULT_INJECTION: forcing a failure. [ 685.423110][ T3398] name failslab, interval 1, probability 0, space 0, times 0 [ 685.465740][ T3398] CPU: 0 PID: 3398 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 685.473675][ T3398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.483735][ T3398] Call Trace: [ 685.487044][ T3398] dump_stack+0x1d8/0x2f8 [ 685.491384][ T3398] should_fail+0x555/0x770 [ 685.495811][ T3398] __should_failslab+0x11a/0x160 [ 685.500758][ T3398] ? __alloc_file+0x2c/0x390 [ 685.505368][ T3398] should_failslab+0x9/0x20 [ 685.509874][ T3398] kmem_cache_alloc+0x56/0x2e0 [ 685.514642][ T3398] __alloc_file+0x2c/0x390 [ 685.519060][ T3398] alloc_empty_file+0xac/0x1b0 [ 685.523848][ T3398] path_openat+0x9e/0x4460 [ 685.528265][ T3398] ? __kasan_kmalloc+0x178/0x1b0 [ 685.533212][ T3398] ? __kasan_kmalloc+0x11c/0x1b0 [ 685.538148][ T3398] ? kasan_slab_alloc+0xf/0x20 [ 685.542935][ T3398] ? kmem_cache_alloc+0x1f5/0x2e0 [ 685.547958][ T3398] ? getname+0x19/0x20 [ 685.552024][ T3398] ? do_sys_open+0x261/0x560 [ 685.556610][ T3398] ? do_syscall_64+0xfe/0x140 [ 685.561558][ T3398] ? trace_mm_page_alloc+0x17a/0x1f0 [ 685.566870][ T3398] ? cache_grow_end+0x143/0x170 [ 685.571723][ T3398] ? trace_lock_release+0x135/0x1a0 [ 685.576921][ T3398] ? cache_grow_end+0x143/0x170 [ 685.581803][ T3398] ? trace_lock_release+0x135/0x1a0 [ 685.586999][ T3398] ? __alloc_fd+0x58f/0x630 [ 685.591510][ T3398] do_filp_open+0x192/0x3d0 [ 685.596022][ T3398] ? _raw_spin_unlock+0x2c/0x50 [ 685.600880][ T3398] do_sys_open+0x29f/0x560 [ 685.605299][ T3398] __x64_sys_open+0x87/0x90 [ 685.609805][ T3398] do_syscall_64+0xfe/0x140 [ 685.614342][ T3398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.620230][ T3398] RIP: 0033:0x413711 [ 685.624121][ T3398] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 685.644253][ T3398] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 685.652667][ T3398] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 06:15:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0xffffffff00000000}}, 0x24, 0x0) 06:15:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xf6', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_accesu\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 685.660637][ T3398] RDX: 00007f5a9ab3db0a RSI: 0000000000000002 RDI: 00007f5a9ab3db00 [ 685.668630][ T3398] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 685.676601][ T3398] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 685.684571][ T3398] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:57 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xfe', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 685.795790][ T3408] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 685.845071][ T3418] FAULT_INJECTION: forcing a failure. [ 685.845071][ T3418] name failslab, interval 1, probability 0, space 0, times 0 [ 685.864148][ T3418] CPU: 0 PID: 3418 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 685.872055][ T3418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.882114][ T3418] Call Trace: [ 685.885418][ T3418] dump_stack+0x1d8/0x2f8 [ 685.889792][ T3418] should_fail+0x555/0x770 [ 685.894223][ T3418] __should_failslab+0x11a/0x160 [ 685.899162][ T3418] ? security_file_alloc+0x36/0x200 [ 685.904363][ T3418] should_failslab+0x9/0x20 [ 685.908865][ T3418] kmem_cache_alloc+0x56/0x2e0 [ 685.913630][ T3418] security_file_alloc+0x36/0x200 [ 685.918653][ T3418] __alloc_file+0xde/0x390 [ 685.923069][ T3418] alloc_empty_file+0xac/0x1b0 [ 685.927865][ T3418] path_openat+0x9e/0x4460 [ 685.932286][ T3418] ? __kasan_kmalloc+0x178/0x1b0 [ 685.937226][ T3418] ? __kasan_kmalloc+0x11c/0x1b0 [ 685.942159][ T3418] ? kasan_slab_alloc+0xf/0x20 [ 685.946927][ T3418] ? kmem_cache_alloc+0x1f5/0x2e0 [ 685.951951][ T3418] ? getname+0x19/0x20 [ 685.956021][ T3418] ? do_sys_open+0x261/0x560 [ 685.960631][ T3418] ? do_syscall_64+0xfe/0x140 [ 685.965312][ T3418] ? trace_mm_page_alloc+0x17a/0x1f0 [ 685.970594][ T3418] ? cache_grow_end+0x143/0x170 [ 685.975440][ T3418] ? trace_lock_release+0x135/0x1a0 [ 685.980638][ T3418] ? cache_grow_end+0x143/0x170 [ 685.985519][ T3418] ? trace_lock_release+0x135/0x1a0 [ 685.990720][ T3418] ? __alloc_fd+0x58f/0x630 [ 685.995229][ T3418] do_filp_open+0x192/0x3d0 [ 685.999733][ T3418] ? _raw_spin_unlock+0x2c/0x50 [ 686.004941][ T3418] do_sys_open+0x29f/0x560 [ 686.009404][ T3418] __x64_sys_open+0x87/0x90 [ 686.013915][ T3418] do_syscall_64+0xfe/0x140 [ 686.018515][ T3418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.024428][ T3418] RIP: 0033:0x413711 [ 686.028324][ T3418] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 686.047932][ T3418] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 686.056350][ T3418] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 686.064327][ T3418] RDX: 00007f5a9ab3db0a RSI: 0000000000000002 RDI: 00007f5a9ab3db00 [ 686.072302][ T3418] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 686.080449][ T3418] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 686.089556][ T3418] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x02', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:58 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 686.289274][ T3426] FAULT_INJECTION: forcing a failure. [ 686.289274][ T3426] name failslab, interval 1, probability 0, space 0, times 0 [ 686.312978][ T3426] CPU: 0 PID: 3426 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 686.320901][ T3426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.330960][ T3426] Call Trace: [ 686.334345][ T3426] dump_stack+0x1d8/0x2f8 [ 686.338684][ T3426] should_fail+0x555/0x770 [ 686.343112][ T3426] __should_failslab+0x11a/0x160 [ 686.348063][ T3426] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 686.353785][ T3426] should_failslab+0x9/0x20 [ 686.358288][ T3426] __kmalloc+0x7a/0x340 [ 686.362446][ T3426] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 686.368164][ T3426] tomoyo_realpath_from_path+0xdc/0x7c0 [ 686.373804][ T3426] tomoyo_check_open_permission+0x1ce/0x9d0 [ 686.379713][ T3426] tomoyo_file_open+0x141/0x190 [ 686.384571][ T3426] security_file_open+0x65/0x2f0 [ 686.389511][ T3426] do_dentry_open+0x34e/0xf90 [ 686.394190][ T3426] vfs_open+0x73/0x80 [ 686.398171][ T3426] path_openat+0x1397/0x4460 [ 686.402766][ T3426] ? getname+0x19/0x20 [ 686.406840][ T3426] ? cache_grow_end+0x143/0x170 [ 686.411787][ T3426] ? trace_lock_release+0x135/0x1a0 [ 686.416988][ T3426] ? __alloc_fd+0x58f/0x630 [ 686.421500][ T3426] do_filp_open+0x192/0x3d0 [ 686.426019][ T3426] do_sys_open+0x29f/0x560 [ 686.430444][ T3426] __x64_sys_open+0x87/0x90 [ 686.434950][ T3426] do_syscall_64+0xfe/0x140 [ 686.439457][ T3426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.445358][ T3426] RIP: 0033:0x413711 [ 686.449249][ T3426] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 686.469033][ T3426] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 686.477452][ T3426] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 06:15:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x03', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 686.485434][ T3426] RDX: 00007f5a9ab3db0a RSI: 0000000000000002 RDI: 00007f5a9ab3db00 [ 686.493406][ T3426] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 686.501378][ T3426] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 686.509359][ T3426] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:15:58 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x2}}, 0x24, 0x0) 06:15:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\a', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 686.552813][ T3428] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 686.576780][ T3426] ERROR: Out of memory at tomoyo_realpath_from_path. 06:15:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:58 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 686.745776][ T3455] FAULT_INJECTION: forcing a failure. [ 686.745776][ T3455] name failslab, interval 1, probability 0, space 0, times 0 [ 686.759068][ T3455] CPU: 1 PID: 3455 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 686.767507][ T3455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.777661][ T3455] Call Trace: [ 686.781000][ T3455] dump_stack+0x1d8/0x2f8 [ 686.785343][ T3455] should_fail+0x555/0x770 [ 686.789765][ T3455] __should_failslab+0x11a/0x160 [ 686.794707][ T3455] ? tomoyo_encode2+0x273/0x5a0 [ 686.799559][ T3455] should_failslab+0x9/0x20 [ 686.804061][ T3455] __kmalloc+0x7a/0x340 [ 686.808224][ T3455] tomoyo_encode2+0x273/0x5a0 [ 686.812906][ T3455] tomoyo_realpath_from_path+0x769/0x7c0 [ 686.818541][ T3455] tomoyo_path_number_perm+0x166/0x640 [ 686.824022][ T3455] ? smack_file_ioctl+0x226/0x2e0 [ 686.829048][ T3455] ? __fget+0x461/0x510 [ 686.833206][ T3455] tomoyo_file_ioctl+0x23/0x30 [ 686.837969][ T3455] security_file_ioctl+0x6d/0xd0 [ 686.842919][ T3455] __x64_sys_ioctl+0xa3/0x120 [ 686.847598][ T3455] do_syscall_64+0xfe/0x140 [ 686.852107][ T3455] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.858001][ T3455] RIP: 0033:0x459697 [ 686.861890][ T3455] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.881495][ T3455] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.889908][ T3455] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 686.897878][ T3455] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 686.905844][ T3455] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 686.913812][ T3455] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 686.921788][ T3455] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 686.942519][ T3455] ERROR: Out of memory at tomoyo_realpath_from_path. 06:15:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:15:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:15:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:15:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:15:59 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:15:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x3}}, 0x24, 0x0) 06:15:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 687.459692][ T3470] FAULT_INJECTION: forcing a failure. [ 687.459692][ T3470] name failslab, interval 1, probability 0, space 0, times 0 [ 687.491842][ T3466] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:15:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 687.523338][ T3470] CPU: 1 PID: 3470 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 687.531268][ T3470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.541327][ T3470] Call Trace: [ 687.544620][ T3470] dump_stack+0x1d8/0x2f8 [ 687.548966][ T3470] should_fail+0x555/0x770 [ 687.553405][ T3470] __should_failslab+0x11a/0x160 [ 687.558352][ T3470] ? tomoyo_encode2+0x273/0x5a0 [ 687.563203][ T3470] should_failslab+0x9/0x20 [ 687.567706][ T3470] __kmalloc+0x7a/0x340 06:15:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 687.571895][ T3470] tomoyo_encode2+0x273/0x5a0 [ 687.571909][ T3470] tomoyo_realpath_from_path+0x769/0x7c0 [ 687.571925][ T3470] tomoyo_check_open_permission+0x1ce/0x9d0 [ 687.571950][ T3470] tomoyo_file_open+0x141/0x190 [ 687.571961][ T3470] security_file_open+0x65/0x2f0 [ 687.571977][ T3470] do_dentry_open+0x34e/0xf90 [ 687.582281][ T3470] vfs_open+0x73/0x80 [ 687.582292][ T3470] path_openat+0x1397/0x4460 [ 687.582307][ T3470] ? getname+0x19/0x20 [ 687.582323][ T3470] ? cache_grow_end+0x143/0x170 06:15:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 687.582341][ T3470] ? trace_lock_release+0x135/0x1a0 [ 687.598001][ T3470] ? __alloc_fd+0x58f/0x630 [ 687.598017][ T3470] do_filp_open+0x192/0x3d0 [ 687.598041][ T3470] do_sys_open+0x29f/0x560 [ 687.611422][ T3470] __x64_sys_open+0x87/0x90 [ 687.611436][ T3470] do_syscall_64+0xfe/0x140 [ 687.611451][ T3470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.611459][ T3470] RIP: 0033:0x413711 06:15:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 687.611469][ T3470] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 687.611474][ T3470] RSP: 002b:00007f5a9ab3da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 687.687162][ T3470] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 687.695146][ T3470] RDX: 00007f5a9ab3db0a RSI: 0000000000000002 RDI: 00007f5a9ab3db00 [ 687.695152][ T3470] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 687.695165][ T3470] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 06:15:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 687.695171][ T3470] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 687.716077][ T3470] ERROR: Out of memory at tomoyo_realpath_from_path. [ 687.879883][ T3489] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 06:16:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:00 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5702, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 688.406998][ T3509] FAULT_INJECTION: forcing a failure. [ 688.406998][ T3509] name failslab, interval 1, probability 0, space 0, times 0 [ 688.430077][ T3509] CPU: 0 PID: 3509 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 688.437990][ T3509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.448046][ T3509] Call Trace: [ 688.451342][ T3509] dump_stack+0x1d8/0x2f8 [ 688.455693][ T3509] should_fail+0x555/0x770 [ 688.460155][ T3509] __should_failslab+0x11a/0x160 [ 688.460172][ T3509] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 688.460186][ T3509] should_failslab+0x9/0x20 [ 688.460198][ T3509] __kmalloc+0x7a/0x340 [ 688.460210][ T3509] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 688.460224][ T3509] tomoyo_realpath_from_path+0xdc/0x7c0 [ 688.460241][ T3509] tomoyo_path_number_perm+0x166/0x640 [ 688.460269][ T3509] ? smack_file_ioctl+0x226/0x2e0 [ 688.470904][ T3509] ? __fget+0x461/0x510 [ 688.479555][ T3509] tomoyo_file_ioctl+0x23/0x30 [ 688.479567][ T3509] security_file_ioctl+0x6d/0xd0 [ 688.479580][ T3509] __x64_sys_ioctl+0xa3/0x120 [ 688.479593][ T3509] do_syscall_64+0xfe/0x140 [ 688.479607][ T3509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.479616][ T3509] RIP: 0033:0x459697 [ 688.479625][ T3509] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.479631][ T3509] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.501321][ T3509] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 688.501327][ T3509] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 688.501332][ T3509] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 688.501338][ T3509] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 688.501344][ T3509] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x7}}, 0x24, 0x0) 06:16:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 688.501628][ T3505] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 688.510788][ T3509] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xff', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 688.700981][ T3523] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:00 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{0x3}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 688.836611][ T3535] FAULT_INJECTION: forcing a failure. [ 688.836611][ T3535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 688.849874][ T3535] CPU: 0 PID: 3535 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 688.857864][ T3535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.867929][ T3535] Call Trace: [ 688.871222][ T3535] dump_stack+0x1d8/0x2f8 [ 688.875563][ T3535] should_fail+0x555/0x770 [ 688.879996][ T3535] should_fail_alloc_page+0x55/0x60 [ 688.885202][ T3535] prepare_alloc_pages+0x283/0x470 [ 688.890492][ T3535] __alloc_pages_nodemask+0xb2/0x5d0 [ 688.890504][ T3535] ? stack_trace_save+0x150/0x150 [ 688.890520][ T3535] kmem_getpages+0x56/0xa20 [ 688.890534][ T3535] cache_grow_begin+0x7e/0x2c0 [ 688.900819][ T3535] cache_alloc_refill+0x311/0x3f0 [ 688.900829][ T3535] ? check_preemption_disabled+0xb7/0x2a0 [ 688.900841][ T3535] __kmalloc+0x318/0x340 [ 688.900852][ T3535] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 688.900863][ T3535] tomoyo_realpath_from_path+0xdc/0x7c0 [ 688.900878][ T3535] tomoyo_path_number_perm+0x166/0x640 [ 688.941728][ T3535] ? smack_file_ioctl+0x226/0x2e0 [ 688.946757][ T3535] ? __fget+0x461/0x510 [ 688.950916][ T3535] tomoyo_file_ioctl+0x23/0x30 [ 688.955677][ T3535] security_file_ioctl+0x6d/0xd0 [ 688.960609][ T3535] __x64_sys_ioctl+0xa3/0x120 [ 688.960622][ T3535] do_syscall_64+0xfe/0x140 [ 688.960636][ T3535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.960644][ T3535] RIP: 0033:0x459697 [ 688.960654][ T3535] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.960665][ T3535] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.969836][ T3535] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 688.969842][ T3535] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 688.969847][ T3535] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 688.969852][ T3535] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 688.969857][ T3535] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{0x4}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xff', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:01 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 689.363164][ T3549] FAULT_INJECTION: forcing a failure. [ 689.363164][ T3549] name failslab, interval 1, probability 0, space 0, times 0 [ 689.378561][ T3544] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 689.389655][ T3549] CPU: 1 PID: 3549 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 689.399426][ T3549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.409586][ T3549] Call Trace: [ 689.409605][ T3549] dump_stack+0x1d8/0x2f8 [ 689.409620][ T3549] should_fail+0x555/0x770 [ 689.409633][ T3549] __should_failslab+0x11a/0x160 [ 689.409645][ T3549] ? tomoyo_encode2+0x273/0x5a0 [ 689.409655][ T3549] should_failslab+0x9/0x20 [ 689.409665][ T3549] __kmalloc+0x7a/0x340 [ 689.409676][ T3549] tomoyo_encode2+0x273/0x5a0 [ 689.409689][ T3549] tomoyo_realpath_from_path+0x769/0x7c0 [ 689.409705][ T3549] tomoyo_path_number_perm+0x166/0x640 [ 689.417340][ T3549] ? smack_file_ioctl+0x226/0x2e0 [ 689.417351][ T3549] ? __fget+0x461/0x510 [ 689.417364][ T3549] tomoyo_file_ioctl+0x23/0x30 [ 689.417379][ T3549] security_file_ioctl+0x6d/0xd0 [ 689.474977][ T3549] __x64_sys_ioctl+0xa3/0x120 [ 689.479681][ T3549] do_syscall_64+0xfe/0x140 [ 689.484189][ T3549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.490081][ T3549] RIP: 0033:0x459697 [ 689.493989][ T3549] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.513623][ T3549] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.513634][ T3549] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 689.513638][ T3549] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 689.513643][ T3549] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 689.513647][ T3549] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 689.513651][ T3549] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x300}}, 0x24, 0x0) 06:16:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x8c', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{0x8}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 689.523776][ T3549] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\xf6', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{0x10}, {}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 689.646892][ T3561] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x2}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:01 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 689.865746][ T3581] FAULT_INJECTION: forcing a failure. [ 689.865746][ T3581] name failslab, interval 1, probability 0, space 0, times 0 [ 689.878718][ T3578] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 689.892042][ T3581] CPU: 1 PID: 3581 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 689.899941][ T3581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.910003][ T3581] Call Trace: [ 689.913299][ T3581] dump_stack+0x1d8/0x2f8 [ 689.917645][ T3581] should_fail+0x555/0x770 [ 689.922071][ T3581] __should_failslab+0x11a/0x160 [ 689.927020][ T3581] ? __kernfs_new_node+0x97/0x6b0 [ 689.932049][ T3581] should_failslab+0x9/0x20 [ 689.936553][ T3581] kmem_cache_alloc+0x56/0x2e0 [ 689.941326][ T3581] __kernfs_new_node+0x97/0x6b0 [ 689.946180][ T3581] ? __kasan_check_write+0x14/0x20 [ 689.951285][ T3581] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 689.956919][ T3581] ? mutex_unlock+0xd/0x10 [ 689.961334][ T3581] ? kernfs_activate+0x213/0x230 [ 689.966273][ T3581] kernfs_new_node+0x97/0x180 [ 689.970957][ T3581] __kernfs_create_file+0x4a/0x2f0 [ 689.976068][ T3581] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 689.981442][ T3581] internal_create_group+0x4be/0xd90 [ 689.987082][ T3581] sysfs_create_group+0x1f/0x30 [ 689.991934][ T3581] loop_set_fd+0xcb2/0x1180 [ 689.996443][ T3581] lo_ioctl+0xd5/0x2200 [ 690.000591][ T3581] ? __kasan_slab_free+0x12a/0x1e0 [ 690.005695][ T3581] ? kasan_slab_free+0xe/0x10 [ 690.010369][ T3581] ? kfree+0x115/0x200 [ 690.014435][ T3581] ? tomoyo_path_number_perm+0x4e1/0x640 [ 690.020061][ T3581] ? tomoyo_file_ioctl+0x23/0x30 [ 690.024999][ T3581] ? security_file_ioctl+0x6d/0xd0 [ 690.030110][ T3581] ? __x64_sys_ioctl+0xa3/0x120 [ 690.034956][ T3581] ? do_syscall_64+0xfe/0x140 [ 690.039633][ T3581] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.045695][ T3581] ? debug_check_no_obj_freed+0x505/0x5b0 [ 690.051418][ T3581] ? trace_lock_release+0x135/0x1a0 [ 690.056625][ T3581] ? debug_check_no_obj_freed+0x505/0x5b0 [ 690.062380][ T3581] ? rcu_lock_release+0x9/0x30 [ 690.067144][ T3581] ? trace_lock_release+0x135/0x1a0 [ 690.072352][ T3581] ? rcu_lock_release+0x9/0x30 [ 690.077124][ T3581] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 690.082758][ T3581] ? lo_release+0x1f0/0x1f0 [ 690.087256][ T3581] blkdev_ioctl+0x807/0x2990 [ 690.091846][ T3581] ? tomoyo_path_number_perm+0x53e/0x640 [ 690.097494][ T3581] block_ioctl+0xbd/0x100 [ 690.101825][ T3581] ? blkdev_iopoll+0x100/0x100 [ 690.106586][ T3581] do_vfs_ioctl+0x744/0x1730 [ 690.111172][ T3581] ? __fget+0x461/0x510 [ 690.115333][ T3581] ? tomoyo_file_ioctl+0x23/0x30 [ 690.120267][ T3581] ? security_file_ioctl+0xa1/0xd0 [ 690.125387][ T3581] __x64_sys_ioctl+0xe3/0x120 [ 690.130065][ T3581] do_syscall_64+0xfe/0x140 [ 690.134573][ T3581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.140459][ T3581] RIP: 0033:0x459697 [ 690.144352][ T3581] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.164042][ T3581] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.172459][ T3581] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 690.180430][ T3581] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 690.188430][ T3581] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 690.196483][ T3581] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 690.204448][ T3581] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x4}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x700}}, 0x24, 0x0) 06:16:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:02 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x6}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) [ 690.529652][ T3600] FAULT_INJECTION: forcing a failure. [ 690.529652][ T3600] name failslab, interval 1, probability 0, space 0, times 0 [ 690.557518][ T3600] CPU: 1 PID: 3600 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 690.565514][ T3600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.575576][ T3600] Call Trace: [ 690.578881][ T3600] dump_stack+0x1d8/0x2f8 [ 690.583226][ T3600] should_fail+0x555/0x770 [ 690.587655][ T3600] __should_failslab+0x11a/0x160 [ 690.592611][ T3600] ? __kernfs_new_node+0x97/0x6b0 [ 690.598339][ T3600] should_failslab+0x9/0x20 [ 690.602846][ T3600] kmem_cache_alloc+0x56/0x2e0 [ 690.607878][ T3600] __kernfs_new_node+0x97/0x6b0 [ 690.612733][ T3600] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 690.618408][ T3600] ? _raw_spin_unlock_irq+0x69/0x80 [ 690.623605][ T3600] ? __schedule+0x998/0xc50 [ 690.628144][ T3600] kernfs_new_node+0x97/0x180 [ 690.632822][ T3600] kernfs_create_dir_ns+0x44/0x130 [ 690.637945][ T3600] internal_create_group+0x207/0xd90 [ 690.643600][ T3600] sysfs_create_group+0x1f/0x30 [ 690.648455][ T3600] loop_set_fd+0xcb2/0x1180 [ 690.652968][ T3600] lo_ioctl+0xd5/0x2200 [ 690.657127][ T3600] ? __kasan_slab_free+0x12a/0x1e0 [ 690.662234][ T3600] ? kasan_slab_free+0xe/0x10 [ 690.666908][ T3600] ? kfree+0x115/0x200 [ 690.671018][ T3600] ? tomoyo_path_number_perm+0x4e1/0x640 [ 690.676660][ T3600] ? tomoyo_file_ioctl+0x23/0x30 [ 690.681684][ T3600] ? security_file_ioctl+0x6d/0xd0 [ 690.686798][ T3600] ? __x64_sys_ioctl+0xa3/0x120 [ 690.691686][ T3600] ? do_syscall_64+0xfe/0x140 [ 690.696364][ T3600] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.702520][ T3600] ? debug_check_no_obj_freed+0x505/0x5b0 [ 690.708421][ T3600] ? trace_lock_release+0x135/0x1a0 [ 690.713738][ T3600] ? debug_check_no_obj_freed+0x505/0x5b0 [ 690.719472][ T3600] ? rcu_lock_release+0x9/0x30 [ 690.724257][ T3600] ? trace_lock_release+0x135/0x1a0 [ 690.729454][ T3600] ? rcu_lock_release+0x9/0x30 [ 690.734230][ T3600] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 690.739869][ T3600] ? lo_release+0x1f0/0x1f0 [ 690.744391][ T3600] blkdev_ioctl+0x807/0x2990 [ 690.748999][ T3600] ? tomoyo_path_number_perm+0x53e/0x640 [ 690.754649][ T3600] block_ioctl+0xbd/0x100 [ 690.759017][ T3600] ? blkdev_iopoll+0x100/0x100 [ 690.764405][ T3600] do_vfs_ioctl+0x744/0x1730 [ 690.769690][ T3600] ? __fget+0x461/0x510 [ 690.773867][ T3600] ? tomoyo_file_ioctl+0x23/0x30 [ 690.778812][ T3600] ? security_file_ioctl+0xa1/0xd0 [ 690.783933][ T3600] __x64_sys_ioctl+0xe3/0x120 [ 690.788629][ T3600] do_syscall_64+0xfe/0x140 [ 690.793149][ T3600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.799045][ T3600] RIP: 0033:0x459697 [ 690.802945][ T3600] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.822579][ T3600] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:16:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x8}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 690.831004][ T3600] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 690.839005][ T3600] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 690.846989][ T3600] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 690.854981][ T3600] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 690.863059][ T3600] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x10}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 690.904104][ T3603] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:02 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 691.071475][ T3621] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 691.084472][ T3624] FAULT_INJECTION: forcing a failure. [ 691.084472][ T3624] name failslab, interval 1, probability 0, space 0, times 0 [ 691.102023][ T3624] CPU: 0 PID: 3624 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 691.109948][ T3624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.120005][ T3624] Call Trace: [ 691.123306][ T3624] dump_stack+0x1d8/0x2f8 [ 691.127742][ T3624] should_fail+0x555/0x770 [ 691.132180][ T3624] __should_failslab+0x11a/0x160 [ 691.137124][ T3624] ? __kernfs_new_node+0x97/0x6b0 [ 691.142151][ T3624] should_failslab+0x9/0x20 [ 691.146777][ T3624] kmem_cache_alloc+0x56/0x2e0 [ 691.151540][ T3624] __kernfs_new_node+0x97/0x6b0 [ 691.156393][ T3624] ? kernfs_add_one+0x49c/0x670 [ 691.161330][ T3624] ? __kasan_check_write+0x14/0x20 [ 691.166441][ T3624] kernfs_new_node+0x97/0x180 [ 691.171119][ T3624] __kernfs_create_file+0x4a/0x2f0 [ 691.176242][ T3624] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 691.181644][ T3624] internal_create_group+0x4be/0xd90 [ 691.186953][ T3624] sysfs_create_group+0x1f/0x30 [ 691.191815][ T3624] loop_set_fd+0xcb2/0x1180 [ 691.196332][ T3624] lo_ioctl+0xd5/0x2200 [ 691.200504][ T3624] ? __kasan_slab_free+0x12a/0x1e0 [ 691.205614][ T3624] ? kasan_slab_free+0xe/0x10 [ 691.210292][ T3624] ? kfree+0x115/0x200 [ 691.214360][ T3624] ? tomoyo_path_number_perm+0x4e1/0x640 [ 691.219995][ T3624] ? tomoyo_file_ioctl+0x23/0x30 [ 691.224931][ T3624] ? security_file_ioctl+0x6d/0xd0 [ 691.230061][ T3624] ? __x64_sys_ioctl+0xa3/0x120 [ 691.234911][ T3624] ? do_syscall_64+0xfe/0x140 [ 691.239591][ T3624] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.245668][ T3624] ? debug_check_no_obj_freed+0x505/0x5b0 [ 691.251399][ T3624] ? trace_lock_release+0x135/0x1a0 [ 691.256610][ T3624] ? debug_check_no_obj_freed+0x505/0x5b0 [ 691.262433][ T3624] ? rcu_lock_release+0x9/0x30 [ 691.267284][ T3624] ? trace_lock_release+0x135/0x1a0 [ 691.272477][ T3624] ? rcu_lock_release+0x9/0x30 [ 691.277256][ T3624] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 691.282905][ T3624] ? lo_release+0x1f0/0x1f0 [ 691.287416][ T3624] blkdev_ioctl+0x807/0x2990 [ 691.292102][ T3624] ? tomoyo_path_number_perm+0x53e/0x640 [ 691.298046][ T3624] block_ioctl+0xbd/0x100 [ 691.302389][ T3624] ? blkdev_iopoll+0x100/0x100 [ 691.307421][ T3624] do_vfs_ioctl+0x744/0x1730 [ 691.312018][ T3624] ? __fget+0x461/0x510 [ 691.316183][ T3624] ? tomoyo_file_ioctl+0x23/0x30 [ 691.321131][ T3624] ? security_file_ioctl+0xa1/0xd0 [ 691.326419][ T3624] __x64_sys_ioctl+0xe3/0x120 [ 691.331102][ T3624] do_syscall_64+0xfe/0x140 [ 691.335616][ T3624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.341513][ T3624] RIP: 0033:0x459697 [ 691.345576][ T3624] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.365618][ T3624] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 691.374034][ T3624] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 691.382010][ T3624] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 691.389983][ T3624] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 691.397962][ T3624] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 691.405937][ T3624] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x4000}}, 0x24, 0x0) 06:16:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x700}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:03 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 691.736587][ T3640] FAULT_INJECTION: forcing a failure. [ 691.736587][ T3640] name failslab, interval 1, probability 0, space 0, times 0 [ 691.757703][ T3640] CPU: 0 PID: 3640 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 691.765625][ T3640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.775692][ T3640] Call Trace: [ 691.778992][ T3640] dump_stack+0x1d8/0x2f8 [ 691.783593][ T3640] should_fail+0x555/0x770 [ 691.788023][ T3640] __should_failslab+0x11a/0x160 [ 691.792981][ T3640] ? __kernfs_new_node+0x97/0x6b0 [ 691.798019][ T3640] should_failslab+0x9/0x20 [ 691.802540][ T3640] kmem_cache_alloc+0x56/0x2e0 [ 691.807308][ T3640] __kernfs_new_node+0x97/0x6b0 [ 691.812165][ T3640] ? __kasan_check_write+0x14/0x20 [ 691.817279][ T3640] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 691.822919][ T3640] ? mutex_unlock+0xd/0x10 [ 691.827343][ T3640] ? kernfs_activate+0x213/0x230 [ 691.832291][ T3640] kernfs_new_node+0x97/0x180 [ 691.836977][ T3640] __kernfs_create_file+0x4a/0x2f0 [ 691.842093][ T3640] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 691.847494][ T3640] internal_create_group+0x4be/0xd90 [ 691.852802][ T3640] sysfs_create_group+0x1f/0x30 [ 691.857664][ T3640] loop_set_fd+0xcb2/0x1180 [ 691.862358][ T3640] lo_ioctl+0xd5/0x2200 [ 691.866522][ T3640] ? __kasan_slab_free+0x12a/0x1e0 [ 691.871639][ T3640] ? kasan_slab_free+0xe/0x10 [ 691.876315][ T3640] ? kfree+0x115/0x200 [ 691.880390][ T3640] ? tomoyo_path_number_perm+0x4e1/0x640 [ 691.886048][ T3640] ? tomoyo_file_ioctl+0x23/0x30 [ 691.890992][ T3640] ? security_file_ioctl+0x6d/0xd0 [ 691.896194][ T3640] ? __x64_sys_ioctl+0xa3/0x120 [ 691.901048][ T3640] ? do_syscall_64+0xfe/0x140 [ 691.905731][ T3640] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.912240][ T3640] ? debug_check_no_obj_freed+0x505/0x5b0 [ 691.918040][ T3640] ? trace_lock_release+0x135/0x1a0 [ 691.923253][ T3640] ? debug_check_no_obj_freed+0x505/0x5b0 [ 691.929424][ T3640] ? rcu_lock_release+0x9/0x30 [ 691.934202][ T3640] ? trace_lock_release+0x135/0x1a0 [ 691.939534][ T3640] ? rcu_lock_release+0x9/0x30 [ 691.944407][ T3640] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 691.950138][ T3640] ? lo_release+0x1f0/0x1f0 [ 691.954651][ T3640] blkdev_ioctl+0x807/0x2990 [ 691.959791][ T3640] ? tomoyo_path_number_perm+0x53e/0x640 [ 691.965563][ T3640] block_ioctl+0xbd/0x100 [ 691.970008][ T3640] ? blkdev_iopoll+0x100/0x100 [ 691.974848][ T3640] do_vfs_ioctl+0x744/0x1730 [ 691.979455][ T3640] ? __fget+0x461/0x510 [ 691.983744][ T3640] ? tomoyo_file_ioctl+0x23/0x30 [ 691.988751][ T3640] ? security_file_ioctl+0xa1/0xd0 [ 691.994575][ T3640] __x64_sys_ioctl+0xe3/0x120 [ 691.999266][ T3640] do_syscall_64+0xfe/0x140 [ 692.003786][ T3640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.009690][ T3640] RIP: 0033:0x459697 [ 692.013714][ T3640] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:16:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0xffffff1f}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 692.033414][ T3640] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.041877][ T3640] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 692.049903][ T3640] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 692.058295][ T3640] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 692.066490][ T3640] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 692.075408][ T3640] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 692.127107][ T3645] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{0x3}, {}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x2}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:04 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 692.309612][ T3659] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 692.338253][ T3664] FAULT_INJECTION: forcing a failure. [ 692.338253][ T3664] name failslab, interval 1, probability 0, space 0, times 0 [ 692.351753][ T3664] CPU: 1 PID: 3664 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 692.359752][ T3664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.370002][ T3664] Call Trace: [ 692.373492][ T3664] dump_stack+0x1d8/0x2f8 [ 692.377964][ T3664] should_fail+0x555/0x770 [ 692.382593][ T3664] __should_failslab+0x11a/0x160 [ 692.387801][ T3664] ? __kernfs_new_node+0x97/0x6b0 [ 692.392945][ T3664] should_failslab+0x9/0x20 [ 692.397655][ T3664] kmem_cache_alloc+0x56/0x2e0 [ 692.402857][ T3664] __kernfs_new_node+0x97/0x6b0 [ 692.408027][ T3664] ? __kasan_check_write+0x14/0x20 [ 692.413160][ T3664] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 692.418966][ T3664] ? mutex_unlock+0xd/0x10 [ 692.423572][ T3664] ? kernfs_activate+0x213/0x230 [ 692.428544][ T3664] kernfs_new_node+0x97/0x180 [ 692.433327][ T3664] __kernfs_create_file+0x4a/0x2f0 [ 692.438455][ T3664] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 692.443844][ T3664] internal_create_group+0x4be/0xd90 [ 692.449291][ T3664] sysfs_create_group+0x1f/0x30 [ 692.454255][ T3664] loop_set_fd+0xcb2/0x1180 [ 692.458974][ T3664] lo_ioctl+0xd5/0x2200 [ 692.463323][ T3664] ? __kasan_slab_free+0x12a/0x1e0 [ 692.468618][ T3664] ? kasan_slab_free+0xe/0x10 [ 692.473485][ T3664] ? kfree+0x115/0x200 [ 692.477774][ T3664] ? tomoyo_path_number_perm+0x4e1/0x640 [ 692.483511][ T3664] ? tomoyo_file_ioctl+0x23/0x30 [ 692.488605][ T3664] ? security_file_ioctl+0x6d/0xd0 [ 692.493730][ T3664] ? __x64_sys_ioctl+0xa3/0x120 [ 692.498595][ T3664] ? do_syscall_64+0xfe/0x140 [ 692.503375][ T3664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.509802][ T3664] ? debug_check_no_obj_freed+0x505/0x5b0 [ 692.515629][ T3664] ? trace_lock_release+0x135/0x1a0 [ 692.520864][ T3664] ? debug_check_no_obj_freed+0x505/0x5b0 [ 692.526734][ T3664] ? rcu_lock_release+0x9/0x30 [ 692.531539][ T3664] ? trace_lock_release+0x135/0x1a0 [ 692.536841][ T3664] ? rcu_lock_release+0x9/0x30 [ 692.541626][ T3664] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 692.547544][ T3664] ? lo_release+0x1f0/0x1f0 [ 692.552248][ T3664] blkdev_ioctl+0x807/0x2990 [ 692.557031][ T3664] ? tomoyo_path_number_perm+0x53e/0x640 [ 692.563211][ T3664] block_ioctl+0xbd/0x100 [ 692.567675][ T3664] ? blkdev_iopoll+0x100/0x100 [ 692.572539][ T3664] do_vfs_ioctl+0x744/0x1730 [ 692.577144][ T3664] ? __fget+0x461/0x510 [ 692.581322][ T3664] ? tomoyo_file_ioctl+0x23/0x30 [ 692.586280][ T3664] ? security_file_ioctl+0xa1/0xd0 [ 692.591604][ T3664] __x64_sys_ioctl+0xe3/0x120 [ 692.596303][ T3664] do_syscall_64+0xfe/0x140 [ 692.600821][ T3664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.606917][ T3664] RIP: 0033:0x459697 [ 692.610836][ T3664] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.631168][ T3664] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.639700][ T3664] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 692.647992][ T3664] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:16:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x2}, [], {}, [], {0x4}}, 0x24, 0x0) [ 692.656066][ T3664] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 692.664665][ T3664] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 692.672840][ T3664] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x1000000}}, 0x24, 0x0) 06:16:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x3}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x4}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:04 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x8}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x7}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 693.032836][ T3678] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x10}, [], {}, [], {0x4}}, 0x24, 0x0) [ 693.102969][ T3690] FAULT_INJECTION: forcing a failure. [ 693.102969][ T3690] name failslab, interval 1, probability 0, space 0, times 0 [ 693.158353][ T3690] CPU: 0 PID: 3690 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 693.166665][ T3690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.177507][ T3690] Call Trace: [ 693.180825][ T3690] dump_stack+0x1d8/0x2f8 [ 693.185354][ T3690] should_fail+0x555/0x770 [ 693.189796][ T3690] __should_failslab+0x11a/0x160 [ 693.194838][ T3690] ? __kernfs_new_node+0x97/0x6b0 [ 693.199877][ T3690] should_failslab+0x9/0x20 [ 693.204492][ T3690] kmem_cache_alloc+0x56/0x2e0 [ 693.209705][ T3690] __kernfs_new_node+0x97/0x6b0 [ 693.214655][ T3690] ? __kasan_check_write+0x14/0x20 [ 693.220001][ T3690] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 693.225667][ T3690] ? mutex_unlock+0xd/0x10 [ 693.230211][ T3690] ? kernfs_activate+0x213/0x230 [ 693.235264][ T3690] kernfs_new_node+0x97/0x180 [ 693.239957][ T3690] __kernfs_create_file+0x4a/0x2f0 [ 693.245086][ T3690] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 693.250514][ T3690] internal_create_group+0x4be/0xd90 [ 693.256049][ T3690] sysfs_create_group+0x1f/0x30 [ 693.261549][ T3690] loop_set_fd+0xcb2/0x1180 [ 693.266605][ T3690] lo_ioctl+0xd5/0x2200 [ 693.270885][ T3690] ? __kasan_slab_free+0x12a/0x1e0 [ 693.276019][ T3690] ? kasan_slab_free+0xe/0x10 [ 693.280955][ T3690] ? kfree+0x115/0x200 [ 693.285214][ T3690] ? tomoyo_path_number_perm+0x4e1/0x640 [ 693.291167][ T3690] ? tomoyo_file_ioctl+0x23/0x30 [ 693.296386][ T3690] ? security_file_ioctl+0x6d/0xd0 [ 693.301718][ T3690] ? __x64_sys_ioctl+0xa3/0x120 [ 693.306588][ T3690] ? do_syscall_64+0xfe/0x140 [ 693.311843][ T3690] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.318035][ T3690] ? debug_check_no_obj_freed+0x505/0x5b0 [ 693.323940][ T3690] ? trace_lock_release+0x135/0x1a0 [ 693.329558][ T3690] ? debug_check_no_obj_freed+0x505/0x5b0 [ 693.335885][ T3690] ? rcu_lock_release+0x9/0x30 [ 693.341114][ T3690] ? trace_lock_release+0x135/0x1a0 [ 693.346609][ T3690] ? rcu_lock_release+0x9/0x30 [ 693.351525][ T3690] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 693.357593][ T3690] ? lo_release+0x1f0/0x1f0 [ 693.362387][ T3690] blkdev_ioctl+0x807/0x2990 [ 693.367445][ T3690] ? tomoyo_path_number_perm+0x53e/0x640 [ 693.373636][ T3690] block_ioctl+0xbd/0x100 [ 693.378167][ T3690] ? blkdev_iopoll+0x100/0x100 [ 693.383060][ T3690] do_vfs_ioctl+0x744/0x1730 [ 693.387848][ T3690] ? __fget+0x461/0x510 [ 693.392339][ T3690] ? tomoyo_file_ioctl+0x23/0x30 [ 693.397729][ T3690] ? security_file_ioctl+0xa1/0xd0 [ 693.402877][ T3690] __x64_sys_ioctl+0xe3/0x120 [ 693.407604][ T3690] do_syscall_64+0xfe/0x140 [ 693.412131][ T3690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.418482][ T3690] RIP: 0033:0x459697 [ 693.422648][ T3690] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.443611][ T3690] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 06:16:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x300}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 693.452314][ T3690] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 693.460717][ T3690] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 693.468871][ T3690] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 693.476865][ T3690] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 693.485190][ T3690] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x700}, [], {}, [], {0x4}}, 0x24, 0x0) [ 693.602978][ T3678] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x700}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x2000000}}, 0x24, 0x0) 06:16:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0xffffff1f}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:05 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x4000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 693.909362][ T3714] FAULT_INJECTION: forcing a failure. [ 693.909362][ T3714] name failslab, interval 1, probability 0, space 0, times 0 [ 693.926111][ T3714] CPU: 1 PID: 3714 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 693.934117][ T3714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.944347][ T3714] Call Trace: [ 693.944369][ T3714] dump_stack+0x1d8/0x2f8 [ 693.944385][ T3714] should_fail+0x555/0x770 [ 693.944401][ T3714] __should_failslab+0x11a/0x160 [ 693.944412][ T3714] ? __kernfs_new_node+0x97/0x6b0 [ 693.944425][ T3714] should_failslab+0x9/0x20 [ 693.944444][ T3714] kmem_cache_alloc+0x56/0x2e0 [ 693.976334][ T3714] __kernfs_new_node+0x97/0x6b0 [ 693.981209][ T3714] ? __kasan_check_write+0x14/0x20 [ 693.986420][ T3714] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 693.992538][ T3714] ? mutex_unlock+0xd/0x10 [ 693.997165][ T3714] ? kernfs_activate+0x213/0x230 [ 694.002121][ T3714] kernfs_new_node+0x97/0x180 [ 694.006810][ T3714] __kernfs_create_file+0x4a/0x2f0 [ 694.012294][ T3714] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 694.017861][ T3714] internal_create_group+0x4be/0xd90 [ 694.023262][ T3714] sysfs_create_group+0x1f/0x30 [ 694.028135][ T3714] loop_set_fd+0xcb2/0x1180 [ 694.032664][ T3714] lo_ioctl+0xd5/0x2200 [ 694.037077][ T3714] ? __kasan_slab_free+0x12a/0x1e0 [ 694.042352][ T3714] ? kasan_slab_free+0xe/0x10 [ 694.047039][ T3714] ? kfree+0x115/0x200 [ 694.051120][ T3714] ? tomoyo_path_number_perm+0x4e1/0x640 [ 694.056935][ T3714] ? tomoyo_file_ioctl+0x23/0x30 [ 694.062055][ T3714] ? security_file_ioctl+0x6d/0xd0 [ 694.067285][ T3714] ? __x64_sys_ioctl+0xa3/0x120 [ 694.072260][ T3714] ? do_syscall_64+0xfe/0x140 [ 694.077209][ T3714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.083475][ T3714] ? debug_check_no_obj_freed+0x505/0x5b0 [ 694.089751][ T3714] ? trace_lock_release+0x135/0x1a0 [ 694.094961][ T3714] ? debug_check_no_obj_freed+0x505/0x5b0 [ 694.100948][ T3714] ? rcu_lock_release+0x9/0x30 [ 694.105729][ T3714] ? trace_lock_release+0x135/0x1a0 [ 694.111139][ T3714] ? rcu_lock_release+0x9/0x30 [ 694.116054][ T3714] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 694.121793][ T3714] ? lo_release+0x1f0/0x1f0 [ 694.126469][ T3714] blkdev_ioctl+0x807/0x2990 [ 694.131079][ T3714] ? tomoyo_path_number_perm+0x53e/0x640 [ 694.136826][ T3714] block_ioctl+0xbd/0x100 [ 694.141360][ T3714] ? blkdev_iopoll+0x100/0x100 [ 694.146138][ T3714] do_vfs_ioctl+0x744/0x1730 [ 694.151129][ T3714] ? __fget+0x461/0x510 [ 694.155300][ T3714] ? tomoyo_file_ioctl+0x23/0x30 [ 694.160432][ T3714] ? security_file_ioctl+0xa1/0xd0 [ 694.165888][ T3714] __x64_sys_ioctl+0xe3/0x120 [ 694.170629][ T3714] do_syscall_64+0xfe/0x140 [ 694.175148][ T3714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.181054][ T3714] RIP: 0033:0x459697 [ 694.185153][ T3714] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:16:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x1000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x2}, [], {}, [], {0x4}}, 0x24, 0x0) [ 694.205796][ T3714] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.214223][ T3714] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 694.222385][ T3714] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 694.230541][ T3714] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 694.238911][ T3714] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 694.247327][ T3714] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x2000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x3}, [], {}, [], {0x4}}, 0x24, 0x0) [ 694.299928][ T3717] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x3000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 694.440012][ T3743] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:06 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 694.644612][ T3751] FAULT_INJECTION: forcing a failure. [ 694.644612][ T3751] name failslab, interval 1, probability 0, space 0, times 0 [ 694.658718][ T3751] CPU: 0 PID: 3751 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 694.667039][ T3751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.677659][ T3751] Call Trace: [ 694.681005][ T3751] dump_stack+0x1d8/0x2f8 [ 694.685449][ T3751] should_fail+0x555/0x770 [ 694.690031][ T3751] __should_failslab+0x11a/0x160 [ 694.694985][ T3751] ? __kernfs_new_node+0x97/0x6b0 [ 694.700461][ T3751] should_failslab+0x9/0x20 [ 694.705213][ T3751] kmem_cache_alloc+0x56/0x2e0 [ 694.711272][ T3751] __kernfs_new_node+0x97/0x6b0 [ 694.716219][ T3751] ? __kasan_check_write+0x14/0x20 [ 694.721569][ T3751] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 694.727324][ T3751] ? mutex_unlock+0xd/0x10 [ 694.731842][ T3751] ? kernfs_activate+0x213/0x230 [ 694.736897][ T3751] kernfs_new_node+0x97/0x180 [ 694.741680][ T3751] __kernfs_create_file+0x4a/0x2f0 [ 694.746891][ T3751] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 694.752510][ T3751] internal_create_group+0x4be/0xd90 [ 694.757906][ T3751] sysfs_create_group+0x1f/0x30 [ 694.762960][ T3751] loop_set_fd+0xcb2/0x1180 [ 694.768109][ T3751] lo_ioctl+0xd5/0x2200 [ 694.772499][ T3751] ? __kasan_slab_free+0x12a/0x1e0 [ 694.777634][ T3751] ? kasan_slab_free+0xe/0x10 [ 694.782585][ T3751] ? kfree+0x115/0x200 [ 694.786749][ T3751] ? tomoyo_path_number_perm+0x4e1/0x640 [ 694.792850][ T3751] ? tomoyo_file_ioctl+0x23/0x30 [ 694.797903][ T3751] ? security_file_ioctl+0x6d/0xd0 [ 694.803379][ T3751] ? __x64_sys_ioctl+0xa3/0x120 [ 694.808561][ T3751] ? do_syscall_64+0xfe/0x140 [ 694.813456][ T3751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.820089][ T3751] ? debug_check_no_obj_freed+0x505/0x5b0 [ 694.825915][ T3751] ? trace_lock_release+0x135/0x1a0 [ 694.831237][ T3751] ? debug_check_no_obj_freed+0x505/0x5b0 [ 694.837099][ T3751] ? rcu_lock_release+0x9/0x30 [ 694.842352][ T3751] ? trace_lock_release+0x135/0x1a0 [ 694.848040][ T3751] ? rcu_lock_release+0x9/0x30 [ 694.852904][ T3751] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 694.858861][ T3751] ? lo_release+0x1f0/0x1f0 [ 694.863409][ T3751] blkdev_ioctl+0x807/0x2990 [ 694.868334][ T3751] ? tomoyo_path_number_perm+0x53e/0x640 [ 694.874445][ T3751] block_ioctl+0xbd/0x100 [ 694.879176][ T3751] ? blkdev_iopoll+0x100/0x100 [ 694.884141][ T3751] do_vfs_ioctl+0x744/0x1730 [ 694.888838][ T3751] ? __fget+0x461/0x510 [ 694.893174][ T3751] ? tomoyo_file_ioctl+0x23/0x30 [ 694.898125][ T3751] ? security_file_ioctl+0xa1/0xd0 [ 694.903256][ T3751] __x64_sys_ioctl+0xe3/0x120 [ 694.907978][ T3751] do_syscall_64+0xfe/0x140 [ 694.912505][ T3751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.918694][ T3751] RIP: 0033:0x459697 [ 694.922604][ T3751] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.942385][ T3751] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.951101][ T3751] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 694.959091][ T3751] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 694.967520][ T3751] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 694.976371][ T3751] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 694.984738][ T3751] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x3000000}}, 0x24, 0x0) 06:16:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x7}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x7000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8003, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:07 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x40000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x300}, [], {}, [], {0x4}}, 0x24, 0x0) [ 695.139915][ T3760] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 695.166687][ T3768] FAULT_INJECTION: forcing a failure. [ 695.166687][ T3768] name failslab, interval 1, probability 0, space 0, times 0 [ 695.192520][ T3768] CPU: 0 PID: 3768 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 695.200461][ T3768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.211435][ T3768] Call Trace: [ 695.214842][ T3768] dump_stack+0x1d8/0x2f8 [ 695.219340][ T3768] should_fail+0x555/0x770 [ 695.224015][ T3768] __should_failslab+0x11a/0x160 [ 695.229076][ T3768] should_failslab+0x9/0x20 [ 695.233759][ T3768] kmem_cache_alloc_trace+0x5d/0x2f0 [ 695.239261][ T3768] ? kobject_uevent_env+0x2cd/0x1260 [ 695.244654][ T3768] ? dev_uevent_filter+0xb0/0xb0 [ 695.249695][ T3768] kobject_uevent_env+0x2cd/0x1260 [ 695.254912][ T3768] kobject_uevent+0x1f/0x30 [ 695.259972][ T3768] loop_set_fd+0xd21/0x1180 [ 695.264588][ T3768] lo_ioctl+0xd5/0x2200 [ 695.268906][ T3768] ? __kasan_slab_free+0x12a/0x1e0 [ 695.274124][ T3768] ? kasan_slab_free+0xe/0x10 [ 695.278998][ T3768] ? kfree+0x115/0x200 [ 695.283123][ T3768] ? tomoyo_path_number_perm+0x4e1/0x640 [ 695.289013][ T3768] ? tomoyo_file_ioctl+0x23/0x30 [ 695.294056][ T3768] ? security_file_ioctl+0x6d/0xd0 [ 695.299622][ T3768] ? __x64_sys_ioctl+0xa3/0x120 [ 695.304598][ T3768] ? do_syscall_64+0xfe/0x140 [ 695.309706][ T3768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.316313][ T3768] ? debug_check_no_obj_freed+0x505/0x5b0 [ 695.322074][ T3768] ? trace_lock_release+0x135/0x1a0 [ 695.327445][ T3768] ? debug_check_no_obj_freed+0x505/0x5b0 [ 695.333277][ T3768] ? rcu_lock_release+0x9/0x30 [ 695.338217][ T3768] ? trace_lock_release+0x135/0x1a0 [ 695.343521][ T3768] ? rcu_lock_release+0x9/0x30 [ 695.348482][ T3768] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 695.354161][ T3768] ? lo_release+0x1f0/0x1f0 [ 695.358676][ T3768] blkdev_ioctl+0x807/0x2990 [ 695.363287][ T3768] ? tomoyo_path_number_perm+0x53e/0x640 [ 695.369036][ T3768] block_ioctl+0xbd/0x100 [ 695.373380][ T3768] ? blkdev_iopoll+0x100/0x100 [ 695.378656][ T3768] do_vfs_ioctl+0x744/0x1730 [ 695.383280][ T3768] ? __fget+0x461/0x510 [ 695.387855][ T3768] ? tomoyo_file_ioctl+0x23/0x30 [ 695.392895][ T3768] ? security_file_ioctl+0xa1/0xd0 [ 695.398183][ T3768] __x64_sys_ioctl+0xe3/0x120 [ 695.403140][ T3768] do_syscall_64+0xfe/0x140 [ 695.407815][ T3768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.413734][ T3768] RIP: 0033:0x459697 [ 695.417658][ T3768] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:16:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) [ 695.437685][ T3768] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.446140][ T3768] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 695.454496][ T3768] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 695.462574][ T3768] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 695.470567][ T3768] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 695.479195][ T3768] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x8cffffff}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x700}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xf6ffffff}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 695.580834][ T3780] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:07 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 695.749728][ T3794] FAULT_INJECTION: forcing a failure. [ 695.749728][ T3794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.763304][ T3794] CPU: 1 PID: 3794 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 695.771521][ T3794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.781956][ T3794] Call Trace: [ 695.785313][ T3794] dump_stack+0x1d8/0x2f8 [ 695.790049][ T3794] should_fail+0x555/0x770 [ 695.794581][ T3794] should_fail_alloc_page+0x55/0x60 [ 695.799893][ T3794] prepare_alloc_pages+0x283/0x470 [ 695.805289][ T3794] __alloc_pages_nodemask+0xb2/0x5d0 [ 695.810740][ T3794] kmem_getpages+0x56/0xa20 [ 695.815359][ T3794] ? trace_lock_release+0x135/0x1a0 [ 695.820582][ T3794] cache_grow_begin+0x7e/0x2c0 [ 695.825366][ T3794] cache_alloc_refill+0x311/0x3f0 [ 695.830659][ T3794] ? check_preemption_disabled+0xb7/0x2a0 [ 695.836806][ T3794] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 695.842427][ T3794] ? kobject_uevent_env+0x2cd/0x1260 [ 695.847907][ T3794] ? dev_uevent_filter+0xb0/0xb0 [ 695.853033][ T3794] kobject_uevent_env+0x2cd/0x1260 [ 695.858591][ T3794] kobject_uevent+0x1f/0x30 [ 695.863147][ T3794] loop_set_fd+0xd21/0x1180 [ 695.868164][ T3794] lo_ioctl+0xd5/0x2200 [ 695.872879][ T3794] ? __kasan_slab_free+0x12a/0x1e0 [ 695.878093][ T3794] ? kasan_slab_free+0xe/0x10 [ 695.882785][ T3794] ? kfree+0x115/0x200 [ 695.886909][ T3794] ? tomoyo_path_number_perm+0x4e1/0x640 [ 695.892557][ T3794] ? tomoyo_file_ioctl+0x23/0x30 [ 695.897814][ T3794] ? security_file_ioctl+0x6d/0xd0 [ 695.903652][ T3794] ? __x64_sys_ioctl+0xa3/0x120 [ 695.908783][ T3794] ? do_syscall_64+0xfe/0x140 [ 695.913612][ T3794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.920158][ T3794] ? debug_check_no_obj_freed+0x505/0x5b0 [ 695.926666][ T3794] ? trace_lock_release+0x135/0x1a0 [ 695.932239][ T3794] ? debug_check_no_obj_freed+0x505/0x5b0 [ 695.937999][ T3794] ? rcu_lock_release+0x9/0x30 [ 695.943220][ T3794] ? trace_lock_release+0x135/0x1a0 [ 695.948694][ T3794] ? rcu_lock_release+0x9/0x30 [ 695.953616][ T3794] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 695.959413][ T3794] ? lo_release+0x1f0/0x1f0 [ 695.964195][ T3794] blkdev_ioctl+0x807/0x2990 [ 695.968916][ T3794] ? tomoyo_path_number_perm+0x53e/0x640 [ 695.968941][ T3794] block_ioctl+0xbd/0x100 [ 695.979193][ T3794] ? blkdev_iopoll+0x100/0x100 [ 695.984054][ T3794] do_vfs_ioctl+0x744/0x1730 [ 695.988898][ T3794] ? __fget+0x461/0x510 [ 695.988915][ T3794] ? tomoyo_file_ioctl+0x23/0x30 06:16:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x7000000}}, 0x24, 0x0) 06:16:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8008, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x4000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xfeffffff}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 695.988926][ T3794] ? security_file_ioctl+0xa1/0xd0 [ 695.988937][ T3794] __x64_sys_ioctl+0xe3/0x120 [ 695.988952][ T3794] do_syscall_64+0xfe/0x140 [ 696.012775][ T3794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.018680][ T3794] RIP: 0033:0x459697 [ 696.022584][ T3794] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.042794][ T3794] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.051390][ T3794] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 696.059561][ T3794] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 696.068032][ T3794] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 696.076107][ T3794] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 696.084331][ T3794] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xffffff8c}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x1000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:08 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 696.223777][ T3798] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 696.296333][ T3814] FAULT_INJECTION: forcing a failure. [ 696.296333][ T3814] name failslab, interval 1, probability 0, space 0, times 0 [ 696.313730][ T3814] CPU: 0 PID: 3814 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 696.321914][ T3814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.332283][ T3814] Call Trace: [ 696.335766][ T3814] dump_stack+0x1d8/0x2f8 [ 696.340208][ T3814] should_fail+0x555/0x770 [ 696.344805][ T3814] __should_failslab+0x11a/0x160 [ 696.349763][ T3814] ? kzalloc+0x26/0x40 [ 696.354169][ T3814] should_failslab+0x9/0x20 [ 696.358705][ T3814] __kmalloc+0x7a/0x340 [ 696.362982][ T3814] kzalloc+0x26/0x40 [ 696.367271][ T3814] kobject_get_path+0xa7/0x1d0 [ 696.372251][ T3814] kobject_uevent_env+0x2f2/0x1260 [ 696.377384][ T3814] kobject_uevent+0x1f/0x30 [ 696.382052][ T3814] loop_set_fd+0xd21/0x1180 [ 696.387226][ T3814] lo_ioctl+0xd5/0x2200 [ 696.391793][ T3814] ? __kasan_slab_free+0x12a/0x1e0 [ 696.397266][ T3814] ? kasan_slab_free+0xe/0x10 [ 696.402042][ T3814] ? kfree+0x115/0x200 [ 696.406221][ T3814] ? tomoyo_path_number_perm+0x4e1/0x640 [ 696.411867][ T3814] ? tomoyo_file_ioctl+0x23/0x30 [ 696.416905][ T3814] ? security_file_ioctl+0x6d/0xd0 [ 696.422100][ T3814] ? __x64_sys_ioctl+0xa3/0x120 [ 696.427149][ T3814] ? do_syscall_64+0xfe/0x140 [ 696.432123][ T3814] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.438536][ T3814] ? debug_check_no_obj_freed+0x505/0x5b0 [ 696.444669][ T3814] ? trace_lock_release+0x135/0x1a0 [ 696.450102][ T3814] ? debug_check_no_obj_freed+0x505/0x5b0 [ 696.456107][ T3814] ? rcu_lock_release+0x9/0x30 [ 696.461039][ T3814] ? trace_lock_release+0x135/0x1a0 [ 696.466683][ T3814] ? rcu_lock_release+0x9/0x30 [ 696.471600][ T3814] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 696.477336][ T3814] ? lo_release+0x1f0/0x1f0 [ 696.482287][ T3814] blkdev_ioctl+0x807/0x2990 [ 696.486894][ T3814] ? tomoyo_path_number_perm+0x53e/0x640 [ 696.492561][ T3814] block_ioctl+0xbd/0x100 [ 696.496990][ T3814] ? blkdev_iopoll+0x100/0x100 [ 696.501996][ T3814] do_vfs_ioctl+0x744/0x1730 [ 696.506914][ T3814] ? __fget+0x461/0x510 [ 696.511180][ T3814] ? tomoyo_file_ioctl+0x23/0x30 [ 696.516828][ T3814] ? security_file_ioctl+0xa1/0xd0 [ 696.522297][ T3814] __x64_sys_ioctl+0xe3/0x120 [ 696.527354][ T3814] do_syscall_64+0xfe/0x140 [ 696.531980][ T3814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.537974][ T3814] RIP: 0033:0x459697 [ 696.541884][ T3814] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.561834][ T3814] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.570701][ T3814] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 696.578888][ T3814] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 696.587060][ T3814] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 696.595302][ T3814] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 696.603801][ T3814] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xfffffff6}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x2000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xfffffffe}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x3000000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 696.683013][ T3817] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:08 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x40000000}}, 0x24, 0x0) 06:16:08 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x100000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x7000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x40000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x200000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 697.016156][ T3844] FAULT_INJECTION: forcing a failure. [ 697.016156][ T3844] name failslab, interval 1, probability 0, space 0, times 0 [ 697.033916][ T3837] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 697.054763][ T3844] CPU: 0 PID: 3844 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 697.062775][ T3844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.073175][ T3844] Call Trace: [ 697.076969][ T3844] dump_stack+0x1d8/0x2f8 [ 697.081332][ T3844] should_fail+0x555/0x770 [ 697.086115][ T3844] __should_failslab+0x11a/0x160 [ 697.091206][ T3844] should_failslab+0x9/0x20 [ 697.095921][ T3844] kmem_cache_alloc_node+0x65/0x280 [ 697.101423][ T3844] ? __alloc_skb+0x9f/0x500 [ 697.106129][ T3844] __alloc_skb+0x9f/0x500 [ 697.110640][ T3844] alloc_uevent_skb+0x7f/0x230 [ 697.115517][ T3844] kobject_uevent_env+0xcbb/0x1260 [ 697.121087][ T3844] kobject_uevent+0x1f/0x30 [ 697.125759][ T3844] loop_set_fd+0xd21/0x1180 [ 697.130311][ T3844] lo_ioctl+0xd5/0x2200 [ 697.134663][ T3844] ? __kasan_slab_free+0x12a/0x1e0 [ 697.139902][ T3844] ? kasan_slab_free+0xe/0x10 [ 697.144592][ T3844] ? kfree+0x115/0x200 [ 697.148848][ T3844] ? tomoyo_path_number_perm+0x4e1/0x640 [ 697.154674][ T3844] ? tomoyo_file_ioctl+0x23/0x30 [ 697.159620][ T3844] ? security_file_ioctl+0x6d/0xd0 [ 697.164741][ T3844] ? __x64_sys_ioctl+0xa3/0x120 [ 697.169785][ T3844] ? do_syscall_64+0xfe/0x140 [ 697.174480][ T3844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.180588][ T3844] ? debug_check_no_obj_freed+0x505/0x5b0 [ 697.186520][ T3844] ? trace_lock_release+0x135/0x1a0 [ 697.191734][ T3844] ? debug_check_no_obj_freed+0x505/0x5b0 [ 697.197744][ T3844] ? rcu_lock_release+0x9/0x30 [ 697.202616][ T3844] ? trace_lock_release+0x135/0x1a0 [ 697.207983][ T3844] ? rcu_lock_release+0x9/0x30 [ 697.213021][ T3844] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 697.218672][ T3844] ? lo_release+0x1f0/0x1f0 [ 697.223439][ T3844] blkdev_ioctl+0x807/0x2990 [ 697.228302][ T3844] ? tomoyo_path_number_perm+0x53e/0x640 [ 697.234023][ T3844] block_ioctl+0xbd/0x100 [ 697.238552][ T3844] ? blkdev_iopoll+0x100/0x100 [ 697.243417][ T3844] do_vfs_ioctl+0x744/0x1730 [ 697.248022][ T3844] ? __fget+0x461/0x510 [ 697.252289][ T3844] ? tomoyo_file_ioctl+0x23/0x30 [ 697.257317][ T3844] ? security_file_ioctl+0xa1/0xd0 [ 697.262570][ T3844] __x64_sys_ioctl+0xe3/0x120 [ 697.267275][ T3844] do_syscall_64+0xfe/0x140 [ 697.272056][ T3844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.277964][ T3844] RIP: 0033:0x459697 [ 697.281873][ T3844] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.301505][ T3844] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.310050][ T3844] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 697.318132][ T3844] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 697.326209][ T3844] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 697.334204][ T3844] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 697.342665][ T3844] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 697.520066][ T3855] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 06:16:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000020000"], 0x24, 0x0) 06:16:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x8cffffff}}, 0x24, 0x0) 06:16:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x300000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x8cffffff}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:09 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa801, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x700000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xf6ffffff}, [], {}, [], {0x4}}, 0x24, 0x0) [ 697.648740][ T3865] FAULT_INJECTION: forcing a failure. [ 697.648740][ T3865] name failslab, interval 1, probability 0, space 0, times 0 [ 697.667524][ T3865] CPU: 0 PID: 3865 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 697.675440][ T3865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.685504][ T3865] Call Trace: [ 697.688792][ T3865] dump_stack+0x1d8/0x2f8 [ 697.693116][ T3865] should_fail+0x555/0x770 [ 697.697533][ T3865] __should_failslab+0x11a/0x160 [ 697.702465][ T3865] should_failslab+0x9/0x20 [ 697.706992][ T3865] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 697.712701][ T3865] ? __kmalloc_node_track_caller+0x3c/0x60 [ 697.718497][ T3865] __kmalloc_node_track_caller+0x3c/0x60 [ 697.724105][ T3865] ? alloc_uevent_skb+0x7f/0x230 [ 697.729026][ T3865] __alloc_skb+0xe8/0x500 [ 697.733347][ T3865] alloc_uevent_skb+0x7f/0x230 [ 697.738091][ T3865] kobject_uevent_env+0xcbb/0x1260 [ 697.743185][ T3865] kobject_uevent+0x1f/0x30 [ 697.747688][ T3865] loop_set_fd+0xd21/0x1180 [ 697.752187][ T3865] lo_ioctl+0xd5/0x2200 [ 697.756331][ T3865] ? __kasan_slab_free+0x12a/0x1e0 [ 697.761420][ T3865] ? kasan_slab_free+0xe/0x10 [ 697.766088][ T3865] ? kfree+0x115/0x200 [ 697.770140][ T3865] ? tomoyo_path_number_perm+0x4e1/0x640 [ 697.775771][ T3865] ? tomoyo_file_ioctl+0x23/0x30 [ 697.780696][ T3865] ? security_file_ioctl+0x6d/0xd0 [ 697.785789][ T3865] ? __x64_sys_ioctl+0xa3/0x120 [ 697.790725][ T3865] ? do_syscall_64+0xfe/0x140 [ 697.795406][ T3865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.801462][ T3865] ? debug_check_no_obj_freed+0x505/0x5b0 [ 697.807162][ T3865] ? trace_lock_release+0x135/0x1a0 [ 697.812364][ T3865] ? debug_check_no_obj_freed+0x505/0x5b0 [ 697.818079][ T3865] ? rcu_lock_release+0x9/0x30 [ 697.822851][ T3865] ? trace_lock_release+0x135/0x1a0 [ 697.828038][ T3865] ? rcu_lock_release+0x9/0x30 [ 697.832795][ T3865] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 697.838427][ T3865] ? lo_release+0x1f0/0x1f0 [ 697.843256][ T3865] blkdev_ioctl+0x807/0x2990 [ 697.847826][ T3865] ? tomoyo_path_number_perm+0x53e/0x640 [ 697.853459][ T3865] block_ioctl+0xbd/0x100 [ 697.857773][ T3865] ? blkdev_iopoll+0x100/0x100 [ 697.862518][ T3865] do_vfs_ioctl+0x744/0x1730 [ 697.867519][ T3865] ? __fget+0x461/0x510 [ 697.871664][ T3865] ? tomoyo_file_ioctl+0x23/0x30 [ 697.876589][ T3865] ? security_file_ioctl+0xa1/0xd0 [ 697.881676][ T3865] __x64_sys_ioctl+0xe3/0x120 [ 697.886362][ T3865] do_syscall_64+0xfe/0x140 [ 697.890854][ T3865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.896728][ T3865] RIP: 0033:0x459697 [ 697.900606][ T3865] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.920187][ T3865] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.928573][ T3865] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 697.936521][ T3865] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 697.944575][ T3865] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 697.952523][ T3865] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 697.960493][ T3865] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x4000000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xebffffff}}, 0x24, 0x0) 06:16:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xffffff8c}, [], {}, [], {0x4}}, 0x24, 0x0) [ 698.020703][ T3869] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x8cffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 698.171934][ T3890] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000030000"], 0x24, 0x0) 06:16:10 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xfffffff6}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xf6ffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xf6ffffff}}, 0x24, 0x0) [ 698.956430][ T3902] FAULT_INJECTION: forcing a failure. [ 698.956430][ T3902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.969661][ T3902] CPU: 1 PID: 3902 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 698.977547][ T3902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.987601][ T3902] Call Trace: [ 698.990904][ T3902] dump_stack+0x1d8/0x2f8 [ 698.995241][ T3902] should_fail+0x555/0x770 [ 698.999668][ T3902] should_fail_alloc_page+0x55/0x60 [ 699.004864][ T3902] prepare_alloc_pages+0x283/0x470 [ 699.009976][ T3902] __alloc_pages_nodemask+0xb2/0x5d0 [ 699.015274][ T3902] ? lo_release+0x1f0/0x1f0 [ 699.019774][ T3902] ? blkdev_ioctl+0x807/0x2990 [ 699.024544][ T3902] kmem_getpages+0x56/0xa20 [ 699.029038][ T3902] ? trace_lock_release+0x135/0x1a0 [ 699.034237][ T3902] cache_grow_begin+0x7e/0x2c0 [ 699.039006][ T3902] cache_alloc_refill+0x311/0x3f0 [ 699.044028][ T3902] ? check_preemption_disabled+0xb7/0x2a0 [ 699.049745][ T3902] kmem_cache_alloc+0x2b9/0x2e0 [ 699.054591][ T3902] ? getname_flags+0xba/0x640 [ 699.059263][ T3902] getname_flags+0xba/0x640 [ 699.063761][ T3902] do_mkdirat+0x3c/0x320 [ 699.068003][ T3902] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 699.073721][ T3902] ? trace_hardirqs_off_caller+0x58/0x80 [ 699.079378][ T3902] ? do_syscall_64+0x1d/0x140 [ 699.084067][ T3902] __x64_sys_mkdir+0x60/0x70 [ 699.088657][ T3902] do_syscall_64+0xfe/0x140 [ 699.093271][ T3902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.099157][ T3902] RIP: 0033:0x458c47 [ 699.103045][ T3902] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.122647][ T3902] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 699.131061][ T3902] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 699.139034][ T3902] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 699.147057][ T3902] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 06:16:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xfeffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x100000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xfeffffff}}, 0x24, 0x0) [ 699.155023][ T3902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 699.162993][ T3902] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 699.187369][ T3900] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xffffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x200000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf103, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 699.435745][ T3930] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 699.547501][ T3933] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000070000"], 0x24, 0x0) 06:16:11 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:11 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x300000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x2}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf203, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:12 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xffffff8c}}, 0x24, 0x0) [ 700.082291][ T3941] FAULT_INJECTION: forcing a failure. [ 700.082291][ T3941] name failslab, interval 1, probability 0, space 0, times 0 [ 700.109871][ T3941] CPU: 0 PID: 3941 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 700.117792][ T3941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.127840][ T3941] Call Trace: 06:16:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x3}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x700000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 700.131145][ T3941] dump_stack+0x1d8/0x2f8 [ 700.135512][ T3941] should_fail+0x555/0x770 [ 700.139938][ T3941] __should_failslab+0x11a/0x160 [ 700.144882][ T3941] ? getname_flags+0xba/0x640 [ 700.149562][ T3941] should_failslab+0x9/0x20 [ 700.154073][ T3941] kmem_cache_alloc+0x56/0x2e0 [ 700.158833][ T3941] ? __kasan_check_write+0x14/0x20 [ 700.163945][ T3941] getname_flags+0xba/0x640 [ 700.163959][ T3941] do_mkdirat+0x3c/0x320 [ 700.163968][ T3941] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 700.163975][ T3941] ? trace_hardirqs_off_caller+0x58/0x80 [ 700.163998][ T3941] ? do_syscall_64+0x1d/0x140 [ 700.178596][ T3941] __x64_sys_mkdir+0x60/0x70 [ 700.178610][ T3941] do_syscall_64+0xfe/0x140 [ 700.178625][ T3941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.178638][ T3941] RIP: 0033:0x458c47 [ 700.203997][ T3941] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:16:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x7}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 700.204002][ T3941] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.204013][ T3941] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 700.204019][ T3941] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 700.204024][ T3941] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 700.204030][ T3941] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 700.204035][ T3941] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x4000000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000300"], 0x24, 0x0) 06:16:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x300}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 700.229671][ T3945] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x8cffffff00000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:12 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x700}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xf6ffffff00000000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 700.436373][ T3972] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 700.492754][ T3981] FAULT_INJECTION: forcing a failure. [ 700.492754][ T3981] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.506019][ T3981] CPU: 1 PID: 3981 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 700.513905][ T3981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.523961][ T3981] Call Trace: [ 700.527270][ T3981] dump_stack+0x1d8/0x2f8 [ 700.531617][ T3981] should_fail+0x555/0x770 [ 700.536042][ T3981] should_fail_alloc_page+0x55/0x60 [ 700.541241][ T3981] prepare_alloc_pages+0x283/0x470 [ 700.546357][ T3981] __alloc_pages_nodemask+0xb2/0x5d0 [ 700.551640][ T3981] ? lo_release+0x1f0/0x1f0 [ 700.556139][ T3981] ? blkdev_ioctl+0x807/0x2990 [ 700.560907][ T3981] kmem_getpages+0x56/0xa20 [ 700.565411][ T3981] ? trace_lock_release+0x135/0x1a0 [ 700.570606][ T3981] cache_grow_begin+0x7e/0x2c0 [ 700.575377][ T3981] cache_alloc_refill+0x311/0x3f0 [ 700.580398][ T3981] ? check_preemption_disabled+0xb7/0x2a0 [ 700.586112][ T3981] kmem_cache_alloc+0x2b9/0x2e0 [ 700.590959][ T3981] ? getname_flags+0xba/0x640 [ 700.595639][ T3981] getname_flags+0xba/0x640 [ 700.600144][ T3981] do_mkdirat+0x3c/0x320 [ 700.604397][ T3981] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 700.610112][ T3981] ? trace_hardirqs_off_caller+0x58/0x80 [ 700.615741][ T3981] ? do_syscall_64+0x1d/0x140 [ 700.620426][ T3981] __x64_sys_mkdir+0x60/0x70 [ 700.625104][ T3981] do_syscall_64+0xfe/0x140 [ 700.629607][ T3981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.635492][ T3981] RIP: 0033:0x458c47 [ 700.639388][ T3981] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.659002][ T3981] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.667408][ T3981] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 700.675381][ T3981] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 700.683358][ T3981] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 700.683364][ T3981] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 700.683369][ T3981] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfe03, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 700.886442][ T3987] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 701.017032][ T3990] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xffffffeb}}, 0x24, 0x0) 06:16:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x4000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0xffffffff00000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:13 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000700"], 0x24, 0x0) 06:16:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x1000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x2}, [], {}, [], {0x4}}, 0x24, 0x0) [ 701.210916][ T4000] FAULT_INJECTION: forcing a failure. [ 701.210916][ T4000] name failslab, interval 1, probability 0, space 0, times 0 [ 701.243455][ T4003] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 701.302743][ T4000] CPU: 1 PID: 4000 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 701.310695][ T4000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.310700][ T4000] Call Trace: [ 701.310718][ T4000] dump_stack+0x1d8/0x2f8 [ 701.310733][ T4000] should_fail+0x555/0x770 [ 701.310751][ T4000] __should_failslab+0x11a/0x160 [ 701.310764][ T4000] ? __d_alloc+0x2d/0x6e0 [ 701.310777][ T4000] should_failslab+0x9/0x20 [ 701.310788][ T4000] kmem_cache_alloc+0x56/0x2e0 06:16:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x2000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x3}, [], {}, [], {0x4}}, 0x24, 0x0) [ 701.310801][ T4000] __d_alloc+0x2d/0x6e0 [ 701.310813][ T4000] d_alloc+0x4e/0x1d0 [ 701.310827][ T4000] __lookup_hash+0xe5/0x290 [ 701.310838][ T4000] filename_create+0x14f/0x670 [ 701.310850][ T4000] ? getname_flags+0x214/0x640 [ 701.310861][ T4000] do_mkdirat+0x5a/0x320 [ 701.310871][ T4000] ? trace_hardirqs_off_caller+0x58/0x80 [ 701.310882][ T4000] __x64_sys_mkdir+0x60/0x70 [ 701.310896][ T4000] do_syscall_64+0xfe/0x140 [ 701.310915][ T4000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.346713][ T4000] RIP: 0033:0x458c47 [ 701.346723][ T4000] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.346729][ T4000] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 701.364099][ T4000] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 701.364104][ T4000] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 701.364110][ T4000] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 701.364115][ T4000] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 701.364128][ T4000] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x3000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:13 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 701.564453][ T4021] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 701.592663][ T4029] FAULT_INJECTION: forcing a failure. [ 701.592663][ T4029] name failslab, interval 1, probability 0, space 0, times 0 [ 701.616349][ T4029] CPU: 0 PID: 4029 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 701.624271][ T4029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.634330][ T4029] Call Trace: [ 701.639274][ T4029] dump_stack+0x1d8/0x2f8 [ 701.643619][ T4029] should_fail+0x555/0x770 [ 701.648040][ T4029] __should_failslab+0x11a/0x160 [ 701.652983][ T4029] ? tomoyo_encode2+0x273/0x5a0 [ 701.657923][ T4029] should_failslab+0x9/0x20 [ 701.662422][ T4029] __kmalloc+0x7a/0x340 [ 701.666584][ T4029] tomoyo_encode2+0x273/0x5a0 [ 701.671269][ T4029] tomoyo_realpath_from_path+0x769/0x7c0 [ 701.676908][ T4029] tomoyo_path_number_perm+0x166/0x640 [ 701.682384][ T4029] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 701.688034][ T4029] ? trace_kmem_cache_free+0xa0/0x110 [ 701.693405][ T4029] tomoyo_path_mkdir+0x9c/0xc0 [ 701.698167][ T4029] security_path_mkdir+0xed/0x170 [ 701.703195][ T4029] do_mkdirat+0x15c/0x320 [ 701.707725][ T4029] __x64_sys_mkdir+0x60/0x70 [ 701.712310][ T4029] do_syscall_64+0xfe/0x140 [ 701.716809][ T4029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.722694][ T4029] RIP: 0033:0x458c47 [ 701.726585][ T4029] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.746277][ T4029] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 701.754687][ T4029] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 701.762672][ T4029] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 701.770646][ T4029] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 701.778615][ T4029] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 701.786599][ T4029] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 701.799834][ T4029] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xfffffff6}}, 0x24, 0x0) 06:16:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x7}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x7000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:14 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000003f00"], 0x24, 0x0) 06:16:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x300}, [], {}, [], {0x4}}, 0x24, 0x0) [ 702.134451][ T4038] FAULT_INJECTION: forcing a failure. [ 702.134451][ T4038] name failslab, interval 1, probability 0, space 0, times 0 06:16:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x40000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 702.191447][ T4039] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 702.238973][ T4038] CPU: 0 PID: 4038 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 702.246898][ T4038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.256952][ T4038] Call Trace: [ 702.260248][ T4038] dump_stack+0x1d8/0x2f8 [ 702.260266][ T4038] should_fail+0x555/0x770 [ 702.260284][ T4038] __should_failslab+0x11a/0x160 [ 702.260303][ T4038] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 702.269022][ T4038] should_failslab+0x9/0x20 [ 702.269033][ T4038] __kmalloc+0x7a/0x340 [ 702.269048][ T4038] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 702.288388][ T4038] tomoyo_realpath_from_path+0xdc/0x7c0 [ 702.288403][ T4038] tomoyo_path_number_perm+0x166/0x640 [ 702.288428][ T4038] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 702.310748][ T4038] ? trace_kmem_cache_free+0xa0/0x110 [ 702.316121][ T4038] tomoyo_path_mkdir+0x9c/0xc0 [ 702.320890][ T4038] security_path_mkdir+0xed/0x170 [ 702.325916][ T4038] do_mkdirat+0x15c/0x320 [ 702.330244][ T4038] __x64_sys_mkdir+0x60/0x70 [ 702.334843][ T4038] do_syscall_64+0xfe/0x140 [ 702.339350][ T4038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.345235][ T4038] RIP: 0033:0x458c47 [ 702.349125][ T4038] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.368992][ T4038] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 702.377505][ T4038] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 06:16:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000004000"], 0x24, 0x0) [ 702.385474][ T4038] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 702.393448][ T4038] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 702.401443][ T4038] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 702.409412][ T4038] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x700}, [], {}, [], {0x4}}, 0x24, 0x0) [ 702.457344][ T4038] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x8cffffff}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x4000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 702.497965][ T4057] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xfffffffe}}, 0x24, 0x0) 06:16:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xf6ffffff}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x1000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:14 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x989680, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 703.075163][ T4073] FAULT_INJECTION: forcing a failure. [ 703.075163][ T4073] name failslab, interval 1, probability 0, space 0, times 0 [ 703.110113][ T4073] CPU: 1 PID: 4073 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 703.118038][ T4073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.128096][ T4073] Call Trace: [ 703.131392][ T4073] dump_stack+0x1d8/0x2f8 [ 703.135732][ T4073] should_fail+0x555/0x770 [ 703.140244][ T4073] __should_failslab+0x11a/0x160 [ 703.145182][ T4073] ? tomoyo_encode2+0x273/0x5a0 [ 703.145195][ T4073] should_failslab+0x9/0x20 [ 703.145205][ T4073] __kmalloc+0x7a/0x340 [ 703.145217][ T4073] tomoyo_encode2+0x273/0x5a0 [ 703.145232][ T4073] tomoyo_realpath_from_path+0x769/0x7c0 [ 703.154596][ T4073] tomoyo_path_number_perm+0x166/0x640 06:16:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x2000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xfeffffff}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 703.154624][ T4073] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 703.154636][ T4073] ? trace_kmem_cache_free+0xa0/0x110 [ 703.154650][ T4073] tomoyo_path_mkdir+0x9c/0xc0 [ 703.163442][ T4073] security_path_mkdir+0xed/0x170 [ 703.163453][ T4073] do_mkdirat+0x15c/0x320 [ 703.163464][ T4073] __x64_sys_mkdir+0x60/0x70 [ 703.163476][ T4073] do_syscall_64+0xfe/0x140 [ 703.163491][ T4073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.163500][ T4073] RIP: 0033:0x458c47 [ 703.163510][ T4073] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.163520][ T4073] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 703.180443][ T4073] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 703.180449][ T4073] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 703.180455][ T4073] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 06:16:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x3000000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 703.180460][ T4073] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 703.180465][ T4073] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 703.191260][ T4073] ERROR: Out of memory at tomoyo_realpath_from_path. [ 703.200480][ T4079] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xffffff8c}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x7000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x40000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:15 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x1000000000000}}, 0x24, 0x0) 06:16:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xfffffff6}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:15 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x8cffffff}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xf6ffffff}, [], {}, [], {0x4}}, 0x24, 0x0) [ 703.990686][ T4113] FAULT_INJECTION: forcing a failure. [ 703.990686][ T4113] name failslab, interval 1, probability 0, space 0, times 0 [ 704.003582][ T4113] CPU: 1 PID: 4113 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 704.003588][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.003593][ T4113] Call Trace: [ 704.003614][ T4113] dump_stack+0x1d8/0x2f8 [ 704.029153][ T4113] should_fail+0x555/0x770 [ 704.033580][ T4113] __should_failslab+0x11a/0x160 [ 704.038508][ T4113] ? ext4_alloc_inode+0x1f/0x560 [ 704.038520][ T4113] should_failslab+0x9/0x20 [ 704.038532][ T4113] kmem_cache_alloc+0x56/0x2e0 [ 704.038541][ T4113] ? set_qf_name+0x3c0/0x3c0 [ 704.038558][ T4113] ext4_alloc_inode+0x1f/0x560 [ 704.048001][ T4113] ? set_qf_name+0x3c0/0x3c0 [ 704.048013][ T4113] new_inode_pseudo+0x68/0x240 [ 704.048023][ T4113] new_inode+0x28/0x1c0 [ 704.048041][ T4113] ? trace_ext4_request_inode+0x28b/0x2d0 [ 704.057441][ T4113] __ext4_new_inode+0x43d/0x5650 [ 704.057457][ T4113] ? memset+0x31/0x40 [ 704.057476][ T4113] ? smk_curacc+0xa3/0xe0 [ 704.057488][ T4113] ext4_mkdir+0x3f5/0x1450 [ 704.057505][ T4113] ? security_inode_permission+0xdd/0x120 [ 704.105025][ T4113] vfs_mkdir+0x43f/0x610 [ 704.109304][ T4113] do_mkdirat+0x1d7/0x320 [ 704.113645][ T4113] __x64_sys_mkdir+0x60/0x70 [ 704.118242][ T4113] do_syscall_64+0xfe/0x140 [ 704.118257][ T4113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.118266][ T4113] RIP: 0033:0x458c47 [ 704.118277][ T4113] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.118281][ T4113] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 704.118296][ T4113] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 704.152216][ T4113] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 704.152221][ T4113] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 704.152226][ T4113] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 704.152232][ T4113] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xfffffffe}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xffffff8c}, [], {}, [], {0x4}}, 0x24, 0x0) [ 704.231152][ T4121] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:16 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xfffffff6}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x100000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 704.373857][ T4137] FAULT_INJECTION: forcing a failure. [ 704.373857][ T4137] name failslab, interval 1, probability 0, space 0, times 0 [ 704.386586][ T4119] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 704.399313][ T4137] CPU: 0 PID: 4137 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 704.407217][ T4137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.417281][ T4137] Call Trace: [ 704.417301][ T4137] dump_stack+0x1d8/0x2f8 [ 704.417318][ T4137] should_fail+0x555/0x770 [ 704.417335][ T4137] __should_failslab+0x11a/0x160 [ 704.417352][ T4137] ? security_inode_alloc+0x36/0x1e0 [ 704.440073][ T4137] should_failslab+0x9/0x20 [ 704.440087][ T4137] kmem_cache_alloc+0x56/0x2e0 [ 704.440100][ T4137] security_inode_alloc+0x36/0x1e0 [ 704.440112][ T4137] inode_init_always+0x3b5/0x8d0 [ 704.440121][ T4137] ? set_qf_name+0x3c0/0x3c0 [ 704.440130][ T4137] new_inode_pseudo+0x7f/0x240 [ 704.440138][ T4137] new_inode+0x28/0x1c0 [ 704.440149][ T4137] ? trace_ext4_request_inode+0x28b/0x2d0 [ 704.440159][ T4137] __ext4_new_inode+0x43d/0x5650 [ 704.440169][ T4137] ? memset+0x31/0x40 [ 704.440184][ T4137] ? smk_curacc+0xa3/0xe0 [ 704.440202][ T4137] ext4_mkdir+0x3f5/0x1450 [ 704.449461][ T4137] ? security_inode_permission+0xdd/0x120 [ 704.449476][ T4137] vfs_mkdir+0x43f/0x610 [ 704.449496][ T4137] do_mkdirat+0x1d7/0x320 [ 704.449518][ T4137] __x64_sys_mkdir+0x60/0x70 [ 704.468869][ T4137] do_syscall_64+0xfe/0x140 [ 704.468884][ T4137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.468893][ T4137] RIP: 0033:0x458c47 [ 704.468904][ T4137] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.468915][ T4137] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 704.483764][ T4137] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 704.483770][ T4137] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 704.483775][ T4137] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 704.483780][ T4137] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 704.483785][ T4137] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x100000000000000}}, 0x24, 0x0) 06:16:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x100000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x200000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:17 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x200000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x300000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 705.147526][ T4157] FAULT_INJECTION: forcing a failure. [ 705.147526][ T4157] name failslab, interval 1, probability 0, space 0, times 0 [ 705.196244][ T4161] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 705.212468][ T4157] CPU: 0 PID: 4157 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 705.220673][ T4157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.230733][ T4157] Call Trace: [ 705.234040][ T4157] dump_stack+0x1d8/0x2f8 [ 705.238469][ T4157] should_fail+0x555/0x770 [ 705.242983][ T4157] __should_failslab+0x11a/0x160 [ 705.247936][ T4157] ? ext4_alloc_inode+0x1f/0x560 [ 705.252883][ T4157] should_failslab+0x9/0x20 [ 705.257478][ T4157] kmem_cache_alloc+0x56/0x2e0 [ 705.262280][ T4157] ? set_qf_name+0x3c0/0x3c0 [ 705.262292][ T4157] ext4_alloc_inode+0x1f/0x560 [ 705.262300][ T4157] ? set_qf_name+0x3c0/0x3c0 [ 705.262310][ T4157] new_inode_pseudo+0x68/0x240 [ 705.262318][ T4157] new_inode+0x28/0x1c0 [ 705.262329][ T4157] ? trace_ext4_request_inode+0x28b/0x2d0 [ 705.262339][ T4157] __ext4_new_inode+0x43d/0x5650 06:16:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x700000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 705.262352][ T4157] ? memset+0x31/0x40 [ 705.262370][ T4157] ? smk_curacc+0xa3/0xe0 [ 705.262381][ T4157] ext4_mkdir+0x3f5/0x1450 [ 705.262402][ T4157] ? security_inode_permission+0xdd/0x120 [ 705.276337][ T4157] vfs_mkdir+0x43f/0x610 [ 705.276351][ T4157] do_mkdirat+0x1d7/0x320 [ 705.276364][ T4157] __x64_sys_mkdir+0x60/0x70 [ 705.276376][ T4157] do_syscall_64+0xfe/0x140 [ 705.276391][ T4157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.276405][ T4157] RIP: 0033:0x458c47 06:16:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x4000000000000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 705.342656][ T4157] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.362705][ T4157] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 705.371203][ T4157] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 705.371209][ T4157] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 705.371214][ T4157] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 06:16:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x8cffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x300000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 705.371220][ T4157] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 705.371225][ T4157] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 705.525319][ T4182] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x200000000000000}}, 0x24, 0x0) 06:16:17 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xf6ffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x700000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 706.020874][ T4189] FAULT_INJECTION: forcing a failure. [ 706.020874][ T4189] name failslab, interval 1, probability 0, space 0, times 0 [ 706.079659][ T4189] CPU: 1 PID: 4189 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 706.087586][ T4189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.087592][ T4189] Call Trace: [ 706.087612][ T4189] dump_stack+0x1d8/0x2f8 [ 706.087628][ T4189] should_fail+0x555/0x770 [ 706.087646][ T4189] __should_failslab+0x11a/0x160 [ 706.105374][ T4189] ? smack_inode_init_security+0x3cf/0x490 [ 706.105387][ T4189] should_failslab+0x9/0x20 [ 706.105399][ T4189] __kmalloc_track_caller+0x79/0x340 [ 706.105412][ T4189] kstrdup+0x34/0x70 [ 706.105425][ T4189] smack_inode_init_security+0x3cf/0x490 [ 706.110008][ T4197] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 706.114761][ T4189] security_inode_init_security+0xfe/0x310 [ 706.114771][ T4189] ? ext4_init_security+0x40/0x40 [ 706.114786][ T4189] ext4_init_security+0x34/0x40 [ 706.114802][ T4189] __ext4_new_inode+0x446c/0x5650 [ 706.163483][ T4189] ? smk_curacc+0xa3/0xe0 06:16:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xfeffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) 06:16:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xffffffff00000000}, [], {0x2}, [], {0x2}}, 0x24, 0x0) [ 706.163499][ T4189] ext4_mkdir+0x3f5/0x1450 [ 706.163515][ T4189] ? security_inode_permission+0xdd/0x120 [ 706.173646][ T4189] vfs_mkdir+0x43f/0x610 [ 706.173659][ T4189] do_mkdirat+0x1d7/0x320 [ 706.173670][ T4189] __x64_sys_mkdir+0x60/0x70 [ 706.173683][ T4189] do_syscall_64+0xfe/0x140 [ 706.173697][ T4189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.173705][ T4189] RIP: 0033:0x458c47 [ 706.173719][ T4189] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.188140][ T4189] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 706.188151][ T4189] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 706.188157][ T4189] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 706.188162][ T4189] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 706.188168][ T4189] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 06:16:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x300000000000000}}, 0x24, 0x0) 06:16:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x4000000000000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x3}, [], {0x2}}, 0x24, 0x0) 06:16:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0x8cffffff00000000}, [], {}, [], {0x4}}, 0x24, 0x0) [ 706.188173][ T4189] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:18 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x2}}, 0x24, 0x0) [ 706.399702][ T4221] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 706.425438][ T4228] FAULT_INJECTION: forcing a failure. [ 706.425438][ T4228] name failslab, interval 1, probability 0, space 0, times 0 [ 706.438271][ T4228] CPU: 1 PID: 4228 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 706.446265][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.456334][ T4228] Call Trace: [ 706.459640][ T4228] dump_stack+0x1d8/0x2f8 [ 706.463974][ T4228] should_fail+0x555/0x770 [ 706.463996][ T4228] __should_failslab+0x11a/0x160 [ 706.464013][ T4228] ? __es_insert_extent+0x321/0xd90 [ 706.473341][ T4228] should_failslab+0x9/0x20 [ 706.473353][ T4228] kmem_cache_alloc+0x56/0x2e0 [ 706.473366][ T4228] __es_insert_extent+0x321/0xd90 [ 706.473381][ T4228] ext4_es_insert_extent+0x220/0x2fb0 [ 706.473390][ T4228] ? trace_ext4_ext_convert_to_initialized_fastpath+0x310/0x310 [ 706.473410][ T4228] ext4_ext_map_blocks+0x1806/0x7180 [ 706.511101][ T4228] ? __kasan_check_read+0x11/0x20 [ 706.516221][ T4228] ? mark_buffer_dirty+0x280/0x2e0 [ 706.521335][ T4228] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 706.526791][ T4228] ? trace_lock_release+0x135/0x1a0 [ 706.532004][ T4228] ? __down_read+0x14b/0x330 [ 706.536688][ T4228] ext4_map_blocks+0x422/0x1e50 [ 706.541539][ T4228] ? ext4_mark_inode_dirty+0x216/0x700 [ 706.547022][ T4228] ? __kasan_check_write+0x14/0x20 [ 706.552132][ T4228] ext4_getblk+0xae/0x460 [ 706.556464][ T4228] ext4_bread+0x4a/0x240 [ 706.560707][ T4228] ext4_append+0x175/0x310 [ 706.565123][ T4228] ext4_mkdir+0x7ad/0x1450 [ 706.569546][ T4228] vfs_mkdir+0x43f/0x610 [ 706.573791][ T4228] do_mkdirat+0x1d7/0x320 [ 706.578121][ T4228] __x64_sys_mkdir+0x60/0x70 [ 706.582719][ T4228] do_syscall_64+0xfe/0x140 [ 706.587227][ T4228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.593123][ T4228] RIP: 0033:0x458c47 [ 706.597019][ T4228] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.616621][ T4228] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 706.625044][ T4228] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 706.633026][ T4228] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 706.641027][ T4228] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 706.649004][ T4228] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 706.656979][ T4228] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xf6ffffff00000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x8}, [], {0x2}}, 0x24, 0x0) 06:16:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:18 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x10}, [], {0x2}}, 0x24, 0x0) [ 706.986051][ T4235] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 707.007764][ T4239] FAULT_INJECTION: forcing a failure. [ 707.007764][ T4239] name failslab, interval 1, probability 0, space 0, times 0 [ 707.041996][ T4239] CPU: 0 PID: 4239 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 707.049923][ T4239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.059988][ T4239] Call Trace: [ 707.060009][ T4239] dump_stack+0x1d8/0x2f8 [ 707.060027][ T4239] should_fail+0x555/0x770 [ 707.060043][ T4239] __should_failslab+0x11a/0x160 [ 707.060058][ T4239] should_failslab+0x9/0x20 [ 707.060068][ T4239] kmem_cache_alloc_trace+0x5d/0x2f0 [ 707.060079][ T4239] ? smack_d_instantiate+0x732/0xd70 [ 707.060091][ T4239] smack_d_instantiate+0x732/0xd70 [ 707.060107][ T4239] ? lockdep_init_map+0x2a/0x680 [ 707.060128][ T4239] security_d_instantiate+0xa5/0x100 [ 707.077052][ T4239] d_instantiate_new+0x65/0x130 [ 707.077067][ T4239] ext4_mkdir+0xfa9/0x1450 [ 707.077086][ T4239] vfs_mkdir+0x43f/0x610 [ 707.077097][ T4239] do_mkdirat+0x1d7/0x320 [ 707.077111][ T4239] __x64_sys_mkdir+0x60/0x70 [ 707.129895][ T4239] do_syscall_64+0xfe/0x140 [ 707.134409][ T4239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.140300][ T4239] RIP: 0033:0x458c47 [ 707.144194][ T4239] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.163792][ T4239] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 707.163802][ T4239] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 707.163807][ T4239] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 06:16:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x700000000000000}}, 0x24, 0x0) 06:16:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {0x1, 0x0, 0xffffffff00000000}, [], {}, [], {0x4}}, 0x24, 0x0) 06:16:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x2}, [], {0x2}}, 0x24, 0x0) [ 707.163811][ T4239] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 707.163816][ T4239] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 707.163820][ T4239] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x4}}, 0x24, 0x0) 06:16:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x3}, [], {0x2}}, 0x24, 0x0) [ 707.259611][ T4252] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:19 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 707.430810][ T4268] FAULT_INJECTION: forcing a failure. [ 707.430810][ T4268] name failslab, interval 1, probability 0, space 0, times 0 [ 707.446833][ T4268] CPU: 0 PID: 4268 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 707.454729][ T4268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.464874][ T4268] Call Trace: [ 707.468178][ T4268] dump_stack+0x1d8/0x2f8 [ 707.472528][ T4268] should_fail+0x555/0x770 [ 707.477300][ T4268] __should_failslab+0x11a/0x160 [ 707.482243][ T4268] should_failslab+0x9/0x20 [ 707.486754][ T4268] kmem_cache_alloc_trace+0x5d/0x2f0 [ 707.492046][ T4268] ? smack_d_instantiate+0x962/0xd70 [ 707.497331][ T4268] smack_d_instantiate+0x962/0xd70 [ 707.502450][ T4268] ? lockdep_init_map+0x2a/0x680 [ 707.507391][ T4268] security_d_instantiate+0xa5/0x100 [ 707.512679][ T4268] d_instantiate_new+0x65/0x130 [ 707.517531][ T4268] ext4_mkdir+0xfa9/0x1450 [ 707.521960][ T4268] vfs_mkdir+0x43f/0x610 [ 707.526220][ T4268] do_mkdirat+0x1d7/0x320 [ 707.530549][ T4268] __x64_sys_mkdir+0x60/0x70 [ 707.535145][ T4268] do_syscall_64+0xfe/0x140 [ 707.539650][ T4268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.545539][ T4268] RIP: 0033:0x458c47 [ 707.549431][ T4268] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.569038][ T4268] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 707.577449][ T4268] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 707.585422][ T4268] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 707.593389][ T4268] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 707.601356][ T4268] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 707.609325][ T4268] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x8}, [], {0x4}}, 0x24, 0x0) 06:16:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x7}, [], {0x2}}, 0x24, 0x0) 06:16:19 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 707.896958][ T4277] FAULT_INJECTION: forcing a failure. [ 707.896958][ T4277] name failslab, interval 1, probability 0, space 0, times 0 [ 707.909853][ T4277] CPU: 0 PID: 4277 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 707.917751][ T4277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.927809][ T4277] Call Trace: [ 707.927830][ T4277] dump_stack+0x1d8/0x2f8 [ 707.927844][ T4277] should_fail+0x555/0x770 [ 707.927856][ T4277] __should_failslab+0x11a/0x160 [ 707.927868][ T4277] ? __es_insert_extent+0x321/0xd90 [ 707.927886][ T4277] should_failslab+0x9/0x20 [ 707.935570][ T4277] kmem_cache_alloc+0x56/0x2e0 [ 707.935583][ T4277] __es_insert_extent+0x321/0xd90 [ 707.935596][ T4277] ext4_es_insert_extent+0x220/0x2fb0 [ 707.935613][ T4277] ext4_map_blocks+0xe18/0x1e50 [ 707.974756][ T4277] ? __kasan_check_write+0x14/0x20 [ 707.979880][ T4277] ext4_getblk+0xae/0x460 [ 707.984226][ T4277] ext4_bread+0x4a/0x240 [ 707.988477][ T4277] ext4_append+0x175/0x310 [ 707.992906][ T4277] ext4_mkdir+0x7ad/0x1450 06:16:19 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x10}, [], {0x4}}, 0x24, 0x0) [ 707.997336][ T4277] vfs_mkdir+0x43f/0x610 [ 708.001590][ T4277] do_mkdirat+0x1d7/0x320 [ 708.005919][ T4277] __x64_sys_mkdir+0x60/0x70 [ 708.010515][ T4277] do_syscall_64+0xfe/0x140 [ 708.015018][ T4277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.020903][ T4277] RIP: 0033:0x458c47 [ 708.024798][ T4277] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.044398][ T4277] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 [ 708.044410][ T4277] ORIG_RAX: 0000000000000053 [ 708.044422][ T4277] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 708.055137][ T4277] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 708.055142][ T4277] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 708.055147][ T4277] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 708.055152][ T4277] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x4000000000000000}}, 0x24, 0x0) 06:16:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x300}, [], {0x2}}, 0x24, 0x0) [ 708.107110][ T4279] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x2}, [], {0x4}}, 0x24, 0x0) 06:16:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x700}, [], {0x2}}, 0x24, 0x0) [ 708.233105][ T4292] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x4000}, [], {0x2}}, 0x24, 0x0) 06:16:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x3}, [], {0x4}}, 0x24, 0x0) 06:16:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:16:20 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x7}, [], {0x4}}, 0x24, 0x0) 06:16:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x1000000}, [], {0x2}}, 0x24, 0x0) [ 709.095026][ T4318] FAULT_INJECTION: forcing a failure. [ 709.095026][ T4318] name failslab, interval 1, probability 0, space 0, times 0 [ 709.107683][ T4318] CPU: 1 PID: 4318 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 709.115565][ T4318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.125619][ T4318] Call Trace: [ 709.128918][ T4318] dump_stack+0x1d8/0x2f8 [ 709.133345][ T4318] should_fail+0x555/0x770 [ 709.137760][ T4318] __should_failslab+0x11a/0x160 [ 709.142702][ T4318] ? __sigqueue_alloc+0x2ce/0x440 [ 709.147740][ T4318] should_failslab+0x9/0x20 [ 709.152337][ T4318] kmem_cache_alloc+0x56/0x2e0 [ 709.157192][ T4318] __sigqueue_alloc+0x2ce/0x440 [ 709.162049][ T4318] __send_signal+0x508/0xcd0 [ 709.166638][ T4318] send_signal+0x6e0/0x830 [ 709.171056][ T4318] force_sig_info_to_task+0x247/0x2e0 [ 709.176434][ T4318] force_sig_fault+0xbf/0x130 [ 709.181113][ T4318] __bad_area_nosemaphore+0x307/0x470 [ 709.186491][ T4318] bad_area+0x6b/0x80 [ 709.190471][ T4318] do_user_addr_fault+0xacc/0xaf0 [ 709.195506][ T4318] __do_page_fault+0xd3/0x1f0 [ 709.200185][ T4318] do_page_fault+0x99/0xb0 [ 709.204596][ T4318] page_fault+0x39/0x40 [ 709.208747][ T4318] RIP: 0033:0x45342f [ 709.212638][ T4318] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 709.232328][ T4318] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00010283 [ 709.238397][ T4318] RAX: 00007f5a9ab3db40 RBX: 0000000020000228 RCX: 0000000000000000 [ 709.246369][ T4318] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f5a9ab3db40 [ 709.254340][ T4318] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 709.262317][ T4318] R10: 0000000000000075 R11: 00000000004e5240 R12: 0000000000000004 [ 709.270291][ T4318] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0x8cffffff00000000}}, 0x24, 0x0) 06:16:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x300}, [], {0x4}}, 0x24, 0x0) 06:16:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x2000000}, [], {0x2}}, 0x24, 0x0) [ 709.297992][ T4314] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x700}, [], {0x4}}, 0x24, 0x0) 06:16:21 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x3000000}, [], {0x2}}, 0x24, 0x0) 06:16:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:21 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 709.571635][ T4343] FAULT_INJECTION: forcing a failure. [ 709.571635][ T4343] name failslab, interval 1, probability 0, space 0, times 0 [ 709.595999][ T4343] CPU: 1 PID: 4343 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 709.603918][ T4343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.614062][ T4343] Call Trace: [ 709.617369][ T4343] dump_stack+0x1d8/0x2f8 [ 709.621707][ T4343] should_fail+0x555/0x770 [ 709.626130][ T4343] __should_failslab+0x11a/0x160 [ 709.631071][ T4343] should_failslab+0x9/0x20 [ 709.636211][ T4343] kmem_cache_alloc_trace+0x5d/0x2f0 [ 709.641499][ T4343] ? smack_d_instantiate+0xabf/0xd70 [ 709.646783][ T4343] smack_d_instantiate+0xabf/0xd70 [ 709.651893][ T4343] ? lockdep_init_map+0x2a/0x680 [ 709.656857][ T4343] security_d_instantiate+0xa5/0x100 [ 709.662141][ T4343] d_instantiate_new+0x65/0x130 [ 709.667712][ T4343] ext4_mkdir+0xfa9/0x1450 [ 709.672485][ T4343] vfs_mkdir+0x43f/0x610 [ 709.676734][ T4343] do_mkdirat+0x1d7/0x320 [ 709.681066][ T4343] __x64_sys_mkdir+0x60/0x70 [ 709.685655][ T4343] do_syscall_64+0xfe/0x140 [ 709.690161][ T4343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.696049][ T4343] RIP: 0033:0x458c47 [ 709.699940][ T4343] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.719553][ T4343] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 709.727962][ T4343] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 709.736032][ T4343] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 709.744006][ T4343] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 709.751971][ T4343] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 709.759948][ T4343] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 709.769970][ T4342] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 709.962388][ T4347] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:16:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x7000000}, [], {0x2}}, 0x24, 0x0) 06:16:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x4000}, [], {0x4}}, 0x24, 0x0) 06:16:22 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xebffffff00000000}}, 0x24, 0x0) 06:16:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x1000000}, [], {0x4}}, 0x24, 0x0) [ 710.237343][ T4361] FAULT_INJECTION: forcing a failure. [ 710.237343][ T4361] name failslab, interval 1, probability 0, space 0, times 0 [ 710.260170][ T4356] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 710.286219][ T4361] CPU: 0 PID: 4361 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 710.294132][ T4361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.294137][ T4361] Call Trace: [ 710.294156][ T4361] dump_stack+0x1d8/0x2f8 [ 710.294175][ T4361] should_fail+0x555/0x770 [ 710.311809][ T4361] __should_failslab+0x11a/0x160 [ 710.311821][ T4361] ? ksys_mount+0x38/0x100 [ 710.311837][ T4361] should_failslab+0x9/0x20 [ 710.311853][ T4361] __kmalloc_track_caller+0x79/0x340 06:16:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x40000000}, [], {0x2}}, 0x24, 0x0) [ 710.325610][ T4361] strndup_user+0x76/0x130 [ 710.335358][ T4361] ksys_mount+0x38/0x100 [ 710.335370][ T4361] __x64_sys_mount+0xbf/0xd0 [ 710.335386][ T4361] do_syscall_64+0xfe/0x140 [ 710.344014][ T4361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.344023][ T4361] RIP: 0033:0x45c27a [ 710.344033][ T4361] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 06:16:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x2000000}, [], {0x4}}, 0x24, 0x0) 06:16:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x8cffffff}, [], {0x2}}, 0x24, 0x0) [ 710.344038][ T4361] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 710.344047][ T4361] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 710.344053][ T4361] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 710.344064][ T4361] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 710.353210][ T4361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 710.353215][ T4361] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:22 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x3000000}, [], {0x4}}, 0x24, 0x0) 06:16:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:16:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xf6ffffff}, [], {0x2}}, 0x24, 0x0) 06:16:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x7000000}, [], {0x4}}, 0x24, 0x0) [ 710.545132][ T4382] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 710.572923][ T4386] FAULT_INJECTION: forcing a failure. [ 710.572923][ T4386] name failslab, interval 1, probability 0, space 0, times 0 06:16:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfeffffff}, [], {0x2}}, 0x24, 0x0) [ 710.620270][ T4386] CPU: 1 PID: 4386 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 710.628189][ T4386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.638239][ T4386] Call Trace: [ 710.641625][ T4386] dump_stack+0x1d8/0x2f8 [ 710.646006][ T4386] should_fail+0x555/0x770 [ 710.650436][ T4386] __should_failslab+0x11a/0x160 [ 710.655373][ T4386] should_failslab+0x9/0x20 [ 710.659878][ T4386] kmem_cache_alloc_trace+0x5d/0x2f0 [ 710.665163][ T4386] ? smack_d_instantiate+0xabf/0xd70 [ 710.670452][ T4386] smack_d_instantiate+0xabf/0xd70 [ 710.675570][ T4386] ? lockdep_init_map+0x2a/0x680 [ 710.680507][ T4386] security_d_instantiate+0xa5/0x100 [ 710.685800][ T4386] d_instantiate_new+0x65/0x130 [ 710.690660][ T4386] ext4_mkdir+0xfa9/0x1450 [ 710.695089][ T4386] vfs_mkdir+0x43f/0x610 [ 710.699333][ T4386] do_mkdirat+0x1d7/0x320 [ 710.703661][ T4386] __x64_sys_mkdir+0x60/0x70 [ 710.708254][ T4386] do_syscall_64+0xfe/0x140 [ 710.712843][ T4386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.718730][ T4386] RIP: 0033:0x458c47 [ 710.722622][ T4386] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 710.742227][ T4386] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 710.750636][ T4386] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 710.758606][ T4386] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 06:16:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8800000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 710.766577][ T4386] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 710.774541][ T4386] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 710.782510][ T4386] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 710.908746][ T4403] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:22 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xf6ffffff00000000}}, 0x24, 0x0) 06:16:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x40000000}, [], {0x4}}, 0x24, 0x0) 06:16:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xffffff8c}, [], {0x2}}, 0x24, 0x0) 06:16:22 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 711.056061][ T4407] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 711.093520][ T4415] FAULT_INJECTION: forcing a failure. [ 711.093520][ T4415] name failslab, interval 1, probability 0, space 0, times 0 [ 711.106499][ T4415] CPU: 0 PID: 4415 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 711.114408][ T4415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.124459][ T4415] Call Trace: [ 711.127755][ T4415] dump_stack+0x1d8/0x2f8 [ 711.127771][ T4415] should_fail+0x555/0x770 [ 711.127787][ T4415] __should_failslab+0x11a/0x160 [ 711.136512][ T4415] ? __sigqueue_alloc+0x2ce/0x440 [ 711.146436][ T4415] should_failslab+0x9/0x20 [ 711.150950][ T4415] kmem_cache_alloc+0x56/0x2e0 [ 711.155707][ T4415] __sigqueue_alloc+0x2ce/0x440 [ 711.155719][ T4415] __send_signal+0x508/0xcd0 [ 711.155732][ T4415] send_signal+0x6e0/0x830 [ 711.155746][ T4415] force_sig_info_to_task+0x247/0x2e0 [ 711.169569][ T4415] force_sig_fault+0xbf/0x130 [ 711.169586][ T4415] __bad_area_nosemaphore+0x307/0x470 [ 711.169598][ T4415] bad_area+0x6b/0x80 [ 711.169608][ T4415] do_user_addr_fault+0xacc/0xaf0 [ 711.169628][ T4415] __do_page_fault+0xd3/0x1f0 [ 711.198653][ T4415] do_page_fault+0x99/0xb0 06:16:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x8cffffff}, [], {0x4}}, 0x24, 0x0) 06:16:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0xf6ffffff}, [], {0x4}}, 0x24, 0x0) 06:16:23 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xfeffffff00000000}}, 0x24, 0x0) [ 711.203156][ T4415] page_fault+0x39/0x40 [ 711.207314][ T4415] RIP: 0033:0x45342f [ 711.211205][ T4415] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 711.230979][ T4415] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00010283 [ 711.237043][ T4415] RAX: 00007f5a9ab3db40 RBX: 0000000020000228 RCX: 0000000000000000 [ 711.245010][ T4415] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f5a9ab3db40 [ 711.252973][ T4415] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 711.252979][ T4415] R10: 0000000000000075 R11: 00000000004e5240 R12: 0000000000000004 [ 711.252984][ T4415] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ffffff"], 0x24, 0x0) 06:16:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfffffff6}, [], {0x2}}, 0x24, 0x0) 06:16:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0xffffff8c}, [], {0x4}}, 0x24, 0x0) 06:16:23 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 711.471767][ T4436] FAULT_INJECTION: forcing a failure. [ 711.471767][ T4436] name failslab, interval 1, probability 0, space 0, times 0 [ 711.484389][ T4436] CPU: 0 PID: 4436 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 711.492273][ T4436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.502327][ T4436] Call Trace: [ 711.505622][ T4436] dump_stack+0x1d8/0x2f8 [ 711.509958][ T4436] should_fail+0x555/0x770 [ 711.514381][ T4436] __should_failslab+0x11a/0x160 [ 711.519407][ T4436] ? __sigqueue_alloc+0x2ce/0x440 [ 711.524434][ T4436] should_failslab+0x9/0x20 [ 711.528939][ T4436] kmem_cache_alloc+0x56/0x2e0 [ 711.533708][ T4436] __sigqueue_alloc+0x2ce/0x440 [ 711.538557][ T4436] __send_signal+0x508/0xcd0 [ 711.543149][ T4436] send_signal+0x6e0/0x830 [ 711.547672][ T4436] force_sig_info_to_task+0x247/0x2e0 [ 711.553043][ T4436] force_sig_fault+0xbf/0x130 [ 711.557722][ T4436] __bad_area_nosemaphore+0x307/0x470 [ 711.563099][ T4436] bad_area+0x6b/0x80 [ 711.567078][ T4436] do_user_addr_fault+0xacc/0xaf0 [ 711.572108][ T4436] __do_page_fault+0xd3/0x1f0 [ 711.576780][ T4436] do_page_fault+0x99/0xb0 [ 711.581199][ T4436] page_fault+0x39/0x40 [ 711.585353][ T4436] RIP: 0033:0x45342f [ 711.589244][ T4436] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 711.608843][ T4436] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00010283 06:16:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfffffffe}, [], {0x2}}, 0x24, 0x0) 06:16:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0xfffffff6}, [], {0x4}}, 0x24, 0x0) [ 711.614995][ T4436] RAX: 00007f5a9ab3db40 RBX: 0000000020000228 RCX: 0000000000000000 [ 711.622964][ T4436] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f5a9ab3db40 [ 711.631016][ T4436] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 711.639459][ T4436] R10: 0000000000000075 R11: 00000000004e5240 R12: 0000000000000004 [ 711.647430][ T4436] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x100000000000000}, [], {0x2}}, 0x24, 0x0) [ 711.702458][ T4437] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:23 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x100000000000000}, [], {0x4}}, 0x24, 0x0) 06:16:23 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x200000000000000}, [], {0x2}}, 0x24, 0x0) [ 711.858462][ T4455] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 711.887546][ T4461] FAULT_INJECTION: forcing a failure. [ 711.887546][ T4461] name failslab, interval 1, probability 0, space 0, times 0 [ 711.923176][ T4461] CPU: 0 PID: 4461 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 711.931276][ T4461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.941340][ T4461] Call Trace: [ 711.944640][ T4461] dump_stack+0x1d8/0x2f8 [ 711.948984][ T4461] should_fail+0x555/0x770 [ 711.953407][ T4461] __should_failslab+0x11a/0x160 [ 711.958347][ T4461] ? ksys_mount+0x6a/0x100 [ 711.962765][ T4461] should_failslab+0x9/0x20 [ 711.967267][ T4461] __kmalloc_track_caller+0x79/0x340 [ 711.972553][ T4461] strndup_user+0x76/0x130 [ 711.976969][ T4461] ksys_mount+0x6a/0x100 [ 711.981218][ T4461] __x64_sys_mount+0xbf/0xd0 [ 711.985814][ T4461] do_syscall_64+0xfe/0x140 [ 711.990320][ T4461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.996207][ T4461] RIP: 0033:0x45c27a [ 712.000100][ T4461] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 712.019697][ T4461] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 712.028104][ T4461] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 712.036073][ T4461] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 712.044037][ T4461] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 712.052010][ T4461] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 712.059980][ T4461] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {}, {0x20, 0x0, 0xffffffff00000000}}, 0x24, 0x0) 06:16:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="0200000001000000020000000400000000000000100000000000000020000000008cffff"], 0x24, 0x0) 06:16:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x200000000000000}, [], {0x4}}, 0x24, 0x0) 06:16:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x300000000000000}, [], {0x2}}, 0x24, 0x0) 06:16:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:24 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 712.589148][ T4474] FAULT_INJECTION: forcing a failure. [ 712.589148][ T4474] name failslab, interval 1, probability 0, space 0, times 0 [ 712.629611][ T4474] CPU: 1 PID: 4474 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 712.637539][ T4474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.647589][ T4474] Call Trace: [ 712.650882][ T4474] dump_stack+0x1d8/0x2f8 [ 712.655219][ T4474] should_fail+0x555/0x770 [ 712.659636][ T4474] __should_failslab+0x11a/0x160 [ 712.659653][ T4474] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 712.659666][ T4474] should_failslab+0x9/0x20 [ 712.659679][ T4474] __kmalloc+0x7a/0x340 [ 712.659695][ T4474] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 712.670329][ T4474] tomoyo_realpath_from_path+0xdc/0x7c0 [ 712.670345][ T4474] tomoyo_mount_permission+0x294/0xa30 [ 712.670365][ T4474] ? kmem_cache_free+0xd8/0xf0 [ 712.670393][ T4474] tomoyo_sb_mount+0x35/0x40 [ 712.684726][ T4474] security_sb_mount+0x84/0xe0 [ 712.684742][ T4474] do_mount+0x107/0x2490 [ 712.684753][ T4474] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 712.684768][ T4474] ? copy_mount_options+0x5f/0x3c0 [ 712.724680][ T4474] ? copy_mount_options+0x308/0x3c0 [ 712.729884][ T4474] ksys_mount+0xcc/0x100 [ 712.734128][ T4474] __x64_sys_mount+0xbf/0xd0 [ 712.738721][ T4474] do_syscall_64+0xfe/0x140 [ 712.743226][ T4474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.749110][ T4474] RIP: 0033:0x45c27a [ 712.753003][ T4474] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 712.772605][ T4474] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 712.781018][ T4474] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 712.789336][ T4474] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 712.797303][ T4474] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 712.805275][ T4474] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 712.814111][ T4474] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x300000000000000}, [], {0x4}}, 0x24, 0x0) 06:16:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x700000000000000}, [], {0x2}}, 0x24, 0x0) 06:16:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x700000000000000}, [], {0x4}}, 0x24, 0x0) 06:16:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000ebffff"], 0x24, 0x0) 06:16:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x4000000000000000}, [], {0x2}}, 0x24, 0x0) 06:16:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x4000000000000000}, [], {0x4}}, 0x24, 0x0) [ 712.822320][ T4473] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 712.833524][ T4474] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x4, 0x0) 06:16:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x8cffffff00000000}, [], {0x4}}, 0x24, 0x0) 06:16:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x8cffffff00000000}, [], {0x2}}, 0x24, 0x0) 06:16:24 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 712.953941][ T4501] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xf6ffffff00000000}, [], {0x2}}, 0x24, 0x0) [ 713.088037][ T4507] FAULT_INJECTION: forcing a failure. [ 713.088037][ T4507] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 713.101266][ T4507] CPU: 0 PID: 4507 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 713.109154][ T4507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.109160][ T4507] Call Trace: [ 713.109180][ T4507] dump_stack+0x1d8/0x2f8 [ 713.109199][ T4507] should_fail+0x555/0x770 [ 713.109217][ T4507] should_fail_alloc_page+0x55/0x60 [ 713.136508][ T4507] prepare_alloc_pages+0x283/0x470 [ 713.136522][ T4507] __alloc_pages_nodemask+0xb2/0x5d0 [ 713.136540][ T4507] kmem_getpages+0x56/0xa20 [ 713.136556][ T4507] ? trace_lock_release+0x135/0x1a0 [ 713.156601][ T4507] cache_grow_begin+0x7e/0x2c0 [ 713.161369][ T4507] cache_alloc_refill+0x311/0x3f0 [ 713.166387][ T4507] ? check_preemption_disabled+0xb7/0x2a0 [ 713.172104][ T4507] kmem_cache_alloc+0x2b9/0x2e0 [ 713.176954][ T4507] ? getname_flags+0xba/0x640 [ 713.181629][ T4507] getname_flags+0xba/0x640 06:16:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0xf6ffffff00000000}, [], {0x4}}, 0x24, 0x0) [ 713.186136][ T4507] user_path_at_empty+0x2d/0x50 [ 713.191158][ T4507] do_mount+0xd4/0x2490 [ 713.195315][ T4507] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 713.200876][ T4507] ? copy_mount_options+0x5f/0x3c0 [ 713.205982][ T4507] ? __kasan_check_read+0x11/0x20 [ 713.211005][ T4507] ? copy_mount_options+0x308/0x3c0 [ 713.216234][ T4507] ksys_mount+0xcc/0x100 [ 713.220476][ T4507] __x64_sys_mount+0xbf/0xd0 [ 713.225097][ T4507] do_syscall_64+0xfe/0x140 [ 713.229620][ T4507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.235515][ T4507] RIP: 0033:0x45c27a [ 713.239407][ T4507] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 713.259007][ T4507] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 713.267415][ T4507] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 713.275382][ T4507] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 06:16:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xfeffffff00000000}, [], {0x2}}, 0x24, 0x0) [ 713.283354][ T4507] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 713.291322][ T4507] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 713.299290][ T4507] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x1001, 0x0) [ 713.393256][ T4520] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 713.509232][ T4530] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000f6ffff"], 0x24, 0x0) 06:16:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0xffffffff00000000}, [], {0x4}}, 0x24, 0x0) 06:16:25 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0xffffffff00000000}, [], {0x2}}, 0x24, 0x0) 06:16:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x400001, 0x0) 06:16:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x2}, [], {0x2}}, 0x24, 0x0) [ 713.784122][ T4541] FAULT_INJECTION: forcing a failure. [ 713.784122][ T4541] name failslab, interval 1, probability 0, space 0, times 0 [ 713.833295][ T4541] CPU: 0 PID: 4541 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 713.841225][ T4541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.851300][ T4541] Call Trace: [ 713.851320][ T4541] dump_stack+0x1d8/0x2f8 [ 713.851337][ T4541] should_fail+0x555/0x770 [ 713.851353][ T4541] __should_failslab+0x11a/0x160 [ 713.851370][ T4541] ? ksys_mount+0x38/0x100 [ 713.863377][ T4541] should_failslab+0x9/0x20 [ 713.863391][ T4541] __kmalloc_track_caller+0x79/0x340 06:16:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x2}, [], {0x4}}, 0x24, 0x0) 06:16:25 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x20000924, 0x0) [ 713.863408][ T4541] strndup_user+0x76/0x130 [ 713.872744][ T4541] ksys_mount+0x38/0x100 [ 713.872757][ T4541] __x64_sys_mount+0xbf/0xd0 [ 713.872769][ T4541] do_syscall_64+0xfe/0x140 [ 713.872783][ T4541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.872791][ T4541] RIP: 0033:0x45c27a [ 713.872801][ T4541] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 06:16:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x3}, [], {0x4}}, 0x24, 0x0) [ 713.872812][ T4541] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 713.882561][ T4541] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 713.882566][ T4541] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 713.882571][ T4541] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 713.882576][ T4541] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 713.882581][ T4541] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x7}, [], {0x4}}, 0x24, 0x0) 06:16:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x3}, [], {0x2}}, 0x24, 0x0) [ 713.890055][ T4543] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000feffff"], 0x24, 0x0) 06:16:25 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x2) 06:16:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x7}, [], {0x2}}, 0x24, 0x0) [ 714.103119][ T4567] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 714.146130][ T4573] FAULT_INJECTION: forcing a failure. [ 714.146130][ T4573] name failslab, interval 1, probability 0, space 0, times 0 [ 714.169686][ T4573] CPU: 1 PID: 4573 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 714.177633][ T4573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.187719][ T4573] Call Trace: [ 714.191028][ T4573] dump_stack+0x1d8/0x2f8 [ 714.195371][ T4573] should_fail+0x555/0x770 [ 714.199801][ T4573] __should_failslab+0x11a/0x160 [ 714.204745][ T4573] ? tomoyo_encode2+0x273/0x5a0 [ 714.209607][ T4573] should_failslab+0x9/0x20 [ 714.214107][ T4573] __kmalloc+0x7a/0x340 [ 714.218268][ T4573] tomoyo_encode2+0x273/0x5a0 [ 714.222947][ T4573] tomoyo_realpath_from_path+0x769/0x7c0 [ 714.228584][ T4573] tomoyo_mount_permission+0x294/0xa30 [ 714.234041][ T4573] ? path_lookupat+0x474/0xb30 [ 714.238812][ T4573] ? kmem_cache_free+0xd8/0xf0 [ 714.243594][ T4573] tomoyo_sb_mount+0x35/0x40 [ 714.248182][ T4573] security_sb_mount+0x84/0xe0 [ 714.252952][ T4573] do_mount+0x107/0x2490 [ 714.257284][ T4573] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 714.262826][ T4573] ? copy_mount_options+0x5f/0x3c0 [ 714.267935][ T4573] ? copy_mount_options+0x308/0x3c0 [ 714.273134][ T4573] ksys_mount+0xcc/0x100 [ 714.277379][ T4573] __x64_sys_mount+0xbf/0xd0 [ 714.281970][ T4573] do_syscall_64+0xfe/0x140 [ 714.286479][ T4573] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.292372][ T4573] RIP: 0033:0x45c27a [ 714.296263][ T4573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 714.315864][ T4573] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 714.324286][ T4573] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 714.332256][ T4573] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 06:16:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x300}, [], {0x4}}, 0x24, 0x0) 06:16:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x300}, [], {0x2}}, 0x24, 0x0) [ 714.340223][ T4573] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 714.348192][ T4573] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 714.356164][ T4573] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 714.377577][ T4573] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x700}, [], {0x4}}, 0x24, 0x0) 06:16:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x700}, [], {0x2}}, 0x24, 0x0) 06:16:26 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x4000}, [], {0x4}}, 0x24, 0x0) 06:16:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x4000}, [], {0x2}}, 0x24, 0x0) 06:16:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x1000000}, [], {0x4}}, 0x24, 0x0) [ 714.612944][ T4597] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 714.643733][ T4605] FAULT_INJECTION: forcing a failure. [ 714.643733][ T4605] name failslab, interval 1, probability 0, space 0, times 0 [ 714.692777][ T4605] CPU: 0 PID: 4605 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 714.700702][ T4605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.710758][ T4605] Call Trace: [ 714.714063][ T4605] dump_stack+0x1d8/0x2f8 [ 714.718402][ T4605] should_fail+0x555/0x770 [ 714.722828][ T4605] __should_failslab+0x11a/0x160 [ 714.727777][ T4605] ? tomoyo_encode2+0x273/0x5a0 [ 714.732634][ T4605] should_failslab+0x9/0x20 [ 714.737143][ T4605] __kmalloc+0x7a/0x340 [ 714.741299][ T4605] tomoyo_encode2+0x273/0x5a0 [ 714.745977][ T4605] tomoyo_encode+0x29/0x40 [ 714.750399][ T4605] tomoyo_mount_permission+0x216/0xa30 [ 714.755861][ T4605] ? debug_check_no_obj_freed+0x505/0x5b0 [ 714.761583][ T4605] ? path_lookupat+0x474/0xb30 [ 714.766435][ T4605] ? kmem_cache_free+0xd8/0xf0 [ 714.771213][ T4605] tomoyo_sb_mount+0x35/0x40 [ 714.775808][ T4605] security_sb_mount+0x84/0xe0 [ 714.780572][ T4605] do_mount+0x107/0x2490 [ 714.784820][ T4605] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 714.790367][ T4605] ? copy_mount_options+0x5f/0x3c0 [ 714.795480][ T4605] ? copy_mount_options+0x308/0x3c0 [ 714.800690][ T4605] ksys_mount+0xcc/0x100 [ 714.804984][ T4605] __x64_sys_mount+0xbf/0xd0 [ 714.809578][ T4605] do_syscall_64+0xfe/0x140 [ 714.814090][ T4605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.820004][ T4605] RIP: 0033:0x45c27a [ 714.823895][ T4605] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 714.843504][ T4605] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 714.851922][ T4605] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 714.859902][ T4605] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 714.867873][ T4605] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 714.875851][ T4605] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 714.883825][ T4605] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:26 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x3) 06:16:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x1000000}, [], {0x2}}, 0x24, 0x0) 06:16:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x2000000}, [], {0x4}}, 0x24, 0x0) [ 714.966980][ T4614] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:26 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 715.104837][ T4625] FAULT_INJECTION: forcing a failure. [ 715.104837][ T4625] name failslab, interval 1, probability 0, space 0, times 0 [ 715.117548][ T4625] CPU: 0 PID: 4625 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 715.125439][ T4625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.135499][ T4625] Call Trace: [ 715.138799][ T4625] dump_stack+0x1d8/0x2f8 [ 715.143135][ T4625] should_fail+0x555/0x770 [ 715.147560][ T4625] __should_failslab+0x11a/0x160 [ 715.152532][ T4625] ? btrfs_mount+0x83/0x18f0 [ 715.157126][ T4625] should_failslab+0x9/0x20 [ 715.161628][ T4625] __kmalloc_track_caller+0x79/0x340 [ 715.166909][ T4625] ? tomoyo_mount_permission+0x8d8/0xa30 [ 715.172546][ T4625] kstrdup+0x34/0x70 [ 715.176442][ T4625] btrfs_mount+0x83/0x18f0 [ 715.180860][ T4625] ? legacy_parse_param+0x37b/0x880 [ 715.186067][ T4625] ? cap_capable+0x250/0x290 [ 715.190657][ T4625] legacy_get_tree+0xf9/0x1a0 [ 715.195330][ T4625] ? btrfs_resize_thread_pool+0x290/0x290 [ 715.201051][ T4625] vfs_get_tree+0x8f/0x380 [ 715.205479][ T4625] do_mount+0x169d/0x2490 [ 715.209814][ T4625] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 715.215355][ T4625] ? copy_mount_options+0x5f/0x3c0 [ 715.220558][ T4625] ? copy_mount_options+0x308/0x3c0 [ 715.225763][ T4625] ksys_mount+0xcc/0x100 [ 715.230008][ T4625] __x64_sys_mount+0xbf/0xd0 [ 715.234605][ T4625] do_syscall_64+0xfe/0x140 [ 715.239111][ T4625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.245008][ T4625] RIP: 0033:0x45c27a [ 715.248898][ T4625] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 715.268513][ T4625] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 715.276928][ T4625] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 715.284995][ T4625] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 715.292965][ T4625] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 715.301018][ T4625] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 715.308987][ T4625] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x3000000}, [], {0x4}}, 0x24, 0x0) 06:16:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x2000000}, [], {0x2}}, 0x24, 0x0) 06:16:27 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 715.377294][ T4628] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x7000000}, [], {0x4}}, 0x24, 0x0) 06:16:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x3000000}, [], {0x2}}, 0x24, 0x0) [ 715.487512][ T4637] FAULT_INJECTION: forcing a failure. [ 715.487512][ T4637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.500747][ T4637] CPU: 1 PID: 4637 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 715.508629][ T4637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.518683][ T4637] Call Trace: [ 715.521994][ T4637] dump_stack+0x1d8/0x2f8 [ 715.526331][ T4637] should_fail+0x555/0x770 [ 715.530753][ T4637] should_fail_alloc_page+0x55/0x60 [ 715.535950][ T4637] prepare_alloc_pages+0x283/0x470 [ 715.541073][ T4637] __alloc_pages_nodemask+0xb2/0x5d0 [ 715.546374][ T4637] kmem_getpages+0x56/0xa20 [ 715.551046][ T4637] ? quarantine_put+0xb7/0x1f0 [ 715.555817][ T4637] cache_grow_begin+0x7e/0x2c0 [ 715.560677][ T4637] cache_alloc_refill+0x311/0x3f0 [ 715.565718][ T4637] ? check_preemption_disabled+0xb7/0x2a0 [ 715.571437][ T4637] __kmalloc+0x318/0x340 [ 715.575680][ T4637] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 715.581401][ T4637] tomoyo_realpath_from_path+0xdc/0x7c0 [ 715.586955][ T4637] tomoyo_mount_permission+0x294/0xa30 [ 715.592431][ T4637] ? kmem_cache_free+0xd8/0xf0 [ 715.597211][ T4637] tomoyo_sb_mount+0x35/0x40 [ 715.601805][ T4637] security_sb_mount+0x84/0xe0 [ 715.606575][ T4637] do_mount+0x107/0x2490 [ 715.610813][ T4637] ? copy_mount_options+0x25e/0x3c0 [ 715.616016][ T4637] ? copy_mount_options+0x308/0x3c0 [ 715.621210][ T4637] ksys_mount+0xcc/0x100 [ 715.625476][ T4637] __x64_sys_mount+0xbf/0xd0 [ 715.630068][ T4637] do_syscall_64+0xfe/0x140 [ 715.634575][ T4637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.640889][ T4637] RIP: 0033:0x45c27a [ 715.644783][ T4637] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 715.664388][ T4637] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 715.672801][ T4637] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a 06:16:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 715.680786][ T4637] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 715.688764][ T4637] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 715.696740][ T4637] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 715.704713][ T4637] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:27 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x7) 06:16:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x40000000}, [], {0x4}}, 0x24, 0x0) 06:16:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x7000000}, [], {0x2}}, 0x24, 0x0) 06:16:27 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 715.822428][ T4650] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 715.913479][ T4658] FAULT_INJECTION: forcing a failure. [ 715.913479][ T4658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.926708][ T4658] CPU: 1 PID: 4658 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 715.934682][ T4658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.944763][ T4658] Call Trace: [ 715.948056][ T4658] dump_stack+0x1d8/0x2f8 [ 715.952400][ T4658] should_fail+0x555/0x770 [ 715.956911][ T4658] should_fail_alloc_page+0x55/0x60 [ 715.962106][ T4658] prepare_alloc_pages+0x283/0x470 [ 715.967212][ T4658] __alloc_pages_nodemask+0xb2/0x5d0 [ 715.972500][ T4658] kmem_getpages+0x56/0xa20 [ 715.977005][ T4658] ? quarantine_put+0xb7/0x1f0 [ 715.977019][ T4658] cache_grow_begin+0x7e/0x2c0 [ 715.977032][ T4658] cache_alloc_refill+0x311/0x3f0 [ 715.977042][ T4658] ? check_preemption_disabled+0xb7/0x2a0 [ 715.977056][ T4658] __kmalloc+0x318/0x340 [ 715.986550][ T4658] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 715.986563][ T4658] tomoyo_realpath_from_path+0xdc/0x7c0 06:16:27 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x8cffffff}, [], {0x4}}, 0x24, 0x0) [ 715.986578][ T4658] tomoyo_mount_permission+0x294/0xa30 [ 715.986593][ T4658] ? path_lookupat+0x474/0xb30 [ 715.997300][ T4658] ? kmem_cache_free+0xd8/0xf0 [ 715.997323][ T4658] tomoyo_sb_mount+0x35/0x40 [ 715.997335][ T4658] security_sb_mount+0x84/0xe0 [ 715.997351][ T4658] do_mount+0x107/0x2490 [ 716.007279][ T4658] ? copy_mount_options+0x25e/0x3c0 [ 716.007293][ T4658] ? copy_mount_options+0x308/0x3c0 [ 716.007304][ T4658] ksys_mount+0xcc/0x100 [ 716.007316][ T4658] __x64_sys_mount+0xbf/0xd0 [ 716.007331][ T4658] do_syscall_64+0xfe/0x140 [ 716.018297][ T4658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.018306][ T4658] RIP: 0033:0x45c27a [ 716.018316][ T4658] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 716.018321][ T4658] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 716.018336][ T4658] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 716.027817][ T4658] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 716.027823][ T4658] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 716.027828][ T4658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 716.027834][ T4658] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 716.107221][ T4663] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 06:16:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xf6ffffff}, [], {0x4}}, 0x24, 0x0) 06:16:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x40000000}, [], {0x2}}, 0x24, 0x0) 06:16:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x300) 06:16:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:28 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x8cffffff}, [], {0x2}}, 0x24, 0x0) [ 716.657351][ T4683] FAULT_INJECTION: forcing a failure. [ 716.657351][ T4683] name failslab, interval 1, probability 0, space 0, times 0 [ 716.686375][ T4680] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xffffff8c}, [], {0x4}}, 0x24, 0x0) 06:16:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x700) [ 716.719686][ T4683] CPU: 0 PID: 4683 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 716.727603][ T4683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.737655][ T4683] Call Trace: [ 716.737674][ T4683] dump_stack+0x1d8/0x2f8 [ 716.737691][ T4683] should_fail+0x555/0x770 [ 716.737709][ T4683] __should_failslab+0x11a/0x160 [ 716.754654][ T4683] ? btrfs_mount+0x83/0x18f0 [ 716.759243][ T4683] should_failslab+0x9/0x20 [ 716.763738][ T4683] __kmalloc_track_caller+0x79/0x340 06:16:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xfffffff6}, [], {0x4}}, 0x24, 0x0) [ 716.763749][ T4683] ? tomoyo_mount_permission+0x8d8/0xa30 [ 716.763761][ T4683] kstrdup+0x34/0x70 [ 716.763772][ T4683] btrfs_mount+0x83/0x18f0 [ 716.763791][ T4683] ? legacy_parse_param+0x37b/0x880 [ 716.763805][ T4683] ? cap_capable+0x250/0x290 [ 716.792758][ T4683] legacy_get_tree+0xf9/0x1a0 [ 716.797446][ T4683] ? btrfs_resize_thread_pool+0x290/0x290 [ 716.803165][ T4683] vfs_get_tree+0x8f/0x380 [ 716.807610][ T4683] do_mount+0x169d/0x2490 [ 716.811956][ T4683] ? kmem_cache_alloc_trace+0x23a/0x2f0 06:16:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x100000000000000}, [], {0x4}}, 0x24, 0x0) [ 716.817505][ T4683] ? copy_mount_options+0x5f/0x3c0 [ 716.822616][ T4683] ? copy_mount_options+0x308/0x3c0 [ 716.827816][ T4683] ksys_mount+0xcc/0x100 [ 716.832095][ T4683] __x64_sys_mount+0xbf/0xd0 [ 716.836692][ T4683] do_syscall_64+0xfe/0x140 [ 716.841196][ T4683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.847080][ T4683] RIP: 0033:0x45c27a [ 716.850973][ T4683] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 06:16:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x200000000000000}, [], {0x4}}, 0x24, 0x0) [ 716.870575][ T4683] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 716.879074][ T4683] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 716.887045][ T4683] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 716.895017][ T4683] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 716.903019][ T4683] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 716.911063][ T4683] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 717.026550][ T4711] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x300000000000000}, [], {0x4}}, 0x24, 0x0) 06:16:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xf6ffffff}, [], {0x2}}, 0x24, 0x0) 06:16:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x4000) 06:16:29 executing program 2 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 717.708164][ T4725] FAULT_INJECTION: forcing a failure. [ 717.708164][ T4725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.721433][ T4725] CPU: 1 PID: 4725 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 717.721447][ T4725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.721451][ T4725] Call Trace: [ 717.721476][ T4725] dump_stack+0x1d8/0x2f8 [ 717.721498][ T4725] should_fail+0x555/0x770 [ 717.721515][ T4725] should_fail_alloc_page+0x55/0x60 [ 717.721543][ T4725] prepare_alloc_pages+0x283/0x470 [ 717.721581][ T4725] __alloc_pages_nodemask+0xb2/0x5d0 [ 717.740045][ T4725] ? debug_check_no_obj_freed+0x505/0x5b0 [ 717.740070][ T4725] kmem_getpages+0x56/0xa20 [ 717.740086][ T4725] ? trace_lock_release+0x135/0x1a0 [ 717.740105][ T4725] cache_grow_begin+0x7e/0x2c0 [ 717.740123][ T4725] cache_alloc_refill+0x311/0x3f0 [ 717.740144][ T4725] ? check_preemption_disabled+0xb7/0x2a0 [ 717.803281][ T4725] kmem_cache_alloc+0x2b9/0x2e0 [ 717.808268][ T4725] ? getname_kernel+0x59/0x2f0 [ 717.813075][ T4725] getname_kernel+0x59/0x2f0 [ 717.817720][ T4725] kern_path+0x1f/0x40 [ 717.821817][ T4725] tomoyo_mount_permission+0x7f1/0xa30 [ 717.827361][ T4725] ? kmem_cache_free+0xd8/0xf0 [ 717.832205][ T4725] tomoyo_sb_mount+0x35/0x40 [ 717.836836][ T4725] security_sb_mount+0x84/0xe0 [ 717.841666][ T4725] do_mount+0x107/0x2490 [ 717.845931][ T4725] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 717.851542][ T4725] ? copy_mount_options+0x5f/0x3c0 [ 717.856681][ T4725] ? copy_mount_options+0x308/0x3c0 [ 717.861914][ T4725] ksys_mount+0xcc/0x100 [ 717.866186][ T4725] __x64_sys_mount+0xbf/0xd0 [ 717.870890][ T4725] do_syscall_64+0xfe/0x140 [ 717.875615][ T4725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.881561][ T4725] RIP: 0033:0x45c27a [ 717.885482][ T4725] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 06:16:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfeffffff}, [], {0x2}}, 0x24, 0x0) 06:16:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x700000000000000}, [], {0x4}}, 0x24, 0x0) [ 717.905129][ T4725] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 717.913609][ T4725] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 717.921683][ T4725] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 717.929769][ T4725] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 717.937755][ T4725] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 717.945812][ T4725] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x4000000000000000}, [], {0x4}}, 0x24, 0x0) 06:16:29 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x1000000) [ 717.966974][ T4724] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xffffff8c}, [], {0x2}}, 0x24, 0x0) 06:16:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0x8cffffff00000000}, [], {0x4}}, 0x24, 0x0) [ 718.065850][ T4741] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x2000000) 06:16:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xf6ffffff00000000}, [], {0x4}}, 0x24, 0x0) 06:16:30 executing program 2 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfffffff6}, [], {0x2}}, 0x24, 0x0) 06:16:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 718.912575][ T4764] FAULT_INJECTION: forcing a failure. [ 718.912575][ T4764] name failslab, interval 1, probability 0, space 0, times 0 [ 718.938147][ T4761] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 718.959480][ T4764] CPU: 1 PID: 4764 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 718.967397][ T4764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.977476][ T4764] Call Trace: [ 718.977496][ T4764] dump_stack+0x1d8/0x2f8 [ 718.977514][ T4764] should_fail+0x555/0x770 [ 718.977529][ T4764] __should_failslab+0x11a/0x160 [ 718.977551][ T4764] should_failslab+0x9/0x20 [ 718.985143][ T4764] kmem_cache_alloc_trace+0x5d/0x2f0 [ 718.985155][ T4764] ? legacy_init_fs_context+0x51/0xc0 [ 718.985168][ T4764] legacy_init_fs_context+0x51/0xc0 [ 718.985178][ T4764] alloc_fs_context+0x4e3/0x5f0 [ 718.985192][ T4764] fs_context_for_mount+0x24/0x30 [ 718.994529][ T4764] vfs_kern_mount+0x2c/0x160 [ 718.994543][ T4764] btrfs_mount+0x34f/0x18f0 [ 718.994561][ T4764] ? legacy_parse_param+0x37b/0x880 [ 718.994575][ T4764] ? cap_capable+0x250/0x290 [ 718.994588][ T4764] legacy_get_tree+0xf9/0x1a0 [ 719.048303][ T4764] ? btrfs_resize_thread_pool+0x290/0x290 [ 719.054038][ T4764] vfs_get_tree+0x8f/0x380 [ 719.058465][ T4764] do_mount+0x169d/0x2490 [ 719.062798][ T4764] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 719.068444][ T4764] ? copy_mount_options+0x5f/0x3c0 [ 719.073557][ T4764] ? copy_mount_options+0x308/0x3c0 [ 719.078762][ T4764] ksys_mount+0xcc/0x100 [ 719.083023][ T4764] __x64_sys_mount+0xbf/0xd0 [ 719.087621][ T4764] do_syscall_64+0xfe/0x140 [ 719.092123][ T4764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.098019][ T4764] RIP: 0033:0x45c27a [ 719.101910][ T4764] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 719.121516][ T4764] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 719.129936][ T4764] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 719.137916][ T4764] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 719.145924][ T4764] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 719.153898][ T4764] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 06:16:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x4, 0x0, 0xffffffff00000000}, [], {0x4}}, 0x24, 0x0) 06:16:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfffffffe}, [], {0x2}}, 0x24, 0x0) 06:16:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x3000000) 06:16:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x2}}, 0x24, 0x0) [ 719.161873][ T4764] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:31 executing program 2 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x100000000000000}, [], {0x2}}, 0x24, 0x0) 06:16:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x8}}, 0x24, 0x0) [ 719.320837][ T4782] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x7000000) [ 719.397819][ T4794] FAULT_INJECTION: forcing a failure. [ 719.397819][ T4794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 719.411079][ T4794] CPU: 1 PID: 4794 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 719.418997][ T4794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.429058][ T4794] Call Trace: [ 719.432369][ T4794] dump_stack+0x1d8/0x2f8 [ 719.436708][ T4794] should_fail+0x555/0x770 [ 719.441308][ T4794] should_fail_alloc_page+0x55/0x60 [ 719.446510][ T4794] prepare_alloc_pages+0x283/0x470 [ 719.451630][ T4794] __alloc_pages_nodemask+0xb2/0x5d0 [ 719.456950][ T4794] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 719.462799][ T4794] kmem_getpages+0x56/0xa20 [ 719.467309][ T4794] cache_grow_begin+0x7e/0x2c0 [ 719.472078][ T4794] cache_alloc_refill+0x311/0x3f0 [ 719.477106][ T4794] ? check_preemption_disabled+0xb7/0x2a0 [ 719.482832][ T4794] __kmalloc+0x318/0x340 [ 719.487070][ T4794] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 719.492791][ T4794] tomoyo_realpath_from_path+0xdc/0x7c0 [ 719.498341][ T4794] tomoyo_mount_permission+0x923/0xa30 [ 719.503807][ T4794] ? kmem_cache_free+0xd8/0xf0 [ 719.508581][ T4794] tomoyo_sb_mount+0x35/0x40 [ 719.513170][ T4794] security_sb_mount+0x84/0xe0 [ 719.517934][ T4794] do_mount+0x107/0x2490 [ 719.522177][ T4794] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 719.527725][ T4794] ? copy_mount_options+0x5f/0x3c0 [ 719.532839][ T4794] ? copy_mount_options+0x308/0x3c0 [ 719.538049][ T4794] ksys_mount+0xcc/0x100 [ 719.542288][ T4794] __x64_sys_mount+0xbf/0xd0 [ 719.546909][ T4794] do_syscall_64+0xfe/0x140 [ 719.551415][ T4794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.557305][ T4794] RIP: 0033:0x45c27a [ 719.561224][ T4794] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 719.580837][ T4794] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 719.589275][ T4794] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a 06:16:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x0) [ 719.597256][ T4794] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 719.605321][ T4794] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 719.613317][ T4794] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 719.621293][ T4794] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x200000000000000}, [], {0x2}}, 0x24, 0x0) 06:16:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x2}}, 0x24, 0x0) 06:16:31 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x40000000) 06:16:31 executing program 2 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x300000000000000}, [], {0x2}}, 0x24, 0x0) [ 719.792605][ T4806] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 719.879446][ T4819] FAULT_INJECTION: forcing a failure. [ 719.879446][ T4819] name failslab, interval 1, probability 0, space 0, times 0 [ 719.912425][ T4819] CPU: 1 PID: 4819 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 719.920357][ T4819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.930411][ T4819] Call Trace: [ 719.933709][ T4819] dump_stack+0x1d8/0x2f8 [ 719.938070][ T4819] should_fail+0x555/0x770 [ 719.942495][ T4819] __should_failslab+0x11a/0x160 [ 719.947440][ T4819] should_failslab+0x9/0x20 [ 719.951946][ T4819] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 719.957666][ T4819] ? __kmalloc_node+0x3c/0x60 [ 719.962346][ T4819] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 719.967810][ T4819] __kmalloc_node+0x3c/0x60 [ 719.972319][ T4819] kvmalloc_node+0xcc/0x130 [ 719.976847][ T4819] btrfs_mount_root+0xe3/0x1050 [ 719.981712][ T4819] ? vfs_parse_fs_string+0x13b/0x1a0 [ 719.987004][ T4819] ? trace_kfree+0xa0/0x110 [ 719.991508][ T4819] legacy_get_tree+0xf9/0x1a0 [ 719.996222][ T4819] ? btrfs_control_open+0x40/0x40 [ 720.001250][ T4819] vfs_get_tree+0x8f/0x380 [ 720.005699][ T4819] vfs_kern_mount+0xc2/0x160 [ 720.010296][ T4819] btrfs_mount+0x34f/0x18f0 [ 720.014808][ T4819] ? legacy_parse_param+0x37b/0x880 [ 720.020100][ T4819] ? cap_capable+0x250/0x290 [ 720.024698][ T4819] legacy_get_tree+0xf9/0x1a0 [ 720.029381][ T4819] ? btrfs_resize_thread_pool+0x290/0x290 [ 720.035103][ T4819] vfs_get_tree+0x8f/0x380 [ 720.039522][ T4819] do_mount+0x169d/0x2490 [ 720.043851][ T4819] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 720.049395][ T4819] ? copy_mount_options+0x5f/0x3c0 [ 720.054513][ T4819] ? copy_mount_options+0x308/0x3c0 [ 720.059713][ T4819] ksys_mount+0xcc/0x100 [ 720.063960][ T4819] __x64_sys_mount+0xbf/0xd0 [ 720.068557][ T4819] do_syscall_64+0xfe/0x140 [ 720.073078][ T4819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.078968][ T4819] RIP: 0033:0x45c27a [ 720.082867][ T4819] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 720.102733][ T4819] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.111149][ T4819] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 720.119126][ T4819] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 720.127099][ T4819] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 720.135073][ T4819] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 720.143046][ T4819] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x8cffffff) 06:16:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x3}}, 0x24, 0x0) 06:16:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x700000000000000}, [], {0x2}}, 0x24, 0x0) [ 720.182962][ T4823] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xebffffff) 06:16:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x4000000000000000}, [], {0x2}}, 0x24, 0x0) 06:16:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:32 executing program 2 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x7}}, 0x24, 0x0) 06:16:32 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0x8cffffff00000000}, [], {0x2}}, 0x24, 0x0) 06:16:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x300}}, 0x24, 0x0) 06:16:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xf6ffffff) [ 720.414567][ T4840] FAULT_INJECTION: forcing a failure. [ 720.414567][ T4840] name failslab, interval 1, probability 0, space 0, times 0 [ 720.449616][ T4840] CPU: 0 PID: 4840 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 720.457555][ T4840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.467609][ T4840] Call Trace: [ 720.467967][ T4847] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 720.470899][ T4840] dump_stack+0x1d8/0x2f8 [ 720.470919][ T4840] should_fail+0x555/0x770 [ 720.470936][ T4840] __should_failslab+0x11a/0x160 [ 720.470952][ T4840] ? btrfs_mount+0x83/0x18f0 [ 720.470964][ T4840] should_failslab+0x9/0x20 [ 720.470976][ T4840] __kmalloc_track_caller+0x79/0x340 [ 720.470988][ T4840] ? tomoyo_mount_permission+0x8d8/0xa30 [ 720.471003][ T4840] kstrdup+0x34/0x70 [ 720.471019][ T4840] btrfs_mount+0x83/0x18f0 [ 720.525449][ T4840] ? legacy_parse_param+0x37b/0x880 [ 720.530664][ T4840] ? cap_capable+0x250/0x290 [ 720.535259][ T4840] legacy_get_tree+0xf9/0x1a0 [ 720.539972][ T4840] ? btrfs_resize_thread_pool+0x290/0x290 [ 720.539983][ T4840] vfs_get_tree+0x8f/0x380 [ 720.539995][ T4840] do_mount+0x169d/0x2490 [ 720.540007][ T4840] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 720.540016][ T4840] ? copy_mount_options+0x5f/0x3c0 [ 720.540026][ T4840] ? copy_mount_options+0x308/0x3c0 [ 720.540037][ T4840] ksys_mount+0xcc/0x100 [ 720.540047][ T4840] __x64_sys_mount+0xbf/0xd0 [ 720.540059][ T4840] do_syscall_64+0xfe/0x140 [ 720.540072][ T4840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.540081][ T4840] RIP: 0033:0x45c27a [ 720.540091][ T4840] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 720.540096][ T4840] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.540105][ T4840] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 720.540117][ T4840] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 720.550241][ T4840] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 720.550247][ T4840] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 720.550253][ T4840] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 720.736157][ T4861] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xf6ffffff00000000}, [], {0x2}}, 0x24, 0x0) 06:16:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x700}}, 0x24, 0x0) 06:16:33 executing program 2 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xfeffffff) 06:16:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xfeffffff00000000}, [], {0x2}}, 0x24, 0x0) 06:16:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x4000}}, 0x24, 0x0) [ 721.265874][ T4873] FAULT_INJECTION: forcing a failure. [ 721.265874][ T4873] name failslab, interval 1, probability 0, space 0, times 0 [ 721.281031][ T4871] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 721.344588][ T4873] CPU: 1 PID: 4873 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 721.352520][ T4873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.362581][ T4873] Call Trace: [ 721.365886][ T4873] dump_stack+0x1d8/0x2f8 [ 721.370230][ T4873] should_fail+0x555/0x770 [ 721.374666][ T4873] __should_failslab+0x11a/0x160 [ 721.379619][ T4873] ? tomoyo_encode2+0x273/0x5a0 [ 721.384487][ T4873] should_failslab+0x9/0x20 [ 721.389000][ T4873] __kmalloc+0x7a/0x340 [ 721.393244][ T4873] tomoyo_encode2+0x273/0x5a0 [ 721.397930][ T4873] tomoyo_realpath_from_path+0x769/0x7c0 [ 721.403574][ T4873] tomoyo_mount_permission+0x923/0xa30 [ 721.409047][ T4873] ? kmem_cache_free+0xd8/0xf0 [ 721.413834][ T4873] tomoyo_sb_mount+0x35/0x40 [ 721.418450][ T4873] security_sb_mount+0x84/0xe0 [ 721.423226][ T4873] do_mount+0x107/0x2490 [ 721.427478][ T4873] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 721.433038][ T4873] ? copy_mount_options+0x5f/0x3c0 [ 721.438160][ T4873] ? copy_mount_options+0x308/0x3c0 [ 721.443646][ T4873] ksys_mount+0xcc/0x100 [ 721.447903][ T4873] __x64_sys_mount+0xbf/0xd0 [ 721.452501][ T4873] do_syscall_64+0xfe/0x140 [ 721.457022][ T4873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.462945][ T4873] RIP: 0033:0x45c27a [ 721.466845][ T4873] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 721.487060][ T4873] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 06:16:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xffffff8c) 06:16:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x1000000}}, 0x24, 0x0) [ 721.495568][ T4873] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 721.503549][ T4873] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 721.511527][ T4873] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 721.519497][ T4873] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 721.527469][ T4873] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2, 0x0, 0xffffffff00000000}, [], {0x2}}, 0x24, 0x0) [ 721.572186][ T4873] ERROR: Out of memory at tomoyo_realpath_from_path. 06:16:33 executing program 2 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 721.743917][ T4900] FAULT_INJECTION: forcing a failure. [ 721.743917][ T4900] name failslab, interval 1, probability 0, space 0, times 0 [ 721.756947][ T4900] CPU: 0 PID: 4900 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 721.764845][ T4900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.775830][ T4900] Call Trace: [ 721.775854][ T4900] dump_stack+0x1d8/0x2f8 [ 721.775870][ T4900] should_fail+0x555/0x770 [ 721.775884][ T4900] __should_failslab+0x11a/0x160 [ 721.775897][ T4900] ? vfs_parse_fs_string+0xed/0x1a0 [ 721.775908][ T4900] should_failslab+0x9/0x20 [ 721.775920][ T4900] __kmalloc_track_caller+0x79/0x340 [ 721.775935][ T4900] kmemdup_nul+0x2a/0xa0 [ 721.775945][ T4900] vfs_parse_fs_string+0xed/0x1a0 [ 721.775960][ T4900] do_mount+0x11a6/0x2490 [ 721.775979][ T4900] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 721.783593][ T4900] ? copy_mount_options+0x5f/0x3c0 [ 721.792969][ T4900] ? copy_mount_options+0x308/0x3c0 [ 721.792980][ T4900] ksys_mount+0xcc/0x100 [ 721.792990][ T4900] __x64_sys_mount+0xbf/0xd0 [ 721.793002][ T4900] do_syscall_64+0xfe/0x140 [ 721.793015][ T4900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.793023][ T4900] RIP: 0033:0x45c27a [ 721.793033][ T4900] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 721.793038][ T4900] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 721.793053][ T4900] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 721.802751][ T4900] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 721.905547][ T4900] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 721.913518][ T4900] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 721.921522][ T4900] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x38010000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x3}}, 0x24, 0x0) 06:16:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x2000000}}, 0x24, 0x0) 06:16:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xffffffeb) 06:16:34 executing program 2 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x4}}, 0x24, 0x0) 06:16:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xfffffff6) [ 722.253533][ T4913] FAULT_INJECTION: forcing a failure. [ 722.253533][ T4913] name failslab, interval 1, probability 0, space 0, times 0 [ 722.296007][ T4910] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 722.311797][ T4913] CPU: 0 PID: 4913 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 722.319694][ T4913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.319699][ T4913] Call Trace: [ 722.319718][ T4913] dump_stack+0x1d8/0x2f8 [ 722.319735][ T4913] should_fail+0x555/0x770 [ 722.319752][ T4913] __should_failslab+0x11a/0x160 [ 722.319765][ T4913] ? btrfs_mount+0x83/0x18f0 [ 722.319784][ T4913] should_failslab+0x9/0x20 [ 722.337470][ T4913] __kmalloc_track_caller+0x79/0x340 [ 722.337498][ T4913] ? tomoyo_mount_permission+0x8d8/0xa30 [ 722.351438][ T4913] kstrdup+0x34/0x70 [ 722.351451][ T4913] btrfs_mount+0x83/0x18f0 [ 722.351469][ T4913] ? legacy_parse_param+0x37b/0x880 [ 722.351482][ T4913] ? cap_capable+0x250/0x290 [ 722.351503][ T4913] legacy_get_tree+0xf9/0x1a0 [ 722.351512][ T4913] ? btrfs_resize_thread_pool+0x290/0x290 [ 722.351522][ T4913] vfs_get_tree+0x8f/0x380 [ 722.351537][ T4913] do_mount+0x169d/0x2490 [ 722.367212][ T4913] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 722.367228][ T4913] ? copy_mount_options+0x5f/0x3c0 [ 722.385300][ T4913] ? copy_mount_options+0x308/0x3c0 [ 722.385312][ T4913] ksys_mount+0xcc/0x100 [ 722.385329][ T4913] __x64_sys_mount+0xbf/0xd0 [ 722.410238][ T4913] do_syscall_64+0xfe/0x140 [ 722.410253][ T4913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.410261][ T4913] RIP: 0033:0x45c27a [ 722.410271][ T4913] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 722.410275][ T4913] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 722.410284][ T4913] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 722.410289][ T4913] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 722.410294][ T4913] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 06:16:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x3000000}}, 0x24, 0x0) 06:16:34 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0xfffffffe) [ 722.410300][ T4913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 722.410305][ T4913] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x8}}, 0x24, 0x0) 06:16:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x7000000}}, 0x24, 0x0) [ 722.617687][ T4931] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:35 executing program 2 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x1000000000000) 06:16:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}}, 0x24, 0x0) 06:16:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x40000000}}, 0x24, 0x0) 06:16:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x2}}, 0x24, 0x0) 06:16:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x8cffffff}}, 0x24, 0x0) [ 723.212612][ T4953] FAULT_INJECTION: forcing a failure. [ 723.212612][ T4953] name failslab, interval 1, probability 0, space 0, times 0 [ 723.247609][ T4950] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 723.278254][ T4953] CPU: 0 PID: 4953 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 723.286202][ T4953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.286207][ T4953] Call Trace: [ 723.286227][ T4953] dump_stack+0x1d8/0x2f8 [ 723.286245][ T4953] should_fail+0x555/0x770 [ 723.286262][ T4953] __should_failslab+0x11a/0x160 [ 723.308319][ T4953] ? vfs_parse_fs_string+0xed/0x1a0 [ 723.308332][ T4953] should_failslab+0x9/0x20 [ 723.308343][ T4953] __kmalloc_track_caller+0x79/0x340 [ 723.308357][ T4953] kmemdup_nul+0x2a/0xa0 [ 723.308371][ T4953] vfs_parse_fs_string+0xed/0x1a0 [ 723.337501][ T4953] do_mount+0x11a6/0x2490 [ 723.341833][ T4953] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 723.347381][ T4953] ? copy_mount_options+0x5f/0x3c0 [ 723.352499][ T4953] ? copy_mount_options+0x308/0x3c0 [ 723.357701][ T4953] ksys_mount+0xcc/0x100 [ 723.361980][ T4953] __x64_sys_mount+0xbf/0xd0 [ 723.366581][ T4953] do_syscall_64+0xfe/0x140 [ 723.371114][ T4953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.377009][ T4953] RIP: 0033:0x45c27a [ 723.380900][ T4953] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 723.400511][ T4953] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 723.408931][ T4953] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 723.416909][ T4953] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 06:16:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x3}}, 0x24, 0x0) [ 723.424884][ T4953] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 723.432852][ T4953] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 723.440812][ T4953] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0xf6ffffff}}, 0x24, 0x0) 06:16:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x7}}, 0x24, 0x0) 06:16:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 723.668109][ T4979] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 723.815939][ T4982] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) 06:16:35 executing program 2 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0xffffff8c}}, 0x24, 0x0) 06:16:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x300}}, 0x24, 0x0) 06:16:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x420f0000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:35 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x100000000000000) 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0xfffffff6}}, 0x24, 0x0) [ 724.097050][ T4995] FAULT_INJECTION: forcing a failure. [ 724.097050][ T4995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.110282][ T4995] CPU: 0 PID: 4995 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 724.110289][ T4995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.110293][ T4995] Call Trace: [ 724.110312][ T4995] dump_stack+0x1d8/0x2f8 [ 724.110328][ T4995] should_fail+0x555/0x770 [ 724.110345][ T4995] should_fail_alloc_page+0x55/0x60 06:16:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x700}}, 0x24, 0x0) [ 724.110363][ T4995] prepare_alloc_pages+0x283/0x470 [ 724.131674][ T4995] __alloc_pages_nodemask+0xb2/0x5d0 [ 724.131692][ T4995] kmem_getpages+0x56/0xa20 [ 724.131707][ T4995] ? trace_lock_release+0x135/0x1a0 [ 724.165672][ T4995] cache_grow_begin+0x7e/0x2c0 [ 724.165687][ T4995] cache_alloc_refill+0x311/0x3f0 [ 724.165698][ T4995] ? check_preemption_disabled+0xb7/0x2a0 [ 724.165714][ T4995] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 724.171828][ T4993] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 724.175500][ T4995] ? btrfs_mount_root+0x12c/0x1050 [ 724.175513][ T4995] btrfs_mount_root+0x12c/0x1050 [ 724.175530][ T4995] ? vfs_parse_fs_string+0x13b/0x1a0 [ 724.175546][ T4995] ? trace_kfree+0xa0/0x110 [ 724.199209][ T4995] legacy_get_tree+0xf9/0x1a0 [ 724.199222][ T4995] ? btrfs_control_open+0x40/0x40 [ 724.199233][ T4995] vfs_get_tree+0x8f/0x380 [ 724.199245][ T4995] vfs_kern_mount+0xc2/0x160 [ 724.199259][ T4995] btrfs_mount+0x34f/0x18f0 [ 724.209290][ T4995] ? legacy_parse_param+0x37b/0x880 06:16:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x4000}}, 0x24, 0x0) [ 724.209305][ T4995] ? cap_capable+0x250/0x290 [ 724.209319][ T4995] legacy_get_tree+0xf9/0x1a0 [ 724.228791][ T4995] ? btrfs_resize_thread_pool+0x290/0x290 [ 724.228804][ T4995] vfs_get_tree+0x8f/0x380 [ 724.228817][ T4995] do_mount+0x169d/0x2490 [ 724.228834][ T4995] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 724.252124][ T4995] ? copy_mount_options+0x5f/0x3c0 [ 724.252138][ T4995] ? copy_mount_options+0x308/0x3c0 [ 724.252150][ T4995] ksys_mount+0xcc/0x100 [ 724.252160][ T4995] __x64_sys_mount+0xbf/0xd0 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x100000000000000}}, 0x24, 0x0) [ 724.252172][ T4995] do_syscall_64+0xfe/0x140 [ 724.252186][ T4995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.252194][ T4995] RIP: 0033:0x45c27a [ 724.252208][ T4995] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 724.267010][ T4995] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 724.267021][ T4995] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a 06:16:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x1000000}}, 0x24, 0x0) 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x200000000000000}}, 0x24, 0x0) [ 724.267027][ T4995] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 724.267033][ T4995] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 724.267038][ T4995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 724.267044][ T4995] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000000"], 0x24, 0x0) [ 724.432783][ T5017] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:36 executing program 2 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x300000000000000}}, 0x24, 0x0) 06:16:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x2000000}}, 0x24, 0x0) 06:16:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) [ 724.635658][ T5032] FAULT_INJECTION: forcing a failure. [ 724.635658][ T5032] name failslab, interval 1, probability 0, space 0, times 0 [ 724.654398][ T5032] CPU: 1 PID: 5032 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 724.662351][ T5032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.672408][ T5032] Call Trace: [ 724.675737][ T5032] dump_stack+0x1d8/0x2f8 [ 724.680075][ T5032] should_fail+0x555/0x770 [ 724.684495][ T5032] __should_failslab+0x11a/0x160 [ 724.689610][ T5032] ? vfs_parse_fs_string+0xed/0x1a0 [ 724.694807][ T5032] should_failslab+0x9/0x20 [ 724.699308][ T5032] __kmalloc_track_caller+0x79/0x340 [ 724.704600][ T5032] kmemdup_nul+0x2a/0xa0 [ 724.708846][ T5032] vfs_parse_fs_string+0xed/0x1a0 [ 724.713872][ T5032] vfs_kern_mount+0x77/0x160 [ 724.718461][ T5032] btrfs_mount+0x34f/0x18f0 [ 724.722970][ T5032] ? legacy_parse_param+0x37b/0x880 [ 724.728175][ T5032] ? cap_capable+0x250/0x290 [ 724.732769][ T5032] legacy_get_tree+0xf9/0x1a0 [ 724.737619][ T5032] ? btrfs_resize_thread_pool+0x290/0x290 [ 724.743341][ T5032] vfs_get_tree+0x8f/0x380 [ 724.747765][ T5032] do_mount+0x169d/0x2490 [ 724.752095][ T5032] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 724.757643][ T5032] ? copy_mount_options+0x5f/0x3c0 [ 724.762887][ T5032] ? copy_mount_options+0x308/0x3c0 [ 724.768085][ T5032] ksys_mount+0xcc/0x100 [ 724.772354][ T5032] __x64_sys_mount+0xbf/0xd0 [ 724.777079][ T5032] do_syscall_64+0xfe/0x140 [ 724.781611][ T5032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.787605][ T5032] RIP: 0033:0x45c27a [ 724.791499][ T5032] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 724.811697][ T5032] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 724.820195][ T5032] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 724.828256][ T5032] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 724.836250][ T5032] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 724.844221][ T5032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 724.852193][ T5032] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:36 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x200000000000000) 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x700000000000000}}, 0x24, 0x0) 06:16:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x3000000}}, 0x24, 0x0) [ 724.874443][ T5036] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:36 executing program 2 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x4000000000000000}}, 0x24, 0x0) 06:16:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x7000000}}, 0x24, 0x0) 06:16:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x8cffffff00000000}}, 0x24, 0x0) [ 724.977505][ T5035] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 725.007299][ T5052] FAULT_INJECTION: forcing a failure. [ 725.007299][ T5052] name failslab, interval 1, probability 0, space 0, times 0 [ 725.051750][ T5052] CPU: 1 PID: 5052 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 725.059680][ T5052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.069777][ T5052] Call Trace: [ 725.073082][ T5052] dump_stack+0x1d8/0x2f8 [ 725.077426][ T5052] should_fail+0x555/0x770 [ 725.081858][ T5052] __should_failslab+0x11a/0x160 [ 725.086801][ T5052] ? vfs_parse_fs_string+0xed/0x1a0 [ 725.092006][ T5052] should_failslab+0x9/0x20 [ 725.096685][ T5052] __kmalloc_track_caller+0x79/0x340 [ 725.101995][ T5052] kmemdup_nul+0x2a/0xa0 [ 725.106243][ T5052] vfs_parse_fs_string+0xed/0x1a0 [ 725.111306][ T5052] vfs_kern_mount+0x77/0x160 [ 725.115900][ T5052] btrfs_mount+0x34f/0x18f0 [ 725.120410][ T5052] ? legacy_parse_param+0x37b/0x880 [ 725.125613][ T5052] ? cap_capable+0x250/0x290 [ 725.130470][ T5052] legacy_get_tree+0xf9/0x1a0 [ 725.135239][ T5052] ? btrfs_resize_thread_pool+0x290/0x290 [ 725.140959][ T5052] vfs_get_tree+0x8f/0x380 [ 725.145383][ T5052] do_mount+0x169d/0x2490 [ 725.149714][ T5052] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 725.155257][ T5052] ? copy_mount_options+0x5f/0x3c0 [ 725.160366][ T5052] ? copy_mount_options+0x308/0x3c0 [ 725.165562][ T5052] ksys_mount+0xcc/0x100 [ 725.169805][ T5052] __x64_sys_mount+0xbf/0xd0 [ 725.174425][ T5052] do_syscall_64+0xfe/0x140 [ 725.178969][ T5052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.184870][ T5052] RIP: 0033:0x45c27a [ 725.188758][ T5052] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 725.208372][ T5052] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.216787][ T5052] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 725.224762][ T5052] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 725.232740][ T5052] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 725.240719][ T5052] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 725.248692][ T5052] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x40000000}}, 0x24, 0x0) 06:16:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000200"], 0x24, 0x0) 06:16:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0xf6ffffff00000000}}, 0x24, 0x0) 06:16:37 executing program 2 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 725.435672][ T5063] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 725.453782][ T5073] FAULT_INJECTION: forcing a failure. [ 725.453782][ T5073] name failslab, interval 1, probability 0, space 0, times 0 [ 725.468506][ T5073] CPU: 1 PID: 5073 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 725.476410][ T5073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.486458][ T5073] Call Trace: [ 725.486481][ T5073] dump_stack+0x1d8/0x2f8 [ 725.486497][ T5073] should_fail+0x555/0x770 [ 725.486512][ T5073] __should_failslab+0x11a/0x160 [ 725.486527][ T5073] should_failslab+0x9/0x20 [ 725.486547][ T5073] kmem_cache_alloc_trace+0x5d/0x2f0 [ 725.494136][ T5073] ? btrfs_mount_root+0x12c/0x1050 [ 725.503446][ T5073] btrfs_mount_root+0x12c/0x1050 [ 725.503464][ T5073] ? vfs_parse_fs_string+0x13b/0x1a0 [ 725.503475][ T5073] ? trace_kfree+0xa0/0x110 [ 725.503490][ T5073] legacy_get_tree+0xf9/0x1a0 [ 725.513258][ T5073] ? btrfs_control_open+0x40/0x40 [ 725.513269][ T5073] vfs_get_tree+0x8f/0x380 [ 725.513281][ T5073] vfs_kern_mount+0xc2/0x160 [ 725.513296][ T5073] btrfs_mount+0x34f/0x18f0 [ 725.523403][ T5073] ? legacy_parse_param+0x37b/0x880 [ 725.523417][ T5073] ? cap_capable+0x250/0x290 [ 725.523431][ T5073] legacy_get_tree+0xf9/0x1a0 [ 725.533294][ T5073] ? btrfs_resize_thread_pool+0x290/0x290 [ 725.533306][ T5073] vfs_get_tree+0x8f/0x380 [ 725.533318][ T5073] do_mount+0x169d/0x2490 [ 725.533332][ T5073] ? copy_mount_options+0x25e/0x3c0 [ 725.543012][ T5073] ? copy_mount_options+0x308/0x3c0 [ 725.543023][ T5073] ksys_mount+0xcc/0x100 [ 725.543036][ T5073] __x64_sys_mount+0xbf/0xd0 [ 725.543049][ T5073] do_syscall_64+0xfe/0x140 [ 725.543066][ T5073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.561706][ T5073] RIP: 0033:0x45c27a [ 725.571042][ T5073] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 725.571047][ T5073] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.571055][ T5073] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 725.571060][ T5073] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 725.571065][ T5073] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 725.571070][ T5073] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 725.571081][ T5073] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x300000000000000) 06:16:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0xffffffff00000000}}, 0x24, 0x0) 06:16:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x8cffffff}}, 0x24, 0x0) 06:16:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000300"], 0x24, 0x0) 06:16:37 executing program 2 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x2}}, 0x24, 0x0) 06:16:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0xf6ffffff}}, 0x24, 0x0) [ 725.827020][ T5083] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 725.884731][ T5095] FAULT_INJECTION: forcing a failure. [ 725.884731][ T5095] name failslab, interval 1, probability 0, space 0, times 0 [ 725.897374][ T5095] CPU: 1 PID: 5095 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 725.905349][ T5095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.915576][ T5095] Call Trace: [ 725.915596][ T5095] dump_stack+0x1d8/0x2f8 [ 725.915612][ T5095] should_fail+0x555/0x770 [ 725.915627][ T5095] __should_failslab+0x11a/0x160 [ 725.915644][ T5095] ? xas_create+0x1197/0x1910 [ 725.927664][ T5095] should_failslab+0x9/0x20 [ 725.927677][ T5095] kmem_cache_alloc+0x56/0x2e0 [ 725.927694][ T5095] xas_create+0x1197/0x1910 [ 725.951007][ T5095] ? rcu_lock_release+0x4/0x20 [ 725.955775][ T5095] xas_store+0x95/0x1440 [ 725.960025][ T5095] ? xas_load+0x434/0x450 [ 725.964362][ T5095] __add_to_page_cache_locked+0x5f0/0xbf0 [ 725.970085][ T5095] ? workingset_activation+0x2b0/0x2b0 [ 725.975540][ T5095] add_to_page_cache_lru+0x156/0x4a0 [ 725.980829][ T5095] pagecache_get_page+0x355/0xa20 [ 725.985853][ T5095] __getblk_gfp+0x239/0x8b0 [ 725.990366][ T5095] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 725.995999][ T5095] __bread_gfp+0x2f/0x360 [ 726.000374][ T5095] btrfs_read_dev_super+0x8a/0x220 [ 726.005497][ T5095] btrfs_get_bdev_and_sb+0x1ec/0x280 [ 726.010785][ T5095] open_fs_devices+0x14d/0xb40 [ 726.015545][ T5095] ? list_sort+0x5fc/0x860 [ 726.019963][ T5095] ? blkdev_put+0x2c8/0x3b0 [ 726.024464][ T5095] ? btrfs_open_devices+0x1c0/0x1c0 [ 726.029664][ T5095] btrfs_open_devices+0x11d/0x1c0 [ 726.034688][ T5095] btrfs_mount_root+0x6ef/0x1050 [ 726.039635][ T5095] ? vfs_parse_fs_string+0x13b/0x1a0 [ 726.044919][ T5095] ? trace_kfree+0xa0/0x110 [ 726.049419][ T5095] legacy_get_tree+0xf9/0x1a0 [ 726.054089][ T5095] ? btrfs_control_open+0x40/0x40 [ 726.059115][ T5095] vfs_get_tree+0x8f/0x380 [ 726.063528][ T5095] vfs_kern_mount+0xc2/0x160 [ 726.068119][ T5095] btrfs_mount+0x34f/0x18f0 [ 726.072640][ T5095] ? legacy_parse_param+0x37b/0x880 [ 726.077858][ T5095] ? cap_capable+0x250/0x290 [ 726.082450][ T5095] legacy_get_tree+0xf9/0x1a0 [ 726.087124][ T5095] ? btrfs_resize_thread_pool+0x290/0x290 [ 726.092851][ T5095] vfs_get_tree+0x8f/0x380 [ 726.097302][ T5095] do_mount+0x169d/0x2490 [ 726.101897][ T5095] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 726.107445][ T5095] ? copy_mount_options+0x5f/0x3c0 [ 726.112559][ T5095] ? copy_mount_options+0x308/0x3c0 [ 726.117755][ T5095] ksys_mount+0xcc/0x100 [ 726.122086][ T5095] __x64_sys_mount+0xbf/0xd0 [ 726.126835][ T5095] do_syscall_64+0xfe/0x140 [ 726.131344][ T5095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.137319][ T5095] RIP: 0033:0x45c27a [ 726.141209][ T5095] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 726.160903][ T5095] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 726.169317][ T5095] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 726.177459][ T5095] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0xfeffffff}}, 0x24, 0x0) [ 726.185428][ T5095] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 726.193397][ T5095] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 726.201369][ T5095] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x57020000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x3}}, 0x24, 0x0) 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0xffffff8c}}, 0x24, 0x0) 06:16:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x7}}, 0x24, 0x0) [ 726.351580][ T5110] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 726.466867][ T5113] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x700000000000000) 06:16:38 executing program 2 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0xfffffff6}}, 0x24, 0x0) [ 726.674292][ T5121] FAULT_INJECTION: forcing a failure. [ 726.674292][ T5121] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 726.687535][ T5121] CPU: 0 PID: 5121 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 726.695428][ T5121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.705770][ T5121] Call Trace: [ 726.705790][ T5121] dump_stack+0x1d8/0x2f8 [ 726.705808][ T5121] should_fail+0x555/0x770 [ 726.705826][ T5121] should_fail_alloc_page+0x55/0x60 06:16:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000700"], 0x24, 0x0) 06:16:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x300}}, 0x24, 0x0) 06:16:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0xfffffffe}}, 0x24, 0x0) [ 726.713415][ T5121] prepare_alloc_pages+0x283/0x470 [ 726.713427][ T5121] __alloc_pages_nodemask+0xb2/0x5d0 [ 726.713443][ T5121] kmem_getpages+0x56/0xa20 [ 726.713453][ T5121] ? trace_lock_release+0x135/0x1a0 [ 726.713465][ T5121] cache_grow_begin+0x7e/0x2c0 [ 726.713477][ T5121] cache_alloc_refill+0x311/0x3f0 [ 726.713492][ T5121] ? check_preemption_disabled+0xb7/0x2a0 [ 726.713507][ T5121] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 726.764010][ T5121] ? btrfs_mount_root+0x12c/0x1050 [ 726.769126][ T5121] btrfs_mount_root+0x12c/0x1050 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x100000000000000}}, 0x24, 0x0) [ 726.774071][ T5121] ? vfs_parse_fs_string+0x13b/0x1a0 [ 726.779359][ T5121] ? trace_kfree+0xa0/0x110 [ 726.783887][ T5121] legacy_get_tree+0xf9/0x1a0 [ 726.783900][ T5121] ? btrfs_control_open+0x40/0x40 [ 726.783910][ T5121] vfs_get_tree+0x8f/0x380 [ 726.783925][ T5121] vfs_kern_mount+0xc2/0x160 [ 726.797992][ T5121] btrfs_mount+0x34f/0x18f0 [ 726.798012][ T5121] ? legacy_parse_param+0x37b/0x880 [ 726.798031][ T5121] ? cap_capable+0x250/0x290 [ 726.816963][ T5121] legacy_get_tree+0xf9/0x1a0 [ 726.821650][ T5121] ? btrfs_resize_thread_pool+0x290/0x290 [ 726.827373][ T5121] vfs_get_tree+0x8f/0x380 [ 726.831801][ T5121] do_mount+0x169d/0x2490 [ 726.836130][ T5121] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 726.841676][ T5121] ? copy_mount_options+0x5f/0x3c0 [ 726.846792][ T5121] ? copy_mount_options+0x308/0x3c0 [ 726.846805][ T5121] ksys_mount+0xcc/0x100 [ 726.846817][ T5121] __x64_sys_mount+0xbf/0xd0 [ 726.846830][ T5121] do_syscall_64+0xfe/0x140 [ 726.846847][ T5121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.860855][ T5121] RIP: 0033:0x45c27a [ 726.860865][ T5121] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 726.860871][ T5121] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 726.860880][ T5121] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 726.860886][ T5121] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x200000000000000}}, 0x24, 0x0) 06:16:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x700}}, 0x24, 0x0) [ 726.860891][ T5121] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 726.860896][ T5121] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 726.860902][ T5121] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 06:16:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x4000000000000000) 06:16:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x300000000000000}}, 0x24, 0x0) [ 726.977885][ T5130] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 06:16:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x4000}}, 0x24, 0x0) 06:16:39 executing program 2 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 06:16:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x700000000000000}}, 0x24, 0x0) [ 727.145709][ T5151] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 727.192476][ T5159] FAULT_INJECTION: forcing a failure. [ 727.192476][ T5159] name failslab, interval 1, probability 0, space 0, times 0 [ 727.215457][ T5159] CPU: 1 PID: 5159 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 727.223453][ T5159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.233502][ T5159] Call Trace: [ 727.236798][ T5159] dump_stack+0x1d8/0x2f8 [ 727.241146][ T5159] should_fail+0x555/0x770 [ 727.245568][ T5159] __should_failslab+0x11a/0x160 [ 727.250508][ T5159] should_failslab+0x9/0x20 [ 727.255012][ T5159] kmem_cache_alloc_trace+0x5d/0x2f0 [ 727.260294][ T5159] ? btrfs_alloc_device+0x78/0x5a0 [ 727.265403][ T5159] btrfs_alloc_device+0x78/0x5a0 [ 727.270338][ T5159] ? blkdev_put+0x2c8/0x3b0 [ 727.274839][ T5159] close_fs_devices+0x4ae/0x910 [ 727.279694][ T5159] btrfs_close_devices+0x33/0x130 [ 727.284720][ T5159] btrfs_mount_root+0xa9d/0x1050 [ 727.289663][ T5159] ? vfs_parse_fs_string+0x13b/0x1a0 [ 727.294945][ T5159] ? trace_kfree+0xa0/0x110 [ 727.299447][ T5159] legacy_get_tree+0xf9/0x1a0 [ 727.304137][ T5159] ? btrfs_control_open+0x40/0x40 [ 727.309163][ T5159] vfs_get_tree+0x8f/0x380 [ 727.313586][ T5159] vfs_kern_mount+0xc2/0x160 [ 727.318173][ T5159] btrfs_mount+0x34f/0x18f0 [ 727.322681][ T5159] ? legacy_parse_param+0x37b/0x880 [ 727.327882][ T5159] ? cap_capable+0x250/0x290 [ 727.332489][ T5159] legacy_get_tree+0xf9/0x1a0 [ 727.337166][ T5159] ? btrfs_resize_thread_pool+0x290/0x290 [ 727.342882][ T5159] vfs_get_tree+0x8f/0x380 [ 727.347302][ T5159] do_mount+0x169d/0x2490 [ 727.351633][ T5159] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 727.357257][ T5159] ? copy_mount_options+0x5f/0x3c0 [ 727.362369][ T5159] ? copy_mount_options+0x308/0x3c0 [ 727.367562][ T5159] ksys_mount+0xcc/0x100 [ 727.371804][ T5159] __x64_sys_mount+0xbf/0xd0 [ 727.376393][ T5159] do_syscall_64+0xfe/0x140 [ 727.380897][ T5159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.386783][ T5159] RIP: 0033:0x45c27a [ 727.390674][ T5159] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 727.410285][ T5159] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 727.418694][ T5159] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 727.426667][ T5159] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 727.434636][ T5159] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 [ 727.442601][ T5159] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 727.450567][ T5159] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 727.467321][ T5159] ------------[ cut here ]------------ [ 727.472797][ T5159] kernel BUG at fs/btrfs/volumes.c:1275! [ 727.479109][ T5159] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 727.485187][ T5159] CPU: 1 PID: 5159 Comm: syz-executor.2 Not tainted 5.3.0-rc4+ #74 [ 727.493063][ T5159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.503124][ T5159] RIP: 0010:close_fs_devices+0x8ff/0x910 [ 727.508760][ T5159] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 ab 29 fb fe e9 56 ff ff ff e8 e1 2f c2 fe <0f> 0b e8 da 2f c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 727.528482][ T5159] RSP: 0018:ffff888057347990 EFLAGS: 00010246 [ 727.534550][ T5159] RAX: ffffffff82b1549f RBX: ffff8880a903ae68 RCX: 0000000000040000 [ 727.542525][ T5159] RDX: ffffc9000a36f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 727.550931][ T5159] RBP: ffff888057347a20 R08: ffffffff82b22918 R09: fffffbfff11204f6 [ 727.558904][ T5159] R10: fffffbfff11204f6 R11: 0000000000000000 R12: dffffc0000000000 [ 727.566876][ T5159] R13: ffff8880a903ae70 R14: ffff8880a903ad80 R15: ffff8880902e27c0 [ 727.574848][ T5159] FS: 00007f5a9ab3e700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 727.583776][ T5159] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 727.590358][ T5159] CR2: 000000000070f158 CR3: 00000000984c1000 CR4: 00000000001406e0 [ 727.598336][ T5159] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 727.606307][ T5159] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 727.614272][ T5159] Call Trace: [ 727.617579][ T5159] btrfs_close_devices+0x33/0x130 [ 727.622606][ T5159] btrfs_mount_root+0xa9d/0x1050 [ 727.627557][ T5159] ? vfs_parse_fs_string+0x13b/0x1a0 [ 727.632851][ T5159] ? trace_kfree+0xa0/0x110 [ 727.638078][ T5159] legacy_get_tree+0xf9/0x1a0 [ 727.642754][ T5159] ? btrfs_control_open+0x40/0x40 [ 727.647782][ T5159] vfs_get_tree+0x8f/0x380 [ 727.652203][ T5159] vfs_kern_mount+0xc2/0x160 [ 727.656792][ T5159] btrfs_mount+0x34f/0x18f0 [ 727.661392][ T5159] ? legacy_parse_param+0x37b/0x880 [ 727.666597][ T5159] ? cap_capable+0x250/0x290 [ 727.671192][ T5159] legacy_get_tree+0xf9/0x1a0 [ 727.675866][ T5159] ? btrfs_resize_thread_pool+0x290/0x290 [ 727.681585][ T5159] vfs_get_tree+0x8f/0x380 [ 727.686006][ T5159] do_mount+0x169d/0x2490 [ 727.690335][ T5159] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 727.695878][ T5159] ? copy_mount_options+0x5f/0x3c0 [ 727.700992][ T5159] ? copy_mount_options+0x308/0x3c0 [ 727.706185][ T5159] ksys_mount+0xcc/0x100 [ 727.710428][ T5159] __x64_sys_mount+0xbf/0xd0 [ 727.715023][ T5159] do_syscall_64+0xfe/0x140 [ 727.719524][ T5159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.725413][ T5159] RIP: 0033:0x45c27a [ 727.729301][ T5159] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 727.756286][ T5159] RSP: 002b:00007f5a9ab3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 727.764696][ T5159] RAX: ffffffffffffffda RBX: 00007f5a9ab3db40 RCX: 000000000045c27a [ 727.774153][ T5159] RDX: 00007f5a9ab3dae0 RSI: 0000000020000100 RDI: 00007f5a9ab3db00 [ 727.782126][ T5159] RBP: 0000000000000001 R08: 00007f5a9ab3db40 R09: 00007f5a9ab3dae0 06:16:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000003"], 0x24, 0x0) 06:16:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x1000000}}, 0x24, 0x0) [ 727.790095][ T5159] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 727.803192][ T5159] R13: 00000000004c8920 R14: 00000000004df7d8 R15: 0000000000000003 [ 727.811167][ T5159] Modules linked in: [ 727.819944][ T5159] ---[ end trace 9cca09acc4a5c549 ]--- [ 727.825492][ T5159] RIP: 0010:close_fs_devices+0x8ff/0x910 06:16:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, &(0x7f00000023c0)={[{@jdev={'jdev', 0x3d, './file0'}}, {@jdev={'jdev', 0x3d, './file0'}}]}) 06:16:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x4000000000000000}}, 0x24, 0x0) [ 727.838866][ T5159] Code: 8b 5d c0 e9 4f ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 63 ff ff ff 48 89 df e8 ab 29 fb fe e9 56 ff ff ff e8 e1 2f c2 fe <0f> 0b e8 da 2f c2 fe 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 41 [ 727.860798][ T9671] kobject: '0:48' (0000000029f3738c): kobject_uevent_env [ 727.875768][ T9671] kobject: '0:48' (0000000029f3738c): fill_kobj_path: path = '/devices/virtual/bdi/0:48' [ 727.880102][ T5159] RSP: 0018:ffff888057347990 EFLAGS: 00010246 06:16:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0x8cffffff00000000}}, 0x24, 0x0) 06:16:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x2000000}}, 0x24, 0x0) [ 727.892056][ T9671] kobject: '0:48' (0000000029f3738c): kobject_cleanup, parent 00000000f602fb8c [ 727.902315][ T5168] kobject: '0:47' (000000008eb5b796): kobject_add_internal: parent: 'bdi', set: 'devices' [ 727.912622][ T9680] kobject: 'loop5' (0000000049a38780): kobject_uevent_env [ 727.920806][ T9671] kobject: '0:48' (0000000029f3738c): calling ktype release [ 727.928121][ T9671] kobject: '0:48': free name [ 727.933017][ T5168] kobject: '0:47' (000000008eb5b796): kobject_uevent_env [ 727.934455][ T9680] kobject: 'loop5' (0000000049a38780): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 727.949781][ T5168] kobject: '0:47' (000000008eb5b796): fill_kobj_path: path = '/devices/virtual/bdi/0:47' [ 727.960541][ T5159] RAX: ffffffff82b1549f RBX: ffff8880a903ae68 RCX: 0000000000040000 [ 727.968525][ T5159] RDX: ffffc9000a36f000 RSI: 000000000003ffff RDI: 0000000000040000 [ 727.984839][ T3907] kobject: 'loop0' (00000000b0d43712): kobject_uevent_env 06:16:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900), 0x24, 0x8cffffff00000000) 06:16:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {}, [], {0x4, 0x0, 0x3000000}}, 0x24, 0x0) [ 728.002531][ T3907] kobject: 'loop0' (00000000b0d43712): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 728.017925][ T5178] kobject: '0:48' (000000009820b178): kobject_add_internal: parent: 'bdi', set: 'devices' [ 728.033831][ T3907] kobject: 'loop3' (00000000301ecd14): kobject_uevent_env [ 728.035399][ T5178] kobject: '0:48' (000000009820b178): kobject_uevent_env 06:16:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000900)={{}, {}, [], {0x2}, [], {0x2, 0xf6ffffff00000000}}, 0x24, 0x0) [ 728.047291][ T5177] kobject: 'loop5' (0000000049a38780): kobject_uevent_env [ 728.048449][ T5159] RBP: ffff888057347a20 R08: ffffffff82b22918 R09: fffffbfff11204f6 [ 728.062777][ T3907] kobject: 'loop3' (00000000301ecd14): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 728.064105][ T5178] kobject: '0:48' (000000009820b178): fill_kobj_path: path = '/devices/virtual/bdi/0:48' [ 728.076202][ T5177] kobject: 'loop5' (0000000049a38780): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 728.083613][ T9678] kobject: '0:47' (000000008eb5b796): kobject_uevent_env [ 728.097151][ T3907] kobject: 'loop1' (00000000ff36b9d0): kobject_uevent_env [ 728.101048][ T5159] R10: fffffbfff11204f6 R11: 0000000000000000 R12: dffffc0000000000 [ 728.109126][ T3907] kobject: 'loop1' (00000000ff36b9d0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 728.116671][ T9678] kobject: '0:47' (000000008eb5b796): fill_kobj_path: path = '/devices/virtual/bdi/0:47' 06:16:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000240)=""/111, 0x6f}], 0x1) pread64(r0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="020000000100000002000000040000000000000010000000000000002000000000000007"], 0x24, 0x0) [ 728.149963][ T5177] REISERFS warning (device loop5): super-6510 reiserfs_parse_options: journal device was already specified to be ./file0 [ 728.160628][ T5159] R13: ffff8880a903ae70 R14: ffff8880a903ad80 R15: ffff8880902e27c0 [ 728.166674][ T3907] kobject: 'loop5' (0000000049a38780): kobject_uevent_env [ 728.177461][ T9678] kobject: '0:47' (000000008eb5b796): kobject_cleanup, parent 00000000f602fb8c [ 728.178285][ T3907] kobject: 'loop5' (0000000049a38780): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 728.193506][ T9678] kobject: '0:47' (000000008eb5b796): calling ktype release [ 728.208590][ T3907] kobject: 'loop2' (00000000c6850ba9): kobject_uevent_env [ 728.210012][ T5159] FS: 00007f5a9ab3e700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 728.217982][ T3907] kobject: 'loop2' (00000000c6850ba9): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 728.227293][ T9678] kobject: '0:47': free name [ 728.239332][ T3907] kobject: 'loop1' (00000000ff36b9d0): kobject_uevent_env [ 728.240393][ T9671] kobject: '0:48' (000000009820b178): kobject_uevent_env [ 728.247224][ T3907] kobject: 'loop1' (00000000ff36b9d0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 728.262464][ T5159] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 728.269656][ T9671] kobject: '0:48' (000000009820b178): fill_kobj_path: path = '/devices/virtual/bdi/0:48' [ 728.271719][ T5159] CR2: 00007ffc6b3da080 CR3: 00000000984c1000 CR4: 00000000001406f0 [ 728.283728][ T3907] kobject: 'loop0' (00000000b0d43712): kobject_uevent_env [ 728.289008][ T9678] kobject: '0:46' (0000000051037ab6): kobject_uevent_env [ 728.296049][ T9671] kobject: '0:48' (000000009820b178): kobject_cleanup, parent 00000000f602fb8c [ 728.303005][ T5159] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 728.312200][ T5177] kobject: 'loop5' (0000000049a38780): kobject_uevent_env [ 728.323893][ T3907] kobject: 'loop0' (00000000b0d43712): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 728.327526][ T9671] kobject: '0:48' (000000009820b178): calling ktype release [ 728.338102][ T9678] kobject: '0:46' (0000000051037ab6): fill_kobj_path: path = '/devices/virtual/bdi/0:46' [ 728.345086][ T5159] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 728.356275][ T3907] kobject: 'loop1' (00000000ff36b9d0): kobject_uevent_env [ 728.365700][ T5177] kobject: 'loop5' (0000000049a38780): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 728.370704][ T9678] kobject: '0:46' (0000000051037ab6): kobject_cleanup, parent 00000000f602fb8c [ 728.382998][ T5159] Kernel panic - not syncing: Fatal exception [ 728.389965][ T9671] kobject: '0:48': free name [ 728.401188][ T5159] Kernel Offset: disabled [ 728.405511][ T5159] Rebooting in 86400 seconds..