00f283baafc7a8e0e4c5e2b8530a38f019bc6cbf20c4e0b98cfddd2594403e86ab5617e610c82a69f41c209b243185f513b42f83333e209618acebb238c26cfdaee3a61eea6fd205c3bd618a73e60b9893df46d14008a4443026710a9327ce7ff2f7187f550477fd959978af452d7db46f8e0a1d10ebe2682b0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r3, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x23c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x20b, 0x1, '\x02\x80\fl\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\vCR\xf6ibs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1\x19\xea \bb9\x17\x9df\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf80x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r3, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x23c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x20b, 0x1, '\x02\x80\fl\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\vCR\xf6ibs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1\x19\xea \bb9\x17\x9df\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf80x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r3, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x248, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x20b, 0x1, '\x02\x80\fl\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\vCR\xf6ibs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1\x19\xea \bb9\x17\x9df\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf8:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7\xb1\xac\xf9\xcf\x9e\xc0\xa5\xc8\xff\xd2\x81zV\xbf\xfd\a\xd2\xf7+e\xb7\x8a[,\xd7{\aT\x1c^\xf6\xb2\xefo\xf2@\x8c\xc7\a\xd2\n\v\x1fC\x1f\x9e\xd4\xe2\xba\xa2\xbb\xaa\"\xb2\xa8_Z\x14\x91\x0f\x06\x88\\\x92\x84t\v\xc6\x9eS\x84\x9c\x1b/e\xda!0%\x84\x16\xea-\x14B>\xe8\xb4\xd9\x1b\f\x16\xd0\x85\xf8\x8b\xf5\\\xfe\xfe\xa0\xe8\xdf\xe3I\x01\xea\x05\xc9\x8d\xe2\xfe\x87\xae\x83\xad\xbb\x04\x9a\xa1H\x1b>!\xb7\x00$\xb8\'\a\r\x94cv}%\x00\xec2\t\xd4\xba=\xb2\x99\xf4\xf0\x1dn\xf2C\x10\xf0\xbd\x13\x03\xdf`\xa6L1\x03\xf3\x9d\xdd|\xcf\x9c\xa3\xf9e\xccN\x9fR_G\xca\xa6t\xd9E\x0eeO\t\xda\xbd\xdc\xc3GB\xa44T\x84\xae\x80u\",a\xd1\xe4yK\x8f\xe0tH\xdbiLgO\xdc\x89nze\xb6d\x97\x84E\xbd\xa9oWT:\xa1\xfb\x13\xa5\\\xf0\xd2\xfa>\xa9\xd5\xaf80x0}) setuid(r0) mount$9p_virtio(&(0x7f00000013c0), &(0x7f0000001400)='./file0\x00', &(0x7f00000014c0), 0x0, 0x0) 08:13:21 executing program 3: open$dir(&(0x7f0000000700)='./file0\x00', 0x1a1a42, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0, &(0x7f0000000040)) 08:13:21 executing program 5: open$dir(&(0x7f0000000700)='./file0\x00', 0xa81c0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x2) 08:13:21 executing program 2: open$dir(&(0x7f00000000c0)='./file0\x00', 0x80ad40, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x28001, 0x8) [ 1393.439649][ T26] audit: type=1804 audit(1634372001.635:187): pid=9990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir225033029/syzkaller.BnMSDq/2840/file0" dev="sda1" ino=14526 res=1 errno=0 08:13:22 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r2, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:22 executing program 2: open$dir(&(0x7f00000000c0)='./file0\x00', 0x80ad40, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) 08:13:22 executing program 5: open$dir(&(0x7f0000000040)='./file0\x00', 0xaa141, 0x0) chown(&(0x7f00000000c0)='./file0\x00', 0xee00, 0xee00) 08:13:22 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0xaa140, 0x0) setxattr(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 08:13:22 executing program 3: open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10080, 0x0) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:22 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0xaa140, 0x0) getgroups(0x1, &(0x7f0000000080)=[0x0]) chown(&(0x7f0000000040)='./file0\x00', 0x0, r0) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:22 executing program 0: open$dir(&(0x7f0000000700)='./file0\x00', 0x80040, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, 0x0, 0x1) 08:13:22 executing program 5: open$dir(&(0x7f00000000c0)='./file0\x00', 0x80ad40, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4000, 0x10, &(0x7f0000000200)) 08:13:22 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}}}, 0x108) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000480)=[{&(0x7f00000004c0)=""/252, 0xfc}], 0x1, 0xb2, 0x0) 08:13:22 executing program 2: open$dir(&(0x7f0000000700)='./file0\x00', 0x80040, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'user.', '\x00'}, 0x0, 0x0, 0x1) 08:13:22 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 08:13:22 executing program 2: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockname(r0, 0x0, &(0x7f0000000100)=0xfffffffffffffd18) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:22 executing program 3: open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) 08:13:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000880)) 08:13:22 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0xaa140, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 08:13:22 executing program 2: open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x1) 08:13:22 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:22 executing program 0: r0 = open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), 0x0, 0x0, 0x2) 08:13:22 executing program 5: open$dir(&(0x7f00000000c0)='./file0\x00', 0x80ad40, 0x0) stat(&(0x7f0000002500)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r0) socket$inet(0x2, 0x3, 0x0) 08:13:22 executing program 3: open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000001d40)='./file0\x00', 0x210302, 0x1) 08:13:22 executing program 2: open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) 08:13:23 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:23 executing program 2: open$dir(&(0x7f0000000700)='./file0\x00', 0xa0040, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x101000, 0x0) 08:13:23 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000043c0)={0x18, 0x4, &(0x7f0000003280)=@framed={{}, [@func={0x85, 0x0, 0x3}]}, &(0x7f0000003300)='GPL\x00', 0x7, 0x1000, &(0x7f0000003340)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:13:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={0x0, @hci, @in={0x2, 0x0, @local}, @l2, 0x0, 0x0, 0x0, 0xfc000000}) 08:13:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xd, 0x0, &(0x7f0000000040)) 08:13:23 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000002800)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 08:13:23 executing program 5: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x80, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 08:13:23 executing program 3: faccessat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) 08:13:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x818, 0x5e0, 0x280, 0x0, 0x5e0, 0x5e0, 0x798, 0x798, 0x798, 0x798, 0x798, 0x6, &(0x7f0000000080), {[{{@uncond, 0x0, 0x238, 0x5e0, 0x0, {}, [@common=@dst={{0x48}}, @common=@inet=@sctp={{0x148}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@loopback, @ipv4=@multicast2}}}, {{@ipv6={@private1, @mcast1, [], [], 'batadv_slave_0\x00', 'syz_tun\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}}, @common=@icmp6={{0x28}, {0x0, "9264"}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0, @private2, [], [], 'macvtap0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, [@inet, @common=@icmp6={{}, {0x0, "eb13"}}]}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x170, 0x1b8, 0x0, {}, [@common=@unspec=@conntrack3={{0xc8}, {{@ipv4=@broadcast, [], @ipv6=@dev, [], @ipv4=@empty, [], @ipv6=@private1}}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x89b) 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) [ 1395.708279][T30848] usb 3-1: new high-speed USB device number 38 using dummy_hcd 08:13:23 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 08:13:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000080)="a2", 0x1}, {0x0}, {&(0x7f0000000180)='G', 0x1}], 0x3, &(0x7f0000001280)=[@ip_tos_u8={{0x11}}, @ip_retopts={{0x10}}], 0x28}, 0x0) 08:13:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2c, 0x0, &(0x7f0000000040)) 08:13:23 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) [ 1395.803519][T31825] usb 6-1: new high-speed USB device number 39 using dummy_hcd 08:13:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000300)=@newtaction={0x44, 0x30, 0x1, 0x0, 0x0, {}, [{0x30, 0x1, [@m_bpf={0x2c, 0x1, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) 08:13:24 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x47, 0x0, &(0x7f0000000040)) [ 1395.913573][T30848] usb 3-1: device descriptor read/64, error 18 [ 1396.003637][T31825] usb 6-1: device descriptor read/64, error 18 [ 1396.193499][T30848] usb 3-1: new high-speed USB device number 39 using dummy_hcd [ 1396.273454][T31825] usb 6-1: new high-speed USB device number 40 using dummy_hcd [ 1396.413425][T30848] usb 3-1: device descriptor read/64, error 18 [ 1396.463381][T31825] usb 6-1: device descriptor read/64, error 18 [ 1396.533485][T30848] usb usb3-port1: attempt power cycle [ 1396.583640][T31825] usb usb6-port1: attempt power cycle [ 1396.953369][T30848] usb 3-1: new high-speed USB device number 40 using dummy_hcd [ 1396.993478][T31825] usb 6-1: new high-speed USB device number 41 using dummy_hcd [ 1397.044021][T30848] usb 3-1: Invalid ep0 maxpacket: 0 [ 1397.083836][T31825] usb 6-1: Invalid ep0 maxpacket: 0 [ 1397.203425][T30848] usb 3-1: new high-speed USB device number 41 using dummy_hcd [ 1397.233433][T31825] usb 6-1: new high-speed USB device number 42 using dummy_hcd [ 1397.305938][T30848] usb 3-1: Invalid ep0 maxpacket: 0 [ 1397.311348][T30848] usb usb3-port1: unable to enumerate USB device [ 1397.323600][T31825] usb 6-1: Invalid ep0 maxpacket: 0 [ 1397.329547][T31825] usb usb6-port1: unable to enumerate USB device 08:13:26 executing program 2: pipe(&(0x7f0000001d00)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, 0x0, 0x0) 08:13:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, 0x0, 0x0) 08:13:26 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000009940)) 08:13:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4b, 0x5}]}}, &(0x7f0000000240)=""/191, 0x2a, 0xbf, 0x1}, 0x20) 08:13:26 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x10, 0x0, &(0x7f0000000040)) 08:13:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:13:26 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:26 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x80047437, 0x0) 08:13:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106(gcm(aes))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dbf691b4", 0x4) 08:13:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000280)={[], [{@euid_eq}]}) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:27 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x48080) 08:13:27 executing program 0: syz_mount_image$sysv(&(0x7f0000000580), &(0x7f00000005c0)='.\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000700)) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:27 executing program 2: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:27 executing program 3: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0}, 0x38) 08:13:27 executing program 2: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000005) 08:13:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)={0x0}}, 0x0) 08:13:27 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x9, 0xf2, 0x6, 0x7ff, 0x100, r0, 0x400, '\x00', 0x0, r1}, 0x40) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x0, 0x3, 0x1, 0x0) 08:13:27 executing program 5: r0 = socket(0x1, 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r0) 08:13:27 executing program 2: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:27 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="b95b03b77e030000009e40f086dd1fff060000003a00ffe077fbac141412e0000001c699da153f08a0e6e380f60108f683317585d747fd1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)=@tcp6}, 0x20) 08:13:27 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp1251'}}, {@utf8}]}) 08:13:27 executing program 5: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') 08:13:27 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x20000005) 08:13:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:13:28 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:28 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xed) recvmsg(r0, &(0x7f0000002380)={0x0, 0x0, 0x0}, 0x0) 08:13:28 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)={[{@mode}, {@size={'size', 0x3d, [0x67]}}]}) 08:13:28 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f000000a7c0)={0x2, &(0x7f000000a780)=[{0x5, 0x0, 0x0, 0x8}, {0x8, 0x0, 0x68, 0x8}]}) 08:13:28 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x20000005) 08:13:28 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:28 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="b702000043000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000080404000001007d40b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000008b28672ad3094c03000000bd007043d7332be142f7abeef17ffd831d659db5f16a2d56206374b9a087b299e6981cf9174900000000000000fd31adf70600000044715b77b0a8d05fb70600aededd0cd98308b29d00b5aae0c702cfa6f9f709000000450000000085e7fc0000000099f3e06b63a065f321aa40252b423d8d9cb56cea38bae66377bb37fc9b9704d6e658f870e4509994af464fc97f944527c2234cc45d6ffda9e64050561d81273d06003140a17cfa35ce4b3fcb9133f4b5d8a4621f0e81960cfb3c7c2861878f17f42fdba31c67eaa8a345dac00f7c01ee2c13c753ac128569929883105fe3ee44d504090000000000080000000000000074979e9b06000000000000000e39a5147627ff2da265f994aa96ed0f0200000000000016a57d7ea36c06044e8a8ed793e7b9dce510a67f203ceb590a6f2d2b43535e89b4b8c63a9ffa1b44706dc29e658ea9f9f5b55270ddc8e3943beebbba5f49aa69c441c21d4e72ee01fd6fa5122c21ac9f2f52fd3377607ceb7ab167cca8812dd5da2b2d7b8fa9e8a4461bb9bb2b8dbbfd012aca04415e0fcc840b6acc8b8154bad85584af7d04e89844b1e1779a04388573406524c759058b67387d50700188af3984ec3aa17cf58d3e105b57afbcce04000000d7f605f88c720bdbfd71488a641b830b9ef4b5096d72cb9be71d23b54e0a0a0a526eba88014ff9dbcdc0b3ca2d62b7286ae9664a174cc7572298363665bcdd1b406b732cacbdde919577a427e36cabb1a1145401033a1bab8625ebf705ae3724b0a3b538a277882477bfc4969b95a77803097a7d1c9c2dada6bfe014fbe6bb7a47d01ba2f4cd88e378a5bf24ead8000000000000000000000000efda6ecc1f31bfb8057a5e69cfa16db300b932ed06e6fcd6600033cae46ed87e76910733c591b85045982c37317dda43f0614b87200f5f4828d6ae514715e332f0d8d408491d94815e01d132f1a5f194c32ecb968ffcb4958820a402dfc7abd1399e7123bd64bdb189f9d69d0c54754b839e6ec70f6411784dc25a2eaa0400000100000040d2d5b0b200675750d224fe6592672697694b4c02219884cb6556ed78f6a80100fcf2f109157971edf63ad7abb77915f11f010000009183faf87b00d658b7517608cf2d950700000000000000f113ad03ac500e0dad000000009fca31cbe3e50800000024e07d7fd0a12571fb15fc9d54c2760e61a300caf090910efbea134e4af4ee4f9839b90100000000000000aa5f4e86fe4c19ed4916a0bd39ebdc883300000000000000001425eb60b30158f9b1620a7086b61b6f8c1800822a20fb510ed5965adf5e879fd4ef611d09d482f1c5680469aed3903856539852b6a1b5e82684fef7e6a28fc03b1e4b9484fadb9cecbfe1dbeb5fa4d649ec20c4b85ffbfd3bee4d1532c01ef636f991e40953b5f8f4d2caeeb26135ec42e473e7a2fabc3417d5ad3fb36f4379ba81bd283d21e8600d00000000000000004f7c9b10f97e2a3db7287834f545445a684b4ecdcaee2d2d2755e134620430d71cb5a9250462c79899c377d254763f2638133310f3de5ee598dff59c069952d0d20481f476713a90507549f8cd181825d46b12ab128f34790ade456b545dcdf12590fd78342c3eee561712c7588c73b5a167617af78efbc012aa32dee9eb887fec20cf8aa378bcda53bde20f97a6c2ac7c3bfc1dfa9632423ff75b90b66f61ab7a5a71aa00cf79dc4b0a98f201e00bc6d34fa96f89629778d87ecfef71fc1fbd46797de72b0b9eb65b2e8a21a5cb04a6c9b9e72c91b781d33e38db7592abd472dc91d44110066045279022a21ceb6f733e8295d2e1650a665bfe4d94cd92dc10712f3f8d75f04c4f62c0e715ab5e09bc7a4cc5b903402a9e7769150fe3af178ecc17a750f522cc2c12c8cf4b2c7ce6e4296152a5f1148c6242cade1dc400cf94e0adb8722417992dfb2a6aea367cdefa64306a356adec403d8298aa6b8e9a0221047ee70955ab06b5ab8ce10dfdbd201f4292ab98c20c3e45dcc6629d85f316e45424e56eee4d8fb74d72573dafd46d8d5b389ad25519233e25c80f6508ed61a74533c3bff0723bed735bcaa134f7f0a1b7f6d62a802b754265fdcb224dc9d3f10b5a027fff65b8640cd16cb9967d1a95d7758edb79d5a327f86b03b19b56361d8b4e6ba030107fab1dd4afb38663a27c3f3429018288b8eb7810ae6744520775164e69446db8d0c54bf56b090c2f398b5e2f26c84502042e10471672227389e052677d421d3c1b17bf73dfe9ff7f1b8bea0cd751a0801cb8a5bad89293b4dcadb5e94e5277c1eec87a2ff0a143a201c8eaaecea643981b81d050740ad9fd068a2d7b5b2508bd130c0f25499000000000000000000000000000000000000000000000000000000000000bbbf8c78d8642aba5af5e549ecb93c51a5770ecaba6078fc61b89fc32c40d6fe952ab6d077130ceccd10666f2a66eb03fc19c7194653034e03f23329e4e5618bb16cd50d2d1a0e0bd86f4960bac8208b940c39b5000000000000000000000000915ac23dbc0db709b0d9d9c890305f02ea95c685d21303d4bfa5d0f9f0d8487bbb5567191873da029519c966b555ac9cb5182e5a70f330fb9e943341930f46759028acefd21826b09f83e850afb566c0067ad202908ddf3ed817643ef3fbfdfa298b9a63b868412682a38bd614af9cfdc141223c4e521a4847038ba564b4cad830a00c170fbfb3d4a00f283baafc7a8e0e4c5e2b8530a38f019bc6cbf20c4e0b98cfddd2594403e86ab5617e610c82a69f41c209b243185f513b42f83333e209618acebb238c26cfdaee3a61eea6fd205c3bd618a73e60b9893df46d14008a4443026710a9327ce7ff2f7187f550477fd959978af452d7db46f8e0a1d10ebe2682b0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) 08:13:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 08:13:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="dbf691b4908f6d4ea0b23f25a740db2c", 0x10) 08:13:28 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:28 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x20000005) 08:13:28 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:28 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000005) 08:13:29 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000073c0)='/sys/module/e1000e', 0x0, 0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 08:13:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000005040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000000)={{0x8}}) 08:13:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000001900), 0x4) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000005) 08:13:29 executing program 2: socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x8910, &(0x7f0000000180)={@ipv4={'\x00', '\xff\xff', @remote}, @loopback={0x100000000000000}, @dev}) 08:13:29 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) 08:13:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, 0x0) 08:13:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, 0x0) 08:13:29 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r0, 0x40044160, 0x0) 08:13:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x4) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000005) 08:13:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8910, 0x0) 08:13:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x0, @in={0x2, 0x0, @remote}, @nl, @nl=@proc}) 08:13:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000400)={'wlan0\x00'}) 08:13:29 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 08:13:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x40) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000005) 08:13:29 executing program 0: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a0802", 0x1a, 0x8b000}], 0x0, &(0x7f0000000340)=ANY=[]) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000400)='./file0\x00') mkdir(&(0x7f0000004e80)='./file0\x00', 0x0) 08:13:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8914, &(0x7f0000000400)={'wlan0\x00'}) 08:13:29 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x80}, 'port0\x00'}) 08:13:29 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r0, 0x80184132, 0x0) 08:13:29 executing program 1: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x1c) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x2, 0x4, 0x20, 0x8000000000000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', r2}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) 08:13:29 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000005) 08:13:30 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000c40), 0x0, 0x40900) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000d00)={0x0, 0x0}) 08:13:30 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb703, 0x0) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000005) 08:13:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$snddsp_status(&(0x7f0000ffb000/0x3000)=nil, 0x1000, 0x0, 0x12, r0, 0x82000000) 08:13:30 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000100)=""/82, 0x52) read$usbmon(r0, &(0x7f0000000200)=""/254, 0xfe) 08:13:30 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r0, 0xc1004110, 0x0) 08:13:30 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}]}}) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 08:13:30 executing program 0: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)={0x20000009}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) 08:13:30 executing program 5: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000006c0)) 08:13:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f0000000080)) 08:13:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 08:13:30 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r0, 0x4161, 0x0) 08:13:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x7, @none, 0x4}, 0xe) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 08:13:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 08:13:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000140)) 08:13:30 executing program 0: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x30, r0, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @local}]}, 0x30}}, 0x0) 08:13:30 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000044, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 08:13:30 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001240), 0x200800, &(0x7f00000012c0)={[{@overriderock}]}) 08:13:30 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="1a5323dae04cb45c6c9966a12ace1c29", 0x10) 08:13:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000000)=""/126, &(0x7f0000000080)=0x7e) 08:13:31 executing program 0: r0 = socket(0xa, 0x3, 0x4) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) 08:13:31 executing program 3: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000340), 0xb01, 0x0) write$dsp(r0, &(0x7f0000000000)="be", 0x1) write$dsp(r0, &(0x7f0000000100)="b5779b69c7e5a145dcf6a6698d597ae487518f08f565a2bb2593894c30687b123d158301a2d550dc7e661e8307f968a412d32d9217ec9da305f3787018e63761d539c27354d590a4f49b971bf441f5c9a22ab94b8a76937fe5b370eb0390c2d6b748d4cd4c951ab8c04150b4dc41641b30b6d193623732169c1a66ee1259f7663ab0e070e5ec82e41640a881f9731695b67174034bb9d599630ed877b9653aff83ea04e58e881dadb224ed2ac0db58604d0984e0e1c94193bcb228d71d9f290872e7e6592b0010000090b62995faa0310c080198bab585aead31dafe38d68a45f8e30312cbb98781fd6e", 0xffffff9d) 08:13:31 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, 0x0, 0x0) 08:13:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x7, 0x0, 0x0, 0x2}, 0x40) 08:13:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f00000003c0)=@gcm_128={{0x303}, "9639699551403181", "069c010000000100", '\x00', "498043b14786e9f9"}, 0x28) recvfrom$inet6(r0, 0x0, 0x0, 0x40002062, 0x0, 0x0) 08:13:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/146, 0x1a, 0x92, 0x1}, 0x20) 08:13:31 executing program 2: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000480)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) mount(&(0x7f0000000780)=ANY=[@ANYBLOB="98d7c14058c043a3b3243bd44908e62ace4acb8c29fd64215198087619822eadd827d00db4ce57c283209fbd806ca46c013a4ba39e16005bb7fda05b6902061d48800bfa4daab1258c6d8340ba9a99"], &(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)='exofs\x00', 0x0, &(0x7f0000000500)='netdevsim\x00') lsetxattr$security_capability(&(0x7f0000000680)='./bus/file0\x00', &(0x7f00000003c0), &(0x7f0000000100)=@v3={0x3000000, [{0x0, 0x2c3}]}, 0x18, 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYBLOB]) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x20, 0x20, 0x1, 0x3f, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x10000, 0xfffffffffffeffff}, 0x10, 0x0, 0x8, 0x7, 0x6, 0x0, 0x2, 0x0, 0x3b, 0x0, 0x7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) acct(&(0x7f0000000000)='./file1\x00') chdir(&(0x7f00000001c0)='./bus\x00') truncate(&(0x7f0000000340)='./bus/file0\x00', 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000200)={[0x1]}, 0x8, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x10, r0, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) 08:13:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 08:13:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x14, r1, 0x711, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) 08:13:31 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000100)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1, 0x2}}, 0x24) 08:13:31 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0xc, 0x0, &(0x7f0000000040)=[@dead_binder_done], 0x0, 0x0, 0x0}) 08:13:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x0, 0x800, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r1}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) socketpair(0x6, 0x3, 0x4, &(0x7f00000002c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="0000000000341a232b4dd5da899c71", @ANYRES16=r3, @ANYBLOB="0100000000000000040009000000"], 0x14}}, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendto$packet(r4, &(0x7f00000001c0)="ac", 0x1, 0x0, &(0x7f0000000240)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="c775e2c1fde8"}, 0x14) accept4$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14, 0x0) 08:13:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@subvolid={'subvolid', 0x3d, 0x8}}]}) [ 1403.652735][T10428] overlayfs: './file0' not a directory [ 1403.676258][T10444] overlayfs: 'file0' not a directory [ 1403.766519][T10428] overlayfs: './file0' not a directory 08:13:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x10e, 0xb, 0x0, 0x0) 08:13:34 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25NOUID(r0, 0x8901, &(0x7f0000000040)=0xfdfdffff) 08:13:34 executing program 4: syz_mount_image$btrfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file0\x00', 0x0, 0x1, &(0x7f0000001ec0)=[{0x0, 0x0, 0x9321}], 0x0, &(0x7f0000001f80)) 08:13:34 executing program 0: r0 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000340), 0xb01, 0x0) write$dsp(r0, &(0x7f0000000100)="b5779b69c7e5a145dcf6a6698d597ae487518f08f565a2bb2593894c30687b123d158301a2d550dc7e661e8307f968a412d32d9217ec9da305f3787018e63761d539c27354d590a4f49b971bf441f5c9a22ab94b8a76937fe5b370eb0390c2d6b748d4cd4c951ab8c04150b4dc41641b30b6d193623732169c1a66ee1259f7663ab0e070e5ec82e41640a881f9731695b67174034bb9d599630ed877b9653aff83ea04e58e881dadb224ed2ac0db58604d0984e0e1c94193bcb228d71d9f290872e7e6592b0010000090b62995faa0310c080198bab585aead31dafe38d68a45f8e30312cbb98781fd6e", 0xffffff9d) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) 08:13:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8914, &(0x7f00000001c0)={'gretap0\x00', 0x0}) 08:13:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0xc, &(0x7f0000000000), 0x4) 08:13:34 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x40000004, 0x4f1}) [ 1406.020076][T10464] loop4: detected capacity change from 0 to 147 08:13:34 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$netlink(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x20}, 0x0) 08:13:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000200)=ANY=[@ANYRES16], 0xe8}}, 0x0) [ 1406.118333][T10474] EXT4-fs warning (device sda1): verify_group_input:136: Cannot add at group 1073741828 (only 16 groups) 08:13:34 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f000000b1c0)=[{{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) 08:13:34 executing program 4: syz_mount_image$btrfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file0\x00', 0x0, 0x1, &(0x7f0000001ec0)=[{0x0, 0x0, 0x9321}], 0x0, &(0x7f0000001f80)) 08:13:34 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000001140), 0x0, 0x0) dup3(r1, r0, 0x0) 08:13:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) 08:13:34 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) read$FUSE(0xffffffffffffffff, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002dc0), 0x40081, 0x0) 08:13:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000000)={'team_slave_0\x00', @ifru_mtu}) [ 1406.436755][T10489] loop4: detected capacity change from 0 to 147 08:13:37 executing program 0: syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006800)={0x10}, &(0x7f0000004d80)=ANY=[], 0x0, 0x0}) syz_mount_image$udf(0x0, 0x0, 0x0, 0xad6, &(0x7f0000000100)=[{&(0x7f0000000140)="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", 0x1007, 0x57}], 0x10, 0x0) 08:13:37 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r1) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[], 0x7540}}, 0x0) 08:13:37 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000001ec0)='./file0/file0\x00', 0x0, 0x0) 08:13:37 executing program 4: syz_mount_image$btrfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file0\x00', 0x0, 0x1, &(0x7f0000001ec0)=[{0x0, 0x0, 0x9321}], 0x0, &(0x7f0000001f80)) 08:13:37 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x4c) 08:13:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000002fe5e620801e672d0000080003"], 0x5c}}, 0x0) 08:13:37 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000004000)=[{&(0x7f0000002e40)="96c021b3254a27a41b061cd0d9ee4d1e39e34f180c99e028224375d893736e72a7bbe8f87d28a1a3f977583e6387d83378650514dcdffc264f551cdc18549a05a7e921165eff4f4725d1feab300b302bbf71da8587fe9a3b108aeea5336f2247a870a9d421288f7644e15f54b11290ba76d8a193198c066cb7785c38011057edd2fb49df887a1283c44f20e9aeb9389f78b13cf1a4dcdbc0b5b6ad841e06c3511ba00eb984a914aac5412184b59ac36899355dc2e6afa34f2345b2fd4b14b35917bb49df35c32370f94f03f6a2c27cbf253482cc859914a3bbc068a78d9285da8385e5aac277e5e1964721aa8949bbd3d38f9562112ad2063328effa6526e15a12c41361e59c981cd6f523c550071d2c4468e68f828baddca4578f5698e732d05b2dd6c4f13a337df5c7a20cd873f2956f084551cbe6fcda25b4a4af7bffbbefbf562d6fc0e107c27c3eed3b17a7ac47353aab96d5b00f85eafc2f2213b77f2af1552f523d0a46e35317cf8949b1e2b9aea4803b3ecb72f85b2d63817e86538e2f42cd5b8d8a458e00077d42b457ba05dbe67e25e47813a62b0374badf796dde3295690c716f85fa8062039ce44b90a88a4f22a917dcd332a5200d5e01da3216f360894fa689813446a72d649d4ae8977e08e6491ffe286a1bb6c11ddd8b30b5a34682695d9e019d5d1e49ae6f6389e37ad770bf49305d867293a8101ca24ef9409c275047bec794c501045823f1f84285de0ac258de499c2b4464fa9bc747523d52df274c6e75f305c6aaef8ad3a2163c052d8b9af53da3d979721362d70fc1c9d9ec62b2d04abefca53dda2ab5c5784d3f910f2110b042e63c6a6433b2f1430757eed1e1fc552b8b06cd091061d5b90d416d3bec1d326926c8ef62fcb7238a74969cfd64e06e6b70b46bc60956b9ccf43556a93b89b195e31de496964f5d62effdfddc2533bf387729aea4c610a52d500d1bf00a0caa95856f08370c07933819342443d2a65318130475be709195a9ee95f3a2dbadf538ada3e02e74f537ba93c8e86ec33282edb93c9f6fd7152ba866e0372745395fb7530aa367b433b5a4848890f5695eda23c893185dabdf0ae72e9e5e0e00eb0debda77fe4f6cd64b0ffdcebe3f857c4f43ec2f3b07bc17866c86bf1f65c1601130b36d6d38820fad259b21b0ef0280d6d4ebfa24fc5c1eaae2515f3cfe8d84d67de7eba0a2010b0fd73c61a177acb92c86380901ba6c50df35aceee6705c8fd8fa821b5c65f1433231e7e4065e751f9a2831c9d5c8d6ef4d9393bae768e461ba94201463e6c5c446782221a4178a424c2ed3d158fc3e4396939d9b94d28d35b8a935a64cc25c463a97827f5f59fb51effead55f851e8eec041dc9970630f449eae457686f344c320c4ebbcf1812d213cf5402ae595852ffb13a111eecce6d6d8adf12df77fe945f45e3ed0eca896cb34e01a57a788b245db40f4a632a7d23d908043d6f11938ddf5fe48b7ed05978120549307dc9c9a556eca18e317de3eaee66bf9ae4d1893eccc29b209297c04c2fe6f4ffc1cdd9c0bf327fd0ce1f92060074968930b409eab17eb7e79af84bc55199c7eeb43c494f94d94b64723f956f65658ca9c039d82b3a31c888b1533dfd182dec02d0be638935a6e37146fa053b3c274a1a3dc379fe5b1176c7f1c9a382e1fb63a5def8d9b8b3d93b8b431c5273b85326b3d368cae2f869eea8b6c75cfe26044af02b05d2332ff47d9efba4c762eba16c79db7f5090c7835d87997d4437eb00f62b03d904afe9014f941652c0adeb6201325c07ce4e392ea109eed14ffa60f4fd7a0d2bd8f8f72446c5ac0f7b54160ba4f228eb38f467df57418ea054d2555a385b89562abcd87e4933c59c9b28cb9cef773355191d11001930152db10c19ba0a7991e242ebe95330aea316eb5637a5179f263d01051b077b08d024a57fa83cfdc80f1b61fa8934589dc87af70ca40f4137d3bb09bdf094b637587a976a639428806a3c0b508202adca7f1d693f002354c2e668df6e6b9f590e70372212a87ad6ec59f39564ac70376a97eaa1f0eac07a1da00f099ab6279f55a2cde7f53c1bd3c6cf8a2dc8d65328cd1fcc804a8dde25f0c67a1a05563e62bdf4e306b1156ecdf9c658de5569f0befbfe17c35fd13d124c69703559076b2369d58f06f570d89f16b21febf7b762f85a5717b49b84f44f623622e04c926f5c3cbb3bc48a4400e0f487476a14f885a8fe57bf949ecd49b1a0bacda26cb9173a085be86ebee82faf8dc09bb808de5b21381cd38b2e86e8dce9f190769221dd403f693c83aea4494a8207a1616ec92a51de235d487e77bc6a5ce9a299415a7dbfd77e11e30911ed3fcef1ad50609aa212f7b54c5585c1133f0d51e37ad8231d3330524f599915f5131680b0299e90db60271e123d22873ef4179053ee46d36457c262d3bff38aa2bf3e59f94eae74019c1195383d4d6ab8c5a40097a5680aaeebea104db9a86869e106bf3a035fac39bfa9b80a1e32d86f78fbcd40572976d0c8b0c5a19aa55b44d2e1353338e92242f676863802bf48a78c727f7d02e461961baf11a405eaafdff46a68085600311ffe47e172aea03ba07abc73e7d831a8560d426b9bf78fafc374c579cf7d8b6e08bb506b1c865a10e9520b959ed9f1277f6510096cddfc138452da05da897db66892ec4ee48099aa493b637d40a5c93e106bd07e783fadd8b007f3b3146f71bf93b18564094abea5f15473240aca7160b3d2281566487f4fcb9cd0ff94cf543b53cbd6574da5813e3d94495391c544961be4405bc391e56f85070332f25e777b3bf2103d69d05402dbea92e963a74f332a38f48c2c9290e193392fd01be8276aa8795af7898cb9dbcd2cc76f8ea86eef05383fe0ea1cb6bdbf4bd2ff52a503a9be4b50ab67928575d56282f04eddef10c19899446e3d3edb1c7e5bfcad45e9478a533b6ba1fe83b8d5c0cae4821dbc4ea3ddf32ae833c40ef9aa3115524d422267420b6a3efbd8bcb20fde35af1874f6917290ef62120732b000142b819691541fd9bc27ce0862f062f698fcf6172bed02a54e28136ec49a8b3dc2aad755ae5ee70eb39013170ce78a50c2b155711888e9ac0d6dd2b832ee557f250eec1398dc91ebff0ba084df581cb58e616626e1218b932502daec49ca78cfabfab4f08e6ef7ea079da44219a1c9e1e0a5cc43a8e53b0370322072e23132aaec3049c441e15611ee40e1b263b420a09b135af40b44add8cbaa4112a2befee3ad87892d494a4f3c56422e1ca3f5b1d6dc26dda97867f170ae245b6b2d382503cc7c4efd41f0acd32dd171bb97f790b08ef3a205408823747389255a56eda9dc7004f7d1c9f60e5d85fd492b0c2387f567817c8bc412fb2817acf4d4471d8fa345116e883ac7ed07f8c8e2215aaecf227f812e75f8277fcefb602da8a832e4dd6ea15306484bdb5a86c0c6b3aa751547b1ba83090df45c296a5f9792c6c06c4fda822ed0df21443a1729f43cd91c305114c3e8dd3b1841a1f55bd99ca863bae6bb58eae3ed59b467e2199364968305ec3cec908e2e9edad8688fcd421ac9a9bd9505053df34ca6c067897cdf18d395b5cee6fabb34f5b38e37548950f23f40f1902fd2af2f6f007430194fd240e05338373f4cddc3552e9f8819e4137c28fcb509de855524b46a11be0804af6df912b7ed20139e307c29a15f5a7412ad2b30c0909aebd97fe8f18e6bfd05df36241a713c0ead66b0cf2e3e4e7019ffd8cb6f5af4ca268025726e4bc37f3f8a5a2c7012a383ef5d990c60864c670620fc771d1b2f2cd707bd828aab3a9d5ea1618e03bfc1e0cf0f54fc19de856f048ac2a42f566d03f7c53b65366783994b605f88c03a85799aa3d76093d519893bfb6f892c548c965a8a315ae1fdc9b3644c8d0b5a53e3b16016c0ffff028ff588680f21b0d89714423edd159d9e787b96da39a52a6c7eea762dc6ecf8a42e4a41afcd7e52cac4ab0a8397d6e1b289d7d968a90ee4df530656c3d0ab0235870af589acc9afff32ec2fdb4cbb3f362d2c5bfdb5460aed6ad6122e3a6fb7da43ee7ae6e0a093fef836f4557f869e17e2310cd7c6cddbcbd3eb8ef71e1dc1cd28bd0fa89e2507c7f8c53be6b10ffb84806c8cbde58a924b81d263aef826f30c701eea5cc28f203c8ee281314e45df8e57ce229e189d379c0ec122179fd0f70e245ff7b59f0b5a73b4b9c288f553499fcbce9a10ae5a9986d7d98fbbe8268d4e04887d927ddf3c054bf401d56bb4789cae0baa969a2ebb9bd5ab0c52b1a119dd6de76c0c7f71d8b8f536c7b852ac4a85d356a922dd146962831a2d5023393f07fe001e6d9a95f4f4feadcb555f1b270fde22771acbfddf678ebd7835abd978d70e637481dc63f5a0384dea342d9512e45f1a6f9c0ca2a5ecebc37a5e6a2783a7b5fa7e76b76f039fe27014157ad1202f53c0cd93ca865662e5e2e2395b3304c57c7b920f0717cf6bfbb69abe562e91f1d6688f5088e16d3ef745a2ff3bdf9f839e648008d6e23fac2a072788535238b11474ce4855d5371d6ca270b1ad77f73ee8dbd0dfc9596dd836ea9aa200915f62fb3a3f2dd9b97c9682521083482381881fe5ce62dc1da58e40fe59b53e467250cd4412d7befdf1df993b51aad1dc4ac503a42ca71db739dab8acb2c9d53c5c547abc98dd9a73319aa9c4461ca47c7acff4d7e17bc6fc6ac6767aef68b56990c2a139606de66ad07a7e995192b5f2e040890a1dd6a3e8525c0de937a9908dc7329a62aff18d26b7e951a864ab342ca7a2d9d7727ebdcd8b4d012df24773f7b5fc135cc4a81be1db728a58adeb0273855e6995608b122d412b0de0767a003ce59ead55e44b1dfbe71262528a7b59586418fcdbe22c2a38d0902b2720ffba7b15ccbffa52454ed1cfaa824c3561e80b3c8c9f8f6bbef8f9d43f445107f0384b9fd97ff5a3a7ad952541c3b5d1b8bfc26e78100ae2cd42e171756bbe48c18343a811f49c93a3ed7e693760b49d41dc3152e26fb7a0d556ef2a80b21a6cafe0b16aa28336424534554348abeac4529adc3a80a", 0xe01, 0x200}, {&(0x7f000000a5c0)="04", 0x1, 0x80000001}], 0x0, 0x0) [ 1409.049005][T10522] loop4: detected capacity change from 0 to 147 08:13:37 executing program 5: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001600)={[{@dmode={'dmode', 0x3d, 0xfffffffffffffbff}}], [{@euid_eq}]}) 08:13:37 executing program 4: syz_mount_image$btrfs(&(0x7f00000019c0), &(0x7f0000001a00)='./file0\x00', 0x0, 0x1, &(0x7f0000001ec0)=[{0x0, 0x0, 0x9321}], 0x0, &(0x7f0000001f80)) [ 1409.205627][T10531] loop3: detected capacity change from 0 to 264192 08:13:37 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0xe6ebec5) [ 1409.313918][T10531] loop3: detected capacity change from 0 to 264192 [ 1409.343245][T10544] loop4: detected capacity change from 0 to 147 08:13:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003400)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c, &(0x7f0000001240)=[{0x0}, {0x0}, {&(0x7f0000001100)='\f', 0x1}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x48000) 08:13:37 executing program 5: syz_read_part_table(0x0, 0x4, &(0x7f0000001240)=[{&(0x7f0000000000)="25f683da8f802eb40e516363a39709d5520400a21b85c285ed3fcd73ae251f7035856db15177bbcd8c951b8076d4c92870fd", 0x32, 0x1}, {&(0x7f0000000040)="93984f50eb4a7ca65f1d60e8a047e8833c1e03d8db481aba76a456cd8206ec25f156696f199f25d84af49b3ee8dd4ffacb87cfd6cfacc23c", 0x38, 0x7}, {&(0x7f0000000100)="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", 0xf7e}, {0x0, 0x0, 0x8}]) 08:13:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1409.847222][T10562] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1409.859637][T10566] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) 08:13:38 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$BTRFS_IOC_START_SYNC(r0, 0x541b, 0x0) 08:13:38 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/rng_core', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 08:13:38 executing program 5: r0 = socket(0x1e, 0x5, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) 08:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xf, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000080000000000000000000000850000005100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:13:38 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x1f, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:13:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11e, 0x11e, 0x2, [@int, @var, @datasec={0x0, 0x2, 0x0, 0xf, 0x1, [{}, {}], "92"}, @func, @enum, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x13a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, 0x0, &(0x7f00000002c0)) 08:13:38 executing program 4: syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') 08:13:38 executing program 0: clone(0x80007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = gettid() r1 = memfd_create(&(0x7f0000000780)='\x00&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x06\x00\x00_\x7f\xf4tW.\x81\n\xf3\v\x8d0\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=.\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\x11\x17\xd3\x92\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% ', 0x2) fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0xffffffffffffffff) execveat(r1, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ptrace(0x4206, r0) fcntl$setlease(r1, 0x400, 0x2) 08:13:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000001c0)) 08:13:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 08:13:38 executing program 4: clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x9043800, 0x0, 0x0, 0x0, 0x0) gettid() gettid() vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='changehat 1'], 0x1d) clone(0x0, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180)="ff13418fe0b213400a47e3eeea0b03f73239c4c39fe93c91b3cc0d694ebb5495eb80a29cd6c3770604") gettid() 08:13:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000380)) 08:13:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') read$FUSE(r0, &(0x7f0000000080)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) get_robust_list(r1, 0x0, 0x0) 08:13:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f0000000380)='./file0/../file0\x00') chdir(&(0x7f0000000500)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000100)='./file0/../file0\x00', 0x0) 08:13:38 executing program 2: clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r2 = gettid() tkill(r2, 0x40) sendfile(r0, r1, 0x0, 0x1000002047ff) [ 1410.337531][T10596] ptrace attach of ""[10598] was attempted by "/root/syz-executor.0 exec"[10596] 08:13:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000040)=0x2, 0x4) 08:13:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x2, 0x0, &(0x7f0000000700)) 08:13:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000000)={'dummy0\x00', @ifru_ivalue}) 08:13:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x31, 0x0, &(0x7f0000000100)) 08:13:38 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') 08:13:38 executing program 2: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) sched_setscheduler(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 08:13:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f742e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffffc654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@newqdisc={0x40, 0x24, 0xd3b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0xc, 0x2, [@TCA_FQ_CODEL_LIMIT={0x8}]}}]}, 0x40}}, 0x0) 08:13:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 08:13:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000000140)='..', &(0x7f0000000040)='./file0\x00') unlink(&(0x7f0000000080)='./file0\x00') 08:13:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:39 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f00000012c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)='o', 0x20001}], 0x1, 0x0, 0x0, 0xf}, 0x34}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000740), 0x40020000}], 0x1}}], 0x2, 0x60c5840) 08:13:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 08:13:39 executing program 0: clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() vmsplice(0xffffffffffffffff, &(0x7f0000001440)=[{0x0}], 0x1, 0x5) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@hat={'changehat '}, 0x1d) 08:13:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:39 executing program 3: clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() vmsplice(0xffffffffffffffff, &(0x7f0000001440)=[{0x0}], 0x1, 0x5) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@hat={'changehat ', 0xffffffffffffffff}, 0x1d) 08:13:39 executing program 2: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) sched_setscheduler(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) 08:13:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) [ 1410.394180][T10605] AppArmor: change_hat: Invalid input '1' [ 1411.412731][ T26] audit: type=1400 audit(1634372019.605:188): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10675 comm="syz-executor.3" 08:13:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800a00010076"], 0x4c}}, 0x0) 08:13:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0xc, &(0x7f00000002c0)) 08:13:39 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 1411.471831][T10680] AppArmor: change_hat: Invalid input, NULL hat and NULL magic [ 1411.671774][T10700] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 08:13:39 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x4000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x28, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x6}, {}, {0x7}}}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'sit0\x00', 0x0}) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8506d1ef9bc53ac6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010001fff0007248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a002615a354812c4560053e8c1d1f9dd25b35c93a667e98d7bacbd4bce460f3090d7265e0aeb532dc2def0f50c519258be5664cc6a9d2c490"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 1411.756032][T10700] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1411.832757][T10709] syz-executor.3 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 08:13:40 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 1411.952286][T10709] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1411.962353][T10709] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1411.971511][T10709] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1411.980617][T10709] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1412.042998][T10709] device vxlan0 entered promiscuous mode [ 1412.101643][T10709] netdevsim netdevsim3 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.110968][T10709] netdevsim netdevsim3 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.120309][T10709] netdevsim netdevsim3 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.135948][T10709] netdevsim netdevsim3 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.281075][T10711] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1412.291459][T10711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:13:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) umount2(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 08:13:40 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x40603d10, &(0x7f0000000100)) 08:13:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) 08:13:40 executing program 1: socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) 08:13:40 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x4000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setitimer(0x1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000900)=@delchain={0x24, 0x28, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x6}, {}, {0x7}}}, 0x24}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'sit0\x00', 0x0}) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8506d1ef9bc53ac6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010001fff0007248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a002615a354812c4560053e8c1d1f9dd25b35c93a667e98d7bacbd4bce460f3090d7265e0aeb532dc2def0f50c519258be5664cc6a9d2c490"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 08:13:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000040)={'ip6tnl0\x00', 0x0}) [ 1412.448876][T10737] loop4: detected capacity change from 0 to 16 [ 1412.514200][T10736] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1412.524019][T10736] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1412.533077][T10736] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1412.547367][T10736] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1412.563160][T10737] FAT-fs (loop4): bogus number of FAT sectors 08:13:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f00000004c0)={&(0x7f0000000b80)={0x54, r1, 0x1, 0x0, 0x0, {}, [{{0x8}, {0x38, 0x2, 0x0, 0x1, [{0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}]}}]}, 0x54}}, 0x0) [ 1412.591855][T10737] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1412.687658][T10745] overlayfs: './bus' not a directory [ 1412.755843][T10736] device vxlan0 entered promiscuous mode [ 1412.803293][T10736] netdevsim netdevsim3 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.814262][T10736] netdevsim netdevsim3 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.824829][T10736] netdevsim netdevsim3 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1412.834105][T10736] netdevsim netdevsim3 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 08:13:41 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e030a86df875f2e3ff5f163ee340b7679500800000000000000101013c5811039e0c775027ec8e66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5acc326d3a0dffc2c654"}, 0x80) write$nbd(r0, &(0x7f0000000000), 0x10) 08:13:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0xc, &(0x7f00000002c0)) 08:13:42 executing program 0: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x769eecf1e06fea38, 0xffffffffffffffff, 0x0) 08:13:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) umount2(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 08:13:42 executing program 2: socket(0x26, 0x5, 0x1) 08:13:42 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0xc01047d0, &(0x7f0000000100)) 08:13:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @mcast1, 0x0, 0x3c00}}) 08:13:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000800)='sched\x00') preadv(r0, &(0x7f0000000840)=[{&(0x7f0000000340)=""/50, 0x32}], 0x1, 0x9, 0x0) [ 1414.711559][T10783] loop4: detected capacity change from 0 to 16 08:13:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000600)='./bus\x00', 0x0, 0x3, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {&(0x7f0000002b80)="0e6241a53bac8a4beeb0b1ba1f87bb6dc8373201109a664c3bc2598ec72ee57bb719c5a32c7c6bccb81e7c3953df122d69f6f4ffb37ed34d9145174335b8824628d7cc0786dcfd7efa8b3a5f75a86945fa6d3eabc474741aee7bb6b96b9d9e4b3324aea0ecc290297f3c07b6ad2d22becc59192b1afb8621a71deb13b69afab4a2f747178793b4dffe1184a44f5611f8444d8f6cd2d1910715fcc0b5a7ec38847ba8905c57fef8a3562dc207853878e2407df8e358abc973aad366d5a28b7dd78f16bfd98e569073c378870970ba726c03fe364f8bf8cc69664d254e8a9879e60b154a821b8fe45746c6cb571c62a42638d079371bc1e38b781fc7218796611405c86ce117d7ccd0b2ee81ca1b74fadfc4449707b8e4a0edeec2865cf3f835b5fd6caf1f6297e534f02efa0d94c77c5425b30a90170dbf2a48bb43e5bacf21a44931f23db437007d40e31f7ee6edf6def36cd7c459e006b12d9e25b5315ce6ebdfc9dbc85236fc3f9c6ebb9b2c6df1e3220d179aec5a4411cbbd24f02febfbdd8c7ee0a6074f85ffb5c3c825f3fb607a224f1dedcdacd1c9c747f35133cd009d74e4889edd7409fa1d615db3b800fa5a4adcaab8224fc1305a162cb0d9157b367da3720d9d6b425121e16a28cfc57b7cc3991597678cc3a2e864e26b7e5fedcf6041bf07256c8c49d25f8637c3f18ca1908d9a6ccb9e63c49ec9eb209e6aec9b0faf2b43dcd136d119dde1949e1e79a81fa40e7a522eea5c42746b07cd4d1095562a1f2530328a6bdbe7e8a3e19b5c1526763519b100ef3dbaff47ce6f3ee65050e1ebc882b13e61900999f48e3cfe7e1dd10a1af242dd17e2576c06b52abb054134121370e32bf462df58443cecc9af2212cbeb63b9823702f6fc83c911e8a9fce7b144175726fd2f48f778cf421964d4817e9325db9d1644cc06fede76428851ef56a4c9ca2bcc5502a768f99d13fa0ab2904d12528ff776d41bc850564b2e7ff87d967ab279416c62cdd9defbd3479096cf8c08238cea6e0cf521c2c97a1e740bb09d2a1b6cc1b46c0832c29058321cefae92d9b674a14592152e23fc75074a21e9f16bc441baf161d07058164d2d18079284efa545e1a480b3841f1cf508bfdf7d9cd0e3a1aed5c97edcc23fba13938d79aa1dfc9cf0b80036723c5a82672a71f850a9965835048657633014641e20c9190689653db680582b208bf05103478ab222f2be1390066422887ab00a8049d83ccaf711d11ab7e83b4c3d71a2c71bd2312d8248ed7366fc03914a46660e5d0678c951d6826fb8732db247f1e76396c6be32cb2658ddfa644bedebd45535f529b3b084cf7c586a7bb8d8c4e088f2c4e57be2830f912b65316f4735423a6e3b969369f0bfc445ff9152fcc5dad95fc6713dd7db8d2342ad3732e91d23439c6d91f87d49fce53409a7be3c00c22dcc17a58d8c06e2b19203a245ce2e1e57c0e4f4d90b412cf49cd01e11aa86d44dcad18a1530ef32f666c30fa882499a99b8a2d476e52993868a13b735fd3bb00f1a5553959e17aa456e503f37fa64c8fc12f5c4ddc3ee0c5af6ffefa6f5ce1daf73cd4c0df5d8c036569462ecca3e049971a855040551dd1b5505716cefd68b4560aa68fe6cfc827cac01a08c1de79a86c93d50ece32d7186a872adcb73cf3197b6ef48cffa7b903813795268bcef466f0534a1e1b175a93d3b34676a0017a7d9966a073d2494b0c4de37c3bff4c58e8fab058fd1df9b0646932162b439591eeb3656eddbabc117bcf38df609223fdf3eade1440562b278a4680eb436105f5fab958cc336c24874c93a36b010b8d913bc387fa7f3a0de96da27661f6a95257a4cd6b8628a54beba6d61fe9ef7f0a5591bdd60a1161d547c1c6572b9306b4bc3b90dc35372a10195553af71beaf78d93e22b0a04e66e548c4c8b00656d5bf6d9d04633deb6498730c64c58cf5fff0b1b4ac87b60d0fd9b1da1dbd747e60ce6340d585026f2d5e8f28cf01f844e2e2f909fd9ee23131c68987235ad3812c8776901b13a36a0967986a78a2eca11fb883450b780094f5860b847b86ba472f3ac404ab78fe6c3d36f8839439f57efe5b12128236ea6d1343565ca7cc77310fd666755aa7d37bd53278879ac9025f3ff80bf2c493dcfb62c8243867567bba951132642d5749f76d1880b569fcc5aa222e4b494a0bf3f73ba91c4cd34b5ee88d4986206811efb8976af6fc14058d666a0d75fe9886d4ccc7b1382ff6cf3519bbcca7fb9e14e9d78f2ab77beca9ca4a24e8e8e60269fbcd0bb9ee6c95ee2b657eab9bb60fad19890ec51051f502d45349c7a4e99b53a0deaf8757ccc976a6a79e5d358e51c529190bf2f928365eb80c930a67fedaf2dc70c1b696f7d9fa8548189de3eabf52c83c22bc6ae07c374e5327690737cf77518fa8fa2d37da67ad5bfe01937a81e038eff2719970fdb1b586eb1f745b2f20c94eb14b18bdd3fb50b46c571f682d38b6d12ceb7b112cc1c5390f797ed3093fb6a1aebc5ae31ec5a5b98c33117761c910cca31bcba56ffc7cf789897832b76765550eb7ac6468b06365bb9c9be4affa8fc63076b56a305f875e34d63270d0b10efda247cf603e3a20d10c0bec396407548f78d92d0768d63fc73da9b082c9a2653002a6b50dfcd7fd3b502ad3a24ecead57e19306721000ef26e31fd76f3e0a1c4396f822b2d856f98db5916c6255217c561a8b2e3deca36615a1f3fef3646bd69afe43b4cf7f61e1ceb14f3608db1029f680db0bea975ba924c0f1dc16ab5f912f116b712390729e140295061baafd52c6181c0691fd576dad5cbfb6300237ed38b9a45bb73e623016454e5049d0319fe69d4073d7cfdc3033a765610cf70f69f897b672ae6c0042f1c0861999e6ac99b0093716c3960b66c5720f781cff725e1652ae90373c2a33ac224d9e13abb5d3929c074b409e6e2f61c0cdbf2e1b9a57a31986d36d36a7908734ab5b8d28b43ce4202adf6a39308960d9180eb0cd30f2b757ad01946dd480c4e8701dedea13a9d248935c2efac2721f599b642dbe32c5e9010defd9bd7ef97c6069304f811dc2a3be9de446c865cd638b3b8004f929ee341752bb250d11bd11e249ef9d184e4355c5a5cfa16949bc06a7aa354862c6dd35a07f47a1d8b2b127c06ca7dbb3c4e89ff431cd763674d5d7dba78e916f5bcbf24d6fe8c01893ff0c0a824e17f52b40f93ba2cc8205e66ed320bd4d3b4cbca251ad34385dc2452448d19b50105fcf4b9ca4f296eed5aa537a5ad7cdd901482c32ba366ee12b335754c70589f9fd38524097ec2f9df8e1a12ecb96a8cd4474f484eda4c52f3bff229bc8d025ec56d26b748e84a7f02efbe0aff0a37e54bcdf55db908b1dee2feefa1593ea9f7079ee0d95d313426180eacc0a5e60b2c5454f68b899f4f7c4ef5e282dbbf58014183df8f65fb678103934dd2e5292ea1100900b64fb8dfe2270f936c97f7764e40c4db9670d345a140b3ce8fabba2dcb94f7d8e560c7ab3bc7956750c217b5c7407101eced8b6e157a2b7d99447a7cbe5d5d0187f8826f495cd2ff29b694819d3c2dba1e68d7badd5737eb9910ff975a283dbc63f3cf0724bf3e7a5202256b6184b76a3333ca92edfa97b79e54aadb20b7ff0ee6d082626376163ce661f60e368c6640e345eb0c86c4898e0a4148d458c31ea711bf4e3935df03907f66d1be088fee46b91d5618c84fb6c32ca0129ed2cfbc0daf33af12313f061edb1261a4d6501568f6f12a74ea3f986a47c150c078ee2d7f45044735a7e9bc486ee57ec845e7b18d204cfd53596230ecff8fb7b13abae7fd1028d3313aec7c9cc01c9ae2002d53d743b9fdae837630a5a1fd17e2832250f0501041ec8c7f89c01d17ad980b6cce94fd6e958a9ae7efb65dea795a90ab6ccf92fccb890aed69c344a0d87f75cf3a873c70d7c6dbd0b9a838dc6e94d02fdb10fb93948a0aaf73090abeaef969df0c7218be50c91db95affe4cda57af28df28bc53a2745af7926a934a41f27965c06880e29ec59c5cac473b9a1d9df242b492665ba44780e1003794eb3652954ab772d3accec165a9346f0c28b3ba473d35913608c61dbf4eca1fb50465514a4cec375d7ff5d1eff8be53ec4888e3e35ead2d894995719879e750db6b81af05f4c745289c4c640153603ce3428500a9c8d37fadcfb984f4619555aa88d911576a7e19f46f972533429ab869ccb54802ecd23b0904c6adc908165d1ffe0a60fea2203294d824568059a2b4a650322d9ec5f63591e9cbe12d890ca72921c427b9c138afc358e634d8c9e3b3ca96ecf798f7ed0f0d7f450baeeea6425402f53bdd4950b7181cfd935cabe7e02b5c4ec7a8d60b8f2d2e06a8b91b320aac2fc826dbb638fde7850a93dc0dbf7c0edaf21dd85f35d8e81909836b698caed2a4e22761b52e6688e3d7421cf46fb9d894e4bbf519167db2109d310d5990d99f2e8f79c292a3d8d462b1f4fd68ba4404ffa2175cca3dda9455a62c09516c8cb9fba97c4cb9b2bb61e7fa6dedd102c804efe8c72b37ef38611d7fefb2018c7833406e7589a8bd3f0183213609ffddc81fabb2b64e432b491d2f60ba3933b488698fd702ad0433619a1bbc0551b28ecad9350a01ffe17a2492e94b7ed51c1e29a2fe4cb67c19eed84a51bf01774097cca0149cd7c3683119b2408c09e3a083afb594450cfa7e25514", 0xd01}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r1, 0x10099b8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 08:13:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(0x0, 0x0) umount2(0x0, 0x0) 08:13:43 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) [ 1414.758547][T10783] FAT-fs (loop4): bogus number of FAT sectors [ 1414.789649][T10783] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1414.907289][T10783] overlayfs: './bus' not a directory [ 1414.949054][T10804] loop3: detected capacity change from 0 to 16 08:13:43 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='htcp\x00', 0x5) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) [ 1415.036684][T10804] FAT-fs (loop3): bogus number of FAT sectors [ 1415.072047][T10804] FAT-fs (loop3): Can't find a valid FAT filesystem 08:13:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) umount2(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 1415.157005][T10804] loop3: detected capacity change from 0 to 16 [ 1415.170645][T10804] FAT-fs (loop3): bogus number of FAT sectors [ 1415.181998][T10804] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1415.370701][T10835] loop4: detected capacity change from 0 to 16 [ 1415.392913][T10835] FAT-fs (loop4): bogus number of FAT sectors [ 1415.400166][T10835] FAT-fs (loop4): Can't find a valid FAT filesystem [ 1415.524731][T10835] overlayfs: './bus' not a directory 08:13:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0xc, &(0x7f00000002c0)) 08:13:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000600)='./bus\x00', 0x0, 0x3, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {&(0x7f0000002b80)="0e6241a53bac8a4beeb0b1ba1f87bb6dc8373201109a664c3bc2598ec72ee57bb719c5a32c7c6bccb81e7c3953df122d69f6f4ffb37ed34d9145174335b8824628d7cc0786dcfd7efa8b3a5f75a86945fa6d3eabc474741aee7bb6b96b9d9e4b3324aea0ecc290297f3c07b6ad2d22becc59192b1afb8621a71deb13b69afab4a2f747178793b4dffe1184a44f5611f8444d8f6cd2d1910715fcc0b5a7ec38847ba8905c57fef8a3562dc207853878e2407df8e358abc973aad366d5a28b7dd78f16bfd98e569073c378870970ba726c03fe364f8bf8cc69664d254e8a9879e60b154a821b8fe45746c6cb571c62a42638d079371bc1e38b781fc7218796611405c86ce117d7ccd0b2ee81ca1b74fadfc4449707b8e4a0edeec2865cf3f835b5fd6caf1f6297e534f02efa0d94c77c5425b30a90170dbf2a48bb43e5bacf21a44931f23db437007d40e31f7ee6edf6def36cd7c459e006b12d9e25b5315ce6ebdfc9dbc85236fc3f9c6ebb9b2c6df1e3220d179aec5a4411cbbd24f02febfbdd8c7ee0a6074f85ffb5c3c825f3fb607a224f1dedcdacd1c9c747f35133cd009d74e4889edd7409fa1d615db3b800fa5a4adcaab8224fc1305a162cb0d9157b367da3720d9d6b425121e16a28cfc57b7cc3991597678cc3a2e864e26b7e5fedcf6041bf07256c8c49d25f8637c3f18ca1908d9a6ccb9e63c49ec9eb209e6aec9b0faf2b43dcd136d119dde1949e1e79a81fa40e7a522eea5c42746b07cd4d1095562a1f2530328a6bdbe7e8a3e19b5c1526763519b100ef3dbaff47ce6f3ee65050e1ebc882b13e61900999f48e3cfe7e1dd10a1af242dd17e2576c06b52abb054134121370e32bf462df58443cecc9af2212cbeb63b9823702f6fc83c911e8a9fce7b144175726fd2f48f778cf421964d4817e9325db9d1644cc06fede76428851ef56a4c9ca2bcc5502a768f99d13fa0ab2904d12528ff776d41bc850564b2e7ff87d967ab279416c62cdd9defbd3479096cf8c08238cea6e0cf521c2c97a1e740bb09d2a1b6cc1b46c0832c29058321cefae92d9b674a14592152e23fc75074a21e9f16bc441baf161d07058164d2d18079284efa545e1a480b3841f1cf508bfdf7d9cd0e3a1aed5c97edcc23fba13938d79aa1dfc9cf0b80036723c5a82672a71f850a9965835048657633014641e20c9190689653db680582b208bf05103478ab222f2be1390066422887ab00a8049d83ccaf711d11ab7e83b4c3d71a2c71bd2312d8248ed7366fc03914a46660e5d0678c951d6826fb8732db247f1e76396c6be32cb2658ddfa644bedebd45535f529b3b084cf7c586a7bb8d8c4e088f2c4e57be2830f912b65316f4735423a6e3b969369f0bfc445ff9152fcc5dad95fc6713dd7db8d2342ad3732e91d23439c6d91f87d49fce53409a7be3c00c22dcc17a58d8c06e2b19203a245ce2e1e57c0e4f4d90b412cf49cd01e11aa86d44dcad18a1530ef32f666c30fa882499a99b8a2d476e52993868a13b735fd3bb00f1a5553959e17aa456e503f37fa64c8fc12f5c4ddc3ee0c5af6ffefa6f5ce1daf73cd4c0df5d8c036569462ecca3e049971a855040551dd1b5505716cefd68b4560aa68fe6cfc827cac01a08c1de79a86c93d50ece32d7186a872adcb73cf3197b6ef48cffa7b903813795268bcef466f0534a1e1b175a93d3b34676a0017a7d9966a073d2494b0c4de37c3bff4c58e8fab058fd1df9b0646932162b439591eeb3656eddbabc117bcf38df609223fdf3eade1440562b278a4680eb436105f5fab958cc336c24874c93a36b010b8d913bc387fa7f3a0de96da27661f6a95257a4cd6b8628a54beba6d61fe9ef7f0a5591bdd60a1161d547c1c6572b9306b4bc3b90dc35372a10195553af71beaf78d93e22b0a04e66e548c4c8b00656d5bf6d9d04633deb6498730c64c58cf5fff0b1b4ac87b60d0fd9b1da1dbd747e60ce6340d585026f2d5e8f28cf01f844e2e2f909fd9ee23131c68987235ad3812c8776901b13a36a0967986a78a2eca11fb883450b780094f5860b847b86ba472f3ac404ab78fe6c3d36f8839439f57efe5b12128236ea6d1343565ca7cc77310fd666755aa7d37bd53278879ac9025f3ff80bf2c493dcfb62c8243867567bba951132642d5749f76d1880b569fcc5aa222e4b494a0bf3f73ba91c4cd34b5ee88d4986206811efb8976af6fc14058d666a0d75fe9886d4ccc7b1382ff6cf3519bbcca7fb9e14e9d78f2ab77beca9ca4a24e8e8e60269fbcd0bb9ee6c95ee2b657eab9bb60fad19890ec51051f502d45349c7a4e99b53a0deaf8757ccc976a6a79e5d358e51c529190bf2f928365eb80c930a67fedaf2dc70c1b696f7d9fa8548189de3eabf52c83c22bc6ae07c374e5327690737cf77518fa8fa2d37da67ad5bfe01937a81e038eff2719970fdb1b586eb1f745b2f20c94eb14b18bdd3fb50b46c571f682d38b6d12ceb7b112cc1c5390f797ed3093fb6a1aebc5ae31ec5a5b98c33117761c910cca31bcba56ffc7cf789897832b76765550eb7ac6468b06365bb9c9be4affa8fc63076b56a305f875e34d63270d0b10efda247cf603e3a20d10c0bec396407548f78d92d0768d63fc73da9b082c9a2653002a6b50dfcd7fd3b502ad3a24ecead57e19306721000ef26e31fd76f3e0a1c4396f822b2d856f98db5916c6255217c561a8b2e3deca36615a1f3fef3646bd69afe43b4cf7f61e1ceb14f3608db1029f680db0bea975ba924c0f1dc16ab5f912f116b712390729e140295061baafd52c6181c0691fd576dad5cbfb6300237ed38b9a45bb73e623016454e5049d0319fe69d4073d7cfdc3033a765610cf70f69f897b672ae6c0042f1c0861999e6ac99b0093716c3960b66c5720f781cff725e1652ae90373c2a33ac224d9e13abb5d3929c074b409e6e2f61c0cdbf2e1b9a57a31986d36d36a7908734ab5b8d28b43ce4202adf6a39308960d9180eb0cd30f2b757ad01946dd480c4e8701dedea13a9d248935c2efac2721f599b642dbe32c5e9010defd9bd7ef97c6069304f811dc2a3be9de446c865cd638b3b8004f929ee341752bb250d11bd11e249ef9d184e4355c5a5cfa16949bc06a7aa354862c6dd35a07f47a1d8b2b127c06ca7dbb3c4e89ff431cd763674d5d7dba78e916f5bcbf24d6fe8c01893ff0c0a824e17f52b40f93ba2cc8205e66ed320bd4d3b4cbca251ad34385dc2452448d19b50105fcf4b9ca4f296eed5aa537a5ad7cdd901482c32ba366ee12b335754c70589f9fd38524097ec2f9df8e1a12ecb96a8cd4474f484eda4c52f3bff229bc8d025ec56d26b748e84a7f02efbe0aff0a37e54bcdf55db908b1dee2feefa1593ea9f7079ee0d95d313426180eacc0a5e60b2c5454f68b899f4f7c4ef5e282dbbf58014183df8f65fb678103934dd2e5292ea1100900b64fb8dfe2270f936c97f7764e40c4db9670d345a140b3ce8fabba2dcb94f7d8e560c7ab3bc7956750c217b5c7407101eced8b6e157a2b7d99447a7cbe5d5d0187f8826f495cd2ff29b694819d3c2dba1e68d7badd5737eb9910ff975a283dbc63f3cf0724bf3e7a5202256b6184b76a3333ca92edfa97b79e54aadb20b7ff0ee6d082626376163ce661f60e368c6640e345eb0c86c4898e0a4148d458c31ea711bf4e3935df03907f66d1be088fee46b91d5618c84fb6c32ca0129ed2cfbc0daf33af12313f061edb1261a4d6501568f6f12a74ea3f986a47c150c078ee2d7f45044735a7e9bc486ee57ec845e7b18d204cfd53596230ecff8fb7b13abae7fd1028d3313aec7c9cc01c9ae2002d53d743b9fdae837630a5a1fd17e2832250f0501041ec8c7f89c01d17ad980b6cce94fd6e958a9ae7efb65dea795a90ab6ccf92fccb890aed69c344a0d87f75cf3a873c70d7c6dbd0b9a838dc6e94d02fdb10fb93948a0aaf73090abeaef969df0c7218be50c91db95affe4cda57af28df28bc53a2745af7926a934a41f27965c06880e29ec59c5cac473b9a1d9df242b492665ba44780e1003794eb3652954ab772d3accec165a9346f0c28b3ba473d35913608c61dbf4eca1fb50465514a4cec375d7ff5d1eff8be53ec4888e3e35ead2d894995719879e750db6b81af05f4c745289c4c640153603ce3428500a9c8d37fadcfb984f4619555aa88d911576a7e19f46f972533429ab869ccb54802ecd23b0904c6adc908165d1ffe0a60fea2203294d824568059a2b4a650322d9ec5f63591e9cbe12d890ca72921c427b9c138afc358e634d8c9e3b3ca96ecf798f7ed0f0d7f450baeeea6425402f53bdd4950b7181cfd935cabe7e02b5c4ec7a8d60b8f2d2e06a8b91b320aac2fc826dbb638fde7850a93dc0dbf7c0edaf21dd85f35d8e81909836b698caed2a4e22761b52e6688e3d7421cf46fb9d894e4bbf519167db2109d310d5990d99f2e8f79c292a3d8d462b1f4fd68ba4404ffa2175cca3dda9455a62c09516c8cb9fba97c4cb9b2bb61e7fa6dedd102c804efe8c72b37ef38611d7fefb2018c7833406e7589a8bd3f0183213609ffddc81fabb2b64e432b491d2f60ba3933b488698fd702ad0433619a1bbc0551b28ecad9350a01ffe17a2492e94b7ed51c1e29a2fe4cb67c19eed84a51bf01774097cca0149cd7c3683119b2408c09e3a083afb594450cfa7e25514", 0xd01}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r1, 0x10099b8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 08:13:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(0x0, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000600)='./bus\x00', 0x0, 0x3, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {&(0x7f0000002b80)="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", 0xd01}], 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r1, 0x10099b8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 08:13:45 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="2c00000084"], 0x3c}, 0x0) 08:13:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='vegas\x00', 0x6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='cubic\x00', 0x4) 08:13:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x4, &(0x7f0000003d40)=[{0x0, 0x0, 0x1}, {0x0}, {0x0}, {0x0}], 0x0, 0x0) umount2(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1801, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x3a5, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 1417.808921][T10857] loop4: detected capacity change from 0 to 16 [ 1417.888726][T10857] FAT-fs (loop4): bogus number of FAT sectors [ 1417.937922][T10857] FAT-fs (loop4): Can't find a valid FAT filesystem 08:13:46 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000440)='\x00', 0x1}], 0x1) readv(r0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/197, 0xc5}], 0x1) 08:13:46 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000200), &(0x7f0000000100)=0x90) 08:13:46 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, &(0x7f0000000300)="96", 0x1, 0x0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 1418.091923][T10857] overlayfs: './bus' not a directory 08:13:46 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) bind$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 08:13:46 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 08:13:46 executing program 4: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000640)='cubic\x00', 0x4) 08:13:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001640)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001600)=[@authinfo={0x10}], 0x10}, 0x0) 08:13:49 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@init={0x14}, @sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @empty}, @sndrcv={0x2c}, @sndinfo={0x1c}, @init={0x14, 0x84, 0x1, {0x0, 0x380}}, @sndrcv={0x2c}], 0xd4}, 0x0) 08:13:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='vegas\x00', 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 08:13:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x0, 0x1, 'C'}, 0x9) 08:13:49 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000000)=ANY=[], 0xa) 08:13:49 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000300)={0x0, @in, 0x0, 0x0, 0x312}, 0x98) 08:13:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000000500)=[{&(0x7f00000000c0)="89", 0x1}], 0x1, &(0x7f0000000540)=[@prinfo={0x14}], 0x14}, 0x0) 08:13:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xd8}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0xb) 08:13:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:49 executing program 0: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 08:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000000)="e01d2b9365b2450c5aade77c5d117ce0f1eb4cc385854a337fdba29f525962fc62a389bc8159828e056997ee855f1c2c9c23bdf309abb7090b5b19bb5455ecd190ef6e5f654833ea6d5dd01b0075c7e9524512ceb1488a2f776ec07520b1866eb4cda6b3f45b8895d81c15290024d36c08fdcdbdd578bf9a727c781e721d99ba978e7f540e98b8d5", 0x88) 08:13:49 executing program 2: openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x2) syz_open_dev$loop(&(0x7f0000000000), 0x1, 0x200) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab45896ddae6e336, 0x0, 0x0, "7d1f737a6879dd65d00d5d5218fa7e9e75f245d853c44f9cbd00de65c7f42268e558fefc5f7d64f7700f563d3c25a9dc09c559c8029d903093d7e310980fd481", "9e000d3d652c926b292f887f17e676b49c1330e2c786b891325deca10aa0a27ee866814e5642405623967b56e76dbcff4c6c0b2edeec865d6842442d205a6319", "63dc465ace95f8b8f03c6f3afd90bea7e2cd3d44feb705fc3fe582b0d3a412ec", [0x1, 0x3]}) 08:13:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@ipv6_getnetconf={0x1c, 0x52, 0x1, 0x0, 0x0, {}, [@NETCONFA_IFINDEX={0x8}]}, 0x1c}}, 0x0) 08:13:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="50000000090601010000000000d40000000011000500010006f20000200008801c0007801800018009000000ff0100000000000000faff000a47000008000940000000000900020073797a30"], 0x50}}, 0x0) 08:13:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$alg(r0, &(0x7f0000000040)=""/125, 0x7d) [ 1421.292805][T10970] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 08:13:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000017c0)={{}, {}, 0x0, {0x2, 0x0, @local}, 'macvlan1\x00'}) 08:13:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/net\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 08:13:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:49 executing program 2: syz_emit_ethernet(0x9e, &(0x7f0000000740)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00\x00@', 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a80502"}, {0x0, 0x1, "000005000000000000fac600"}]}}}}}}, 0x0) 08:13:49 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "7d1f737a6879dd65d00d5d5218fa7e9e75f245d853c44f9cbd00de65c7f42268e558fefc5f7d64f7700f563d3c25a9dc09c559c8029d903093d7e310980fd481", "9e000d3d652c926b292f887f17e676b49c1330e2c786b891325deca10aa0a27ee866814e5642405623967b56e76dbcff4c6c0b2edeec865d6842442d205a6319", "63dc465ace95f8b8f03c6f3afd90bea7e2cd3d44feb705fc3fe582b0d3a412ec"}) 08:13:49 executing program 0: r0 = mq_open(&(0x7f0000000040)='\xae:@\'-\\\x84%\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 08:13:49 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') setns(r0, 0x2000000) 08:13:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(r0, 0x0, 0x3, 0x0, &(0x7f0000000040)) 08:13:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffd87, 0x0}, 0x2001) 08:13:49 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop2', 0x515c01, 0x0) 08:13:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@ipv4_delrule={0x24, 0x21, 0x1, 0x0, 0x0, {0x2, 0x0, 0x4}, [@FRA_SRC={0x8}]}, 0x24}}, 0x0) 08:13:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000000)=@bridge_delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x2}, [@NDA_DST_MAC={0xa}]}, 0x28}}, 0x0) 08:13:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="89000000120081ae08060c0f006b3f007f03e3f70000000000e2ffca1b1f0000000000000072f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c00010003080800bdad446b9bbc7a46e3988285dcdf12f213d3f868fece14955fed0009d78f0a947ee2b49e33538afa8af92347510f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 08:13:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:50 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) 08:13:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:50 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x44) 08:13:50 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 08:13:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:50 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:50 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000, 0x0) [ 1422.259209][ T1355] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.265656][ T1355] ieee802154 phy1 wpan1: encryption failed: -22 08:13:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000300)={&(0x7f0000000240), 0xc, 0x0}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0), 0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001100), 0x20000, 0x0) 08:13:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$int_out(r0, 0x0, 0x0) 08:13:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:50 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x2}, 0x1c) 08:13:51 executing program 3: socketpair(0x2c, 0x3, 0x10001, &(0x7f0000000000)) 08:13:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:51 executing program 4: close(0xffffffffffffffff) r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 08:13:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x50aa, 0x0, 0x200}, 0x98) 08:13:51 executing program 1: getsockopt$inet_udp_int(0xffffffffffffffff, 0x88, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000400)=ANY=[@ANYBLOB="54000000100003052bbd7000249d020000000000", @ANYRES32=0x0, @ANYBLOB="1500000001000000240012800b0001006d61637365630000140002800500060001000000050007000100000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB], 0x54}}, 0x0) 08:13:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000002fc0)={0x4, 0x1, &(0x7f0000002dc0)=@raw=[@func], &(0x7f0000002e40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffea, 0xffffffffffffffff}, 0x61) 08:13:51 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f00000000c0)=@default) 08:13:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:51 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000200)) 08:13:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="fa4921364b6b649c934bfb1000000000c914fbeb2d6dbc6b"]}) 08:13:51 executing program 4: syz_emit_ethernet(0x76, &(0x7f0000000200)={@broadcast, @empty, @val, {@ipv4}}, 0x0) [ 1423.626518][T11117] device wlan0 entered promiscuous mode [ 1423.634795][T11117] device wlan0 left promiscuous mode [ 1423.732333][T11124] device wlan0 entered promiscuous mode [ 1423.741277][T11124] device wlan0 left promiscuous mode 08:13:52 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f00000002c0)={0x5}, 0x0, 0x0) 08:13:52 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x40002061) 08:13:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@RTM_GETNSID={0x14, 0x5a, 0x1}, 0x14}}, 0x0) 08:13:52 executing program 4: syz_genetlink_get_family_id$nl802154(&(0x7f00000008c0), 0xffffffffffffffff) 08:13:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:52 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e1, 0x0) 08:13:52 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="498e33a531fa912da9123ef5badb7e", 0xf}, {&(0x7f00000001c0)="c8", 0x1}], 0x2, &(0x7f0000000540)=[{0x18, 0x0, 0x0, '?'}, {0x10}], 0x28}, 0x0) 08:13:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@private0, @empty, @ipv4={'\x00', '\xff\xff', @private}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x880220}) 08:13:52 executing program 4: setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, 0x0, 0x0) 08:13:52 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000100)={@multicast, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 08:13:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:52 executing program 4: write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e02", 0x11) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/5, 0x5}], 0x1, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @remote}}) 08:13:52 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8940, &(0x7f0000000040)) 08:13:52 executing program 1: bpf$PROG_LOAD(0x10, &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 08:13:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000006c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 08:13:53 executing program 0: r0 = socket(0x2, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000180)=@abs, 0x8, 0x0}, 0x0) [ 1424.935314][T11186] device syzkaller1 entered promiscuous mode 08:13:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:53 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred, @cred, @rights, @cred, @cred, @cred, @cred, @cred], 0xf0}, 0x0) 08:13:53 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)='\b', 0x1}], 0x1, &(0x7f00000002c0)=[@cred, @cred, @rights, @cred, @cred, @cred, @cred, @cred], 0xf0}, 0x0) 08:13:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x41, 0x0, 0x0) 08:13:53 executing program 3: r0 = socket(0x2, 0x3, 0x0) select(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 08:13:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) symlinkat(&(0x7f0000000200)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0/file1\x00') mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file1\x00', 0x0, 0x0) 08:13:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:53 executing program 1: getrusage(0x1, &(0x7f0000000300)) 08:13:53 executing program 0: r0 = openat$bsg(0xffffff9c, &(0x7f0000001680), 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x48010, r0, 0x0) 08:13:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:53 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 08:13:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:54 executing program 3: r0 = openat$bsg(0xffffff9c, &(0x7f0000001680), 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) 08:13:54 executing program 4: r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='changehat 0'], 0x26) 08:13:54 executing program 0: socket(0x10, 0x2, 0x400001) 08:13:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x891f, &(0x7f0000000640)={'syztnl1\x00', 0x0}) 08:13:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:54 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000100)="a1e230b6", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="000314000004000000000000a90600292ce9fc35293bff3b8a5c407b5a260b10b54acff7ae940000007f4d6a406e1153488b11610c"], 0xfdef) 08:13:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000200)="01000000000000000101") 08:13:54 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) setreuid(0x0, 0xee01) mincore(&(0x7f000042c000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/190) 08:13:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0xc, &(0x7f00000002c0)) [ 1426.168033][T11259] AppArmor: change_hat: Invalid input '0' [ 1426.366400][T11276] autofs4:pid:11276:validate_dev_ioctl: invalid path supplied for cmd(0x0000937e) 08:13:54 executing program 0: syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2c42, &(0x7f0000000700)) 08:13:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x45}]}) 08:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0xc, &(0x7f00000002c0)) 08:13:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{}, {0x8}]}) 08:13:55 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000340)="200000004000000003000000300000000f000000000000040000000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002000028", 0x5d, 0x400}], 0x10801, &(0x7f0000000300)=ANY=[]) 08:13:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000004240)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[{0x28, 0x0, 0x0, "59051cc91ad292feb82cb3367764390450"}], 0x28}}, {{&(0x7f0000000640)=@generic={0x0, "5a7a02bded24edea74e6a708b51cde25deb3ec614960aa32476455d1bf3004e6753276f46b4e8d2d5dd66b94feee7fd909ea8e44440785b443b214ff1069489a23644ae45f22ddc3708045fa92b32488cec6ab870d25dac4a314d2a741605e5b0e390cd20c3f141aa67f41d0db8c6b564c68e9e75851b537c87dce1f9284"}, 0x80, &(0x7f0000001b80)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000001c40)=[{0x28, 0x0, 0x0, "501453cbbe359292a9a83b5e44b5cdb039"}], 0x28}}], 0x2, 0x0) 08:13:55 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000014c0)={0x1, &(0x7f0000001480)=[{0x94}]}) 08:13:55 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000040)=0x1) 08:13:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000014c0)={0x1, &(0x7f0000001480)=[{0x94, 0x0, 0x0, 0x81}]}) 08:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() rt_sigqueueinfo(r0, 0xc, &(0x7f00000002c0)) 08:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='dots,check=strict,dots,nodots,errors=continue,nodots,nodots,usefree']) [ 1427.425377][T11324] FAT-fs (loop3): bogus number of reserved sectors [ 1427.431922][T11324] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1427.499035][T11324] FAT-fs (loop3): bogus number of reserved sectors [ 1427.508276][T11324] FAT-fs (loop3): Can't find a valid FAT filesystem 08:13:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:56 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r0, 0xdb211000) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000001000)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x38020}, 0xc, &(0x7f0000000440)={&(0x7f0000000700)=ANY=[@ANYBLOB="3ae2a8b7009479613b72d4b4c3c8c9bddc000000000000000000176e72a90c41e0970cdc1dce7ff190d5aef6fbd4349bd104a6a8d22d70c2f71109a2cbb0a8799c1ad202bd85f0c6b74342e0c9", @ANYRES16=0x0, @ANYBLOB="000427bd7000ffdbdf2511", @ANYBLOB="08003c000010000009002900c1fdc4855f95d201000000080003fdd5", @ANYRESOCT, @ANYBLOB="00003cf600000000004e76401500bfd169cfb149642d64844cd3b7467c93b8358782e8c595afd7402ab2d023c111ddf0ac56458f8b8a073589fb29d1dd0a0f8d3e83e5bdcb9e16bbef0f1fbbda"], 0x44}, 0x1, 0x0, 0x0, 0x24000885}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="80030000", @ANYRES16=0x0], 0x180}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000a80)={0x154, 0x0, 0x1, 0x70bd29, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0xc4}, {0x6, 0x11, 0x7fff}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x8}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0xff}, {0x6, 0x11, 0x7434}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x7}, {0x6, 0x11, 0x101}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x8}}]}, 0x154}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f00000005c0)={0x2c, 0x20, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1, @ra={0x5, 0x2, 0x8000}, @generic={0x1, 0xd4, "7963600bf801a44c019e53339e3e60973d11663f5559f2dd6f4595edfd4e2deeab7422ca12200da34a09271ab1dbaf0d6ec7e7472e2324b6602fab16757486878dfe174bd17fce27abd86599c90411ddc26e3783f969ec933de776e3dffb12ee586186310349aafc84dff568985b62941e42c5d06557c757e4ce1ced901eec14b29a3c74bf4084fd94f70cc16fe9efa4a5408ab23f28cbd9124614d8c47b25b1ddd1e0a13d136004dffdb327e103766ec40b639f94289baee725997015aee34841e44dd838f871f1497a1d6109bd2c3c31cdb471"}, @calipso={0x7, 0x18, {0x15a96027caa7576d, 0x4, 0x6, 0xfffc, [0xffffffff, 0x6]}}]}, 0x110) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',afid=0x0000000000008001,version=9p2000.u,access=', @ANYRESDEC=0xee00, @ANYBLOB=',version=9p2000.L,cachetag=wfdno,debug=0x0000000000000080,dfltuid=', @ANYRESHEX=0x0, @ANYBLOB='\x00\x00\x00']) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)={0xa, 0x4e20, 0x80000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}, 0x1c, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRESOCT], 0x28}, 0x0) ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) 08:13:56 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001980)=ANY=[@ANYBLOB="90130000", @ANYRES16=r0, @ANYBLOB="010000000000030000000500000070000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164763000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300020000001400020073797a6b616c6c657231000000000000140002006e72300000000000000000000000000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB="3c0103804b0005"], 0x1390}}, 0x0) 08:13:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:56 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0x80, 0x4e, 0x8}) 08:13:56 executing program 3: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x0, &(0x7f0000001b40), 0x0, &(0x7f0000001dc0)=ANY=[@ANYBLOB='nfs,']) [ 1427.997086][T11347] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 1428.030019][ C1] sd 0:0:1:0: tag#8011 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 1428.040032][ C1] sd 0:0:1:0: tag#8011 CDB: opcode=0xe5 (vendor) [ 1428.046507][ C1] sd 0:0:1:0: tag#8011 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 1428.055588][ C1] sd 0:0:1:0: tag#8011 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 1428.064964][ C1] sd 0:0:1:0: tag#8011 CDB[20]: ba 08:13:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:56 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000640)=""/219, 0xdb}], 0x1, 0x80000001, 0x0) [ 1428.126842][T11355] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 08:13:56 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42440, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x106502, 0x72) [ 1428.211957][T11350] FAT-fs (loop3): bogus number of reserved sectors [ 1428.239951][T11350] FAT-fs (loop3): Can't find a valid FAT filesystem 08:13:56 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1428.394713][T11350] FAT-fs (loop3): bogus number of reserved sectors [ 1428.414306][T11350] FAT-fs (loop3): Can't find a valid FAT filesystem [ 1428.428265][ T26] audit: type=1804 audit(1634372036.625:189): pid=11365 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir776057671/syzkaller.H9RjUs/154/file0" dev="sda1" ino=15122 res=1 errno=0 08:13:56 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) readahead(r0, 0x0, 0x0) 08:13:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) [ 1428.544944][T11373] ptrace attach of "/root/syz-executor.5 exec"[11372] was attempted by "/root/syz-executor.5 exec"[11373] 08:13:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:57 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:57 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x42440, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0xb69cb65ea7c6dc55) 08:13:57 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) [ 1429.053841][T11392] ptrace attach of "/root/syz-executor.5 exec"[11389] was attempted by "/root/syz-executor.5 exec"[11392] 08:13:57 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, &(0x7f0000000080), 0x0, 0x4) 08:13:57 executing program 5: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:57 executing program 1: perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x7c00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1}, 0x40) 08:13:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:57 executing program 4: perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x42808}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:13:57 executing program 0: socketpair(0xa, 0x6, 0x9, &(0x7f0000002600)) 08:13:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1429.365644][T11408] ptrace attach of "/root/syz-executor.5 exec"[11406] was attempted by "/root/syz-executor.5 exec"[11408] 08:13:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f00000001c0)}, 0x20) 08:13:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)=""/131}, 0x20) 08:13:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:13:57 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 08:13:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000940)={0x0, 0x2a, 0x0, 0x4}, 0x8) 08:13:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x80}, 0x14) 08:13:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:13:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) sendto$inet(r1, 0x0, 0xb, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 08:13:58 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 08:13:58 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000200), &(0x7f00000002c0)=0x90) 08:13:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:13:58 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000001e00)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="8d", 0x1, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)='z', 0x1, 0x0, 0x0, 0x0) 08:13:58 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:13:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1, &(0x7f0000000400)=[@init={0x14, 0x84, 0x1, {0x0, 0xac, 0x6}}], 0x14}, 0x0) 08:13:58 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000580)="9a", 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 08:13:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 08:13:58 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040), 0x10) 08:13:58 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101}, 0x38) 08:13:59 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x383}, 0x98) 08:13:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000880)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 08:13:59 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101}, 0x38) 08:13:59 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:13:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000680), 0x14) 08:13:59 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xffffff27, 0x1c, 0x2}, 0x1c) 08:13:59 executing program 0: bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101}, 0x38) 08:13:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f00000001c0)=@in={0x10, 0x2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1, &(0x7f0000000400)=[@init={0x14, 0x84, 0x1, {0x0, 0xac}}], 0x14}, 0x0) 08:13:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:13:59 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000001c0)={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x40082) 08:13:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:13:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000340)="c8f5d52ce7638f5086d5abe260562f38312a65c8c695f094cee973d744510e985ddac9c1660b7bdd3508df85dd09c30de39a5b9224c1153795e07a79946f640a2cb2873f6133f7ba6fb5cea9b16d41e4b874ff6eed98d01ece37baf14453a8fd6a656306aa166ee6aa4e7d71c35f04db562aeb60d68adb55732f747d8b5e6b8151ca459c2c73302829471e6e585983fbe07f493342c49c37db70d15cf61b5a5ee0e0a6389add97173add2ae0e385aef25890be298b2e1714fd7dbcca", 0xbc, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket(0x1c, 0x10000001, 0x0) dup2(r1, r0) 08:14:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:00 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000300), &(0x7f00000003c0)=0x8c) 08:14:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@sndinfo={0x1c}, @sndrcv={0x2c}], 0x48}, 0x0) 08:14:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:00 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000001e00)={0x1c, 0x1c}, 0x1c) 08:14:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:00 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f00000002c0)="ec", 0x1}], 0x1) 08:14:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:00 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 08:14:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:01 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000002c0), 0x8) 08:14:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:01 executing program 4: r0 = epoll_create(0x6) epoll_pwait(r0, &(0x7f00000003c0)=[{}], 0x1, 0x0, 0x0, 0x0) 08:14:01 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x37a}, 0x0, 0x0) 08:14:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:01 executing program 4: open$dir(&(0x7f0000000240)='./file0\x00', 0x2140, 0x0) 08:14:01 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x145400, 0x0) 08:14:01 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@private1, @in6=@local}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000001880)=0xfffffffffffffe2b) 08:14:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:01 executing program 4: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 08:14:01 executing program 1: pipe(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create(0x8001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 08:14:01 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:01 executing program 3: r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) fstat(r0, &(0x7f0000000100)) 08:14:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:01 executing program 4: stat(&(0x7f0000000140)='.\x00', &(0x7f0000000180)) 08:14:02 executing program 3: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 08:14:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:02 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:02 executing program 4: pipe(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) 08:14:02 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0), &(0x7f0000000340)={0x0}) 08:14:02 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmdt(r1) 08:14:02 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x2000) 08:14:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 08:14:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) accept$inet6(r0, 0x0, 0x0) 08:14:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:02 executing program 4: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:14:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 08:14:02 executing program 1: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 08:14:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:02 executing program 3: mount$9p_virtio(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x883008, 0x0) 08:14:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:02 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) getsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000000), &(0x7f0000000280)=0x4) 08:14:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000000740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 08:14:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40), 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:03 executing program 4: shmget$private(0x0, 0x4000, 0x40, &(0x7f0000ffc000/0x4000)=nil) 08:14:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40), 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6, @random="abbf3a3ed1fa"}, 0x10) 08:14:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:03 executing program 3: getgroups(0x0, &(0x7f0000000080)) 08:14:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x1, 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000280), r0) 08:14:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40), 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1600bd60, 0x0, &(0x7f0000000040)) 08:14:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f000000e740)=[{{&(0x7f0000002740)={0xa, 0x4e22, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000004800)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 08:14:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x13, 0x8, 0xa41, 0x0, 0x180}, 0x40) [ 1435.557315][T11787] device team0 entered promiscuous mode [ 1435.563027][T11787] device team_slave_0 entered promiscuous mode [ 1435.569997][T11787] device team_slave_1 entered promiscuous mode [ 1435.584861][T11786] device team0 left promiscuous mode [ 1435.590576][T11786] device team_slave_0 left promiscuous mode 08:14:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 08:14:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x22, 0x0, &(0x7f0000000040)) 08:14:03 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$XDP_UMEM_REG(r0, 0x10e, 0x4, 0x0, 0x7) 08:14:03 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:03 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x9, 0x0) [ 1435.602885][T11786] device team_slave_1 left promiscuous mode 08:14:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000006500)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x40) 08:14:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 08:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:04 executing program 4: r0 = socket(0x11, 0x3, 0x0) recvmsg$unix(r0, &(0x7f0000006300)={0x0, 0x0, 0x0}, 0x2042) 08:14:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000980)={&(0x7f0000000180)={0xa, 0x4e22, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000740)=[@rthdrdstopts={{0x18}}, @dstopts_2292={{0x18}}], 0x30}, 0x0) 08:14:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) 08:14:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x16, 0x0, 0x0) 08:14:04 executing program 4: bpf$MAP_CREATE(0x10, &(0x7f0000000000), 0x40) 08:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x141001, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) 08:14:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f0000000100)) 08:14:04 executing program 4: semget$private(0x0, 0x4, 0x509) 08:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000013c0)="10", 0x101, r0}, 0x38) 08:14:04 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x5) 08:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:04 executing program 4: sysinfo(&(0x7f0000000140)=""/240) 08:14:04 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 08:14:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), 0x0, 0x101, r0}, 0x38) 08:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:05 executing program 4: r0 = socket$inet6(0x18, 0x1, 0x0) flock(r0, 0x0) 08:14:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), 0x0, 0x101, r0}, 0x38) 08:14:05 executing program 3: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000000), 0x4) 08:14:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:05 executing program 1: rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f00000001c0)={0x0, 0x3938700}, 0x8) 08:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), 0x0, 0x101, r0}, 0x38) 08:14:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xe, &(0x7f0000000140), 0x4) 08:14:05 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @private}, 0x8) 08:14:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000003cc0)=""/19, 0x13}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0), 0x101, r0}, 0x38) 08:14:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000019c0)=@v1={0x0, @adiantum, 0x0, @desc4}) 08:14:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001600)={0x2020}, 0x2020) 08:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000003cc0)=""/19, 0x13}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:05 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000540)) 08:14:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0), 0x101, r0}, 0x38) 08:14:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:05 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @aes128, 0x0, @desc4}) 08:14:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001800)={0x2020}, 0x2020) 08:14:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{&(0x7f0000003cc0)=""/19, 0x13}], 0x1}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0), 0x101, r0}, 0x38) 08:14:06 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000019c0)=@v1={0x0, @adiantum, 0x4, @desc4}) 08:14:06 executing program 3: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x1ea1470be0c5a67b, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1}}]}}, &(0x7f0000000240)={0x0, 0x0, 0x5, &(0x7f0000000100)={0x5, 0xf, 0x5}}) 08:14:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:06 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x6, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff}) 08:14:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x0, r0}, 0x38) 08:14:06 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_int(r0, 0x29, 0x19, 0x0, &(0x7f0000000480)) 08:14:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x101, 0x101, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}]}}, 0x0, 0x11e}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x101, 0x101, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}]}}, 0x0, 0x11e}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1438.414210][T31825] usb 4-1: new high-speed USB device number 63 using dummy_hcd 08:14:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x0, r0}, 0x38) [ 1438.673577][T31825] usb 4-1: Using ep0 maxpacket: 8 08:14:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f0000001700)) 08:14:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x0, r0}, 0x38) 08:14:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x101, 0x101, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}]}}, 0x0, 0x11e}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1438.895180][T31825] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1439.094269][T31825] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1439.103629][T31825] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1439.111655][T31825] usb 4-1: Product: syz [ 1439.120317][T31825] usb 4-1: Manufacturer: syz [ 1439.125286][T31825] usb 4-1: SerialNumber: syz [ 1439.392280][T31825] usb 4-1: USB disconnect, device number 63 [ 1440.163471][ T20] usb 4-1: new high-speed USB device number 64 using dummy_hcd [ 1440.403410][ T20] usb 4-1: Using ep0 maxpacket: 8 [ 1440.604038][ T20] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1440.773768][ T20] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1440.783032][ T20] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1440.791138][ T20] usb 4-1: Product: syz [ 1440.795454][ T20] usb 4-1: Manufacturer: syz [ 1440.800711][ T20] usb 4-1: SerialNumber: syz 08:14:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="38130000", @ANYRES16, @ANYBLOB="01"], 0x1338}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001900), r0) 08:14:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:09 executing program 1: syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x418}}}}}]}}]}}, 0x0) 08:14:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101}, 0x38) 08:14:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0xb00000000065808, 0x0) [ 1441.055780][ T20] usb 4-1: USB disconnect, device number 64 08:14:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101}, 0x38) 08:14:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:09 executing program 3: syz_mount_image$udf(&(0x7f0000001680), &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaabd2, &(0x7f0000001440)=[{&(0x7f0000000140)="0f34a39a71f7a127bef699c11fdf0d4a98a42d0b6bd467fe470631e2d6e5cdaf7bfc7ef1963e3dcf1fc838ffa2ac574b76b43bb07b4ed230ff178f178e5a1e8ab2e6d7d9002c6d2a8e71da6a1c23f2ed7572a247ccfa572e69058c58cf98e92e548233e294122a6c44ccc8363a6ae41587c3a15f6db1f1cceacfacd42117c13f7a612286167eab90fdc21e2bc785c120d5217b5ac018ac36a638acd79ca8d324817f3d3a92b0fdcb348c884f049cee1ea75c96cf", 0xb4, 0x7ffffffe}, {&(0x7f0000000200)="93f2fb3262582414a44d7db9d7eed1be770a98de58eee06c88115552657f60c8625cbf93fb996d132bb361fce4eed769978ca342f7582b761e182700fe6fb1d49cedea1da413527a3b5e3b770a6b1aa954be2e7aa29ab4c8a34ec438499fec2f8a7b1b395e1d3b497043c1700fedabc5597152b492f0da9dc193e4da9e4ac7d71d293a23e168d48872b6beb56154914bc71880eb1d693cd66b287530e2aaddf111c3c9c229835fcc3f42640ce8aa1faab757587703fa02b1d550", 0xba, 0x4}, {&(0x7f00000002c0)="98fce68eb84a80071c7cbec2cf182bf9b06e502fadfa6c888fe3bdeb2a5159ef4936f596712cfc0c40d277ab65fe30abad84e1f2d323cb361273e019bd6a734639de26ae126a92bb7b06f488c369fb48e64eb3465d746addb79694c1ebffe4e4c14ddf17118ead248b748f2c89867a797cd2ab68ba7a53b735b994b970b4068d7115e79563", 0x85, 0xa0000000000}, {&(0x7f0000000380)="9c96995130a5771a523ffbfabd8f330d6b73f5", 0x13}, {&(0x7f00000003c0)="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", 0x1000, 0x7}, {&(0x7f00000013c0)="663122732f21c794050ca2cdd56187945fa7fa2056b6b832f74ad00d1bb882be1670e2b9076833cc32698e9679e8836eb9512566ecd5f6ab48ae92cace18497c319576143ff477fa0f19eb0e626fea106900f63d82b0e8071fa74f3cb9012628f6feaa39890e16ca08aef5", 0x6b, 0x4}], 0x104820, &(0x7f0000001500)=ANY=[@ANYBLOB="756e682e4d407e221c0072000000617374626c6f636b3d303030303030303030303030010000000300000000000000657365743d2030303030303030303030d12a592611524d63df52bb5418c69a5e8487f2e3620485382c657569643d", @ANYRESDEC=0x0, @ANYBLOB="2c6d6561737572652c646566636f6e746578743d378e340aa20262f359cd72d7f273797361646d5f752c646566636f6e746578743d757365725f752c00"]) 08:14:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x4, 0xfa, 0x2}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000012c0), &(0x7f00000013c0)="10", 0x101}, 0x38) 08:14:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:09 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x28203, 0x0) 08:14:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1442.350286][ T26] audit: type=1804 audit(1634372050.545:190): pid=12036 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir776057671/syzkaller.H9RjUs/192/cgroup.controllers" dev="sda1" ino=14790 res=1 errno=0 [ 1442.411859][ T26] audit: type=1804 audit(1634372050.575:191): pid=12061 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir776057671/syzkaller.H9RjUs/192/cgroup.controllers" dev="sda1" ino=14790 res=1 errno=0 [ 1442.453456][ T26] audit: type=1804 audit(1634372050.575:192): pid=12064 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir776057671/syzkaller.H9RjUs/192/cgroup.controllers" dev="sda1" ino=14790 res=1 errno=0 [ 1442.753491][ T20] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 1442.993385][ T20] usb 2-1: Using ep0 maxpacket: 8 [ 1443.113465][ T20] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1048, setting to 1024 [ 1443.124821][ T20] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1443.293541][ T20] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1443.302615][ T20] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1443.310721][ T20] usb 2-1: Product: syz [ 1443.314940][ T20] usb 2-1: Manufacturer: syz [ 1443.319527][ T20] usb 2-1: SerialNumber: syz [ 1443.344924][T12074] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1443.571657][ T20] usb 2-1: USB disconnect, device number 14 [ 1444.353465][ T8489] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 1444.593371][ T8489] usb 2-1: Using ep0 maxpacket: 8 [ 1444.713433][ T8489] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1048, setting to 1024 [ 1444.728096][ T8489] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1444.894084][ T8489] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1444.903119][ T8489] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1444.916207][ T8489] usb 2-1: Product: syz [ 1444.920369][ T8489] usb 2-1: Manufacturer: syz [ 1444.926503][ T8489] usb 2-1: SerialNumber: syz [ 1444.962417][T12074] raw-gadget gadget: fail, usb_ep_enable returned -22 08:14:13 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 08:14:13 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:13 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000001140), 0x2, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 08:14:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000002080)='cpuset\x00') read$FUSE(r0, 0x0, 0x0) 08:14:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:13 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f00000000c0)={'bridge0\x00', @ifru_data=0x0}) [ 1445.191360][ T8489] usb 2-1: USB disconnect, device number 15 08:14:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000001140), 0x0, 0x0) mmap(&(0x7f0000eba000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) 08:14:13 executing program 3: r0 = socket(0x18, 0x0, 0x4) accept4$inet6(r0, 0x0, 0x0, 0x0) 08:14:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:13 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000012c0), 0x240b00, 0x0) fcntl$getown(r0, 0x9) 08:14:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:13 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/84, 0x54}, {&(0x7f00000000c0)=""/74, 0x4a}, {&(0x7f0000000180)=""/167, 0xa7}, {&(0x7f0000000240)=""/61, 0x3d}, {&(0x7f0000000300)=""/138, 0x8a}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/94, 0x5e}, {&(0x7f00000004c0)=""/115, 0x73}, {&(0x7f0000000540)=""/98, 0x62}], 0xa, &(0x7f0000001a40)=[{&(0x7f00000017c0)=""/234, 0xffffffeb}, {&(0x7f0000000280)}, {&(0x7f00000018c0)=""/254, 0xfe}, {&(0x7f0000000680)=""/46, 0x2e}, {&(0x7f00000019c0)=""/70, 0x46}], 0x5, 0x0) 08:14:14 executing program 1: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 08:14:14 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:14 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000001140), 0x2, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000000)) 08:14:14 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000000), 0x4) 08:14:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:14 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000003c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 08:14:14 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x4b0402, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40305828, 0x0) 08:14:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:14 executing program 0: syz_mount_image$sysv(&(0x7f00000001c0), &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001500)=[{&(0x7f0000000500)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000001540)) 08:14:14 executing program 3: r0 = socket(0x2, 0x3, 0x1) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, 0x0) 08:14:14 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25NOUID(r0, 0x890b, &(0x7f0000000040)) 08:14:14 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000005040), 0x20, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000180)={0x7, 0x8, [0x0, 0x0]}) 08:14:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:15 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 08:14:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25NOUID(r0, 0x8906, 0x0) 08:14:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'gretap0\x00', 0x0, 0x7, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}) 08:14:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:15 executing program 1: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000001f80), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION(r0, 0x79f, 0x0) 08:14:15 executing program 3: io_setup(0x9, &(0x7f0000000100)=0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) io_submit(r0, 0x2, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 08:14:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:15 executing program 0: semtimedop(0x0, &(0x7f0000000080)=[{}], 0x1, &(0x7f0000000100)) 08:14:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x801, 0xe, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x4c}}, 0x0) 08:14:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000740), r0) 08:14:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:16 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:16 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1cb) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t'], 0x3e) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 08:14:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) ioctl$SG_IO(r0, 0x1274, 0x0) 08:14:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:16 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$vcsn(0x0, 0x0, 0x0) openat2(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x64, 0x80, 0x0, 0x3, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x4000, 0x1, 0x9, 0x0, 0x5f7, 0x8, 0xe8cd, 0x0, 0x7, 0x0, 0x80000}, 0x0, 0x8, r1, 0x3) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) 08:14:16 executing program 1: ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, 0x0, 0x6e3cadae7aff0161) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000540)=@v1={0x0, @aes256, 0x0, @auto="f918457350067894"}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000400)={0x5, 0x80, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x100000000008, 0x6210, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}, 0x0, 0x10001, 0x59, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, 0x0, 0x0) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, 0x0, 0xffffffff}, 0x10) 08:14:16 executing program 4: syz_mount_image$romfs(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)) 08:14:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) ioctl$SG_IO(r0, 0x1274, 0x0) 08:14:16 executing program 0: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000780)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000980)={{0x0, 0x3938700}}, &(0x7f00000009c0)) 08:14:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:16 executing program 4: r0 = memfd_create(&(0x7f0000000780)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2>\xa1\x9c\x86x\x1c\x9f\x97\x87\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xb0\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xf5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\xd8\x87\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\b`\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fl\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \xe2\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd3M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdc\xfeA\x05Sn\xe6\xe8^\xdf\x8c`\x17\xca\xbd\\QG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x0f\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2t\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xaf\tC\x1cq\xaa\x92,Li\r\x95Z\x89\"\xaf]\x95\xb9b_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b\x8f\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca', 0x4) fallocate(r0, 0x0, 0x208042a, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 08:14:17 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) 08:14:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) ioctl$SG_IO(r0, 0x1274, 0x0) 08:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x5, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000001980), &(0x7f00000019c0)='./file0\x00', 0x0, 0x0, &(0x7f0000002dc0), 0x0, &(0x7f0000002e80)={[], [{@euid_gt}]}) 08:14:17 executing program 1: clock_getres(0x2, &(0x7f0000002580)) 08:14:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) 08:14:17 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) ioctl$SG_IO(r0, 0x1274, 0x0) 08:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x102}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:17 executing program 4: r0 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8001, 0x8, &(0x7f0000000580)=[{&(0x7f0000000080)="da05fba121309011d8cb184c1debaba2c1d39180853c2ae83d6cd2", 0x1b, 0x9}, {&(0x7f00000000c0)="4ffb7e07b14362a1097794dad5e64e7d033db6f46ab5b7c1e29c83ef79542b2a5afa0d68bd5cf5668305ea23d9bf800c813c5a2e95a056548b13bb7a5165e3ed87f53b03e6e5b799bcfcaab8081d6d107546f49cd5628ca7bf72b4e926d13f5dd7e5add0738812b42686ad49532267eaf3946b8bc30ac3a8ee52b7d84ebce9416ddb284a61a43915a8f7fc0874eb5084304c01e7dfa05fe23cf734ee192078b9ea04b51a86fb4a26c6b993420917675e4fcb0ab5106838cbd3e43bad355022eb8373d440aa089d058164063efe07e6b45a484ee2898d3909cbfc0d944c", 0xdd, 0xdaf}, {&(0x7f00000001c0)="042009a1e1ef8f817f7021a270276d26c7786a3a0d1fa8f1c37be4785e41765818efd3211dec4b7b8b39b4657d3f21bd1a9dd65517cb2749ef028af452ae7c3861b2d68fc8cce303ba1e27a9b4bdc37200c1808b11014ca686d39b153016b5442f1ee6ff46d22fbced3b3fb23a040838e67b1d3de139d74593818e78382d872409be3bdfa5fcdb3acecf44100e7c9eb1d7b547e44e77d69f54e93e835c9ec32cafb8099aad1abe0c099273e2318734701e4a5e7344eb0e8e28e313afccbab5b37906b06860f06f8e15a326c18e9230ace4f2e5d8f44e", 0xd6, 0x8}, {&(0x7f00000002c0), 0x0, 0x6}, {&(0x7f0000000300)="26c91d8777d64a54ecad28f1ab959a48f24b33646cbee5f73cf266313f465b0a2d3a269ca729c59dc6a3e73ff1a29d689f4d1e91a8911d358c553d8a05383e8343e264d7e2fa0c544066b22b3296612b8ec056284a8a7b54ec81", 0x5a, 0xffff}, {&(0x7f0000000380)="8d2599d0fce620962cbe5ae5ca1ce3a6e8ff5c3f5739c6958e8b4cdf6b36b3c31f370659d83f19542217bf62e65634910d0be9b947647e66aa415d10f813c8875548d03782e2eee54807a5412a58fa280595c8dcaccd6a720535dda06abe0df8e22191446c18fdf518b7c27383eb12feac94ffcd77c8173fcd2c1af4167c61581f036ed8b0842e465c72ebbb9a8f3230cd65fa50f73417a5e4d26b9f2e2b17b55420a3d3d7100b82d9e2ea8218a9e3b25ef453fe95b690e73d99a392a3", 0xbd, 0x800}, {&(0x7f0000000440)="dd51486d367a49244db3df87abdedf24c1ee0d05aa35df72b6b57ce0739bd346f48d085eea73ebb99304505b56cf4dff4803b8ac969d9f2a96a60b8392d95ddd7abb92ceb9cc51871ceec40ce19373c400f79a4cc8fcc6baab64265920feaf7ea7ec5d07f586ec8adea5869b1b7fb719b5716c12eae17fd3a2b01d46c04e3686863b814817b328c33a127757d2c48a315f2746fadd350af63cfde323bc71916a90dc72c6b568b16c0ab37eb6bca67482ce4125379ec2b9561bcfebe7d3b2087bd14f25494a58d65054a6eba191e611de0c534f1badca", 0xd6, 0x8000}, {&(0x7f0000000540), 0x0, 0xdb14}], 0x0, &(0x7f00000006c0)={[{@mode}, {@noadinicb}, {@umask}, {@bs}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}, {@iocharset={'iocharset', 0x3d, 'none'}}, {@partition={'partition', 0x3d, 0x7}}], [{@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x65, 0x33, 0x32, 0x34, 0x54, 0x39, 0x34], 0x2d, [0x0, 0x0, 0x0, 0x66], 0x2d, [0x0, 0x0, 0x36, 0x63], 0x2d, [0x0, 0x35, 0x30], 0x2d, [0x30, 0x0, 0x0, 0x39, 0x33, 0x37, 0x62]}}}, {@uid_gt={'uid>', r0}}, {@subj_type}, {@euid_gt}]}) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000840)) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0x0) 08:14:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) 08:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x102}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1449.240367][T12304] loop4: detected capacity change from 0 to 255 [ 1449.342895][T12315] loop4: detected capacity change from 0 to 255 08:14:17 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:17 executing program 3: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x7, 0x0, 0x7, 0x42f, 0x4}, 0x14) r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@isdn, &(0x7f0000000180)=0x80, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x0, 0x2, 0x4, 0xf4, 0x1}, 0x14) syz_mount_image$nfs(&(0x7f0000001700), &(0x7f0000001740)='./file0\x00', 0x7ff, 0x6, &(0x7f0000001b40)=[{&(0x7f0000001780)="15982fe33cff00d88717bf58d208c54a88dda3e284b4d674cbd2d2b10c29a0e4e27e", 0x22, 0xffffffff80000000}, {&(0x7f00000017c0)="f85652fb82d317e81d65e1", 0xb, 0xec8}, {&(0x7f0000001800)="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", 0xfe, 0xffffffffffff0000}, {&(0x7f0000001900)="1ff655eb6b43bccb632363c03c110db04aae5d69d8368187f4f76f7e0197bf092dbbee8a642d", 0x26, 0x3}, {&(0x7f0000001a80)="be78", 0x2, 0x4}, {&(0x7f0000001ac0)="40472c8ba52e784459425e0e57c195d91c7d01d5eb7c003e9e45d14bc7363b0d34ef874ab35d0f22742d3f7a9413b82fd4d3411954d088e3e6b5e9ca24954fe70d224d9aa785779737ab4c45a381af97914ab1bc3064083acb3f2f37d5d78051d812cd60eec7", 0x66, 0x800}], 0x3020, &(0x7f0000001c00)={[{'-$&%-,'}, {}, {}, {'/'}, {'&{n\\]'}], [{@dont_appraise}, {@dont_appraise}]}) mknodat(0xffffffffffffffff, &(0x7f0000001c40)='./file0\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000001c80)={0x16, 0x4, 0x10001, 0x10000, 0x1}, 0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000001f40)={&(0x7f0000001e40)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001f00)={&(0x7f0000001e80)={0x58, 0x0, 0x400, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x67}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2a4}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xffffffff}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}], @NL80211_ATTR_DURATION={0x8, 0x57, 0xdd28}, @NL80211_ATTR_DURATION={0x8, 0x57, 0xc9ef}]}, 0x58}, 0x1, 0x0, 0x0, 0x40001}, 0x4004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002200), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000002680)={'wlan0\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000027c0)=@file={0x0, './file0\x00'}, 0x6e) syz_mount_image$nfs4(&(0x7f0000002880), &(0x7f00000028c0)='./file0\x00', 0x9, 0x7, &(0x7f0000003d40)=[{&(0x7f0000002900)="b18e4146babc53e4f6973249daa2893cf4a3a2da5485ba0ab06c67640a08e358ff94a22acc5d97dd1ce193c74decd1f0aa4e132c966d1c9a082fe413eab9cf84b186a7ab95f11929881b90764b7755ef2d1253975c505c7c403dde541ddc145ea21b4d22cc1f45685c65a4060bddb0097f73f644a15b142daddc603bac95c097ef2d650812febc19b54d19a4773e7668a16da6c49291ac2142e1d70f20dfdd33356f124edc5b3ab6bd2aaf6ae824d318522cdeb7b74da8c5ea0baf096baef0423aa9e76b61a80747211b211d550fb4861758b8d40c6d30493501139ca2c41eaa551f74eae133077b177893723cefdd7ccb98db464b1237128baafd94fe", 0xfd, 0x4}, {&(0x7f0000002a00)="ed3e610c15522bc192d01bc5cc4f657c9b29579747e01dc1a9f4d4b73aff86596b05f9c0a5b43b683871f50f869ad14dadb24ecd60405d7f5a141b29407da2fa66daddb82c1642edfe3d1e18227690cc6d2f36f42b6deef833493cc1bd30e68779543468f5ddc8856815e6c78b709e785cfa57bec2d1bf1127ff8c7c84cf9dc24028a77f896eaad4e7ac2dafefab4745065407385044563344fa9d958dc4c988fba3a901aaf5fb05", 0xa8, 0x74}, {&(0x7f0000002ac0)="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", 0x1000}, {&(0x7f0000003ac0)="7f0bb182d73f1a090e57e4774f1eb50a4daacdcd8658379bf021b480f019f7c93bc68f195263ec5d39774a756a62d38470b7cd1f1e76ff280cd8228bfe64c2636d5f775940ac31d4b76194dbb063a2da2481932466fbc5d50a988392983a27eeb66daef3dac4ba01", 0x68, 0x7ff}, {&(0x7f0000003b40)="f4814feb054c2fe8bde83b3101bfd6b98218aec84988c17c544f82e6e2d20e14dace91c10979c4422f9bdef64dca9d4ab937e32d46d0d034d9cb3f03e4f6e4c942babffb8e70574d9c9eca63c8ee94a9626bebfed1ebd591d0f6b35ffdcec422dd4c29f71efe057a31a70a2a35c3d48d0b3a0b3f4315cba26e32a8c4ffef73f2999c3863a2d1ff8e94a399d0624d1d616a316942fdf11922f058368329564bef3157f64ff41f37200fcc7834c3b76e4f36586f6a900f46effc876441f23ea5c1fa7ef630f79d42", 0xc7, 0x1a2e4684}, {&(0x7f0000003c40)="f6f739f451a372d01b64a0046ae50fd0528584db7fee96cd99e4a3cd5328a19ae122fa6338467bfdeecb5231dd85e327f25e2c481f7d8d5a6f772abd87e6cdd26a7ba1d9cc9982a041cf5c04d0e99fce8880245ecff407fba285073802cfbe5725ceb98e4a103c61ed5b8e3483c605cf4a94be36423aa75864946534734912a368df71b5839a631397ecbe9e20b097304f7d88194b2c72491c4802bda775e4e2ad5955ac0afd3864a2667ae8670eec9db55820a8d444fd940bdfbb43b1", 0xbd, 0x8}, {&(0x7f0000003d00)="20498981a78647a0fd312a9031821d1b2eef882e1396ef0f33cf4851cad48f4c85cd24204e12b3bf357b4a7d1a0ae2", 0x2f, 0x100}], 0x40000, &(0x7f0000003e00)={[{'-$&%-,'}], [{@dont_hash}, {@audit}, {@smackfstransmute={'smackfstransmute', 0x3d, '/\''}}, {@smackfshat}]}) 08:14:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) 08:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x102}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x2, &(0x7f0000000000)=0xfff, 0x4) 08:14:17 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$netlink(r0, &(0x7f0000003f40), 0xc) [ 1449.836925][T12336] loop3: detected capacity change from 0 to 81920 08:14:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:14:18 executing program 0: ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x1275, 0x0) [ 1449.949055][T12336] loop3: detected capacity change from 0 to 130630 08:14:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40284504, 0x0) 08:14:18 executing program 0: ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x1275, 0x0) 08:14:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:18 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xff, 0x2, 0x89}, 0x40) 08:14:18 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000780)="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", 0xff0, 0x40000000011}]) 08:14:18 executing program 0: ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x1275, 0x0) 08:14:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd\x00') getdents64(r0, 0x0, 0x0) 08:14:19 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1450.824423][T12383] loop3: detected capacity change from 0 to 264192 08:14:19 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) 08:14:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) [ 1450.978844][T12383] loop3: detected capacity change from 0 to 264192 08:14:19 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1451.046073][T12401] loop4: detected capacity change from 0 to 4096 [ 1451.085550][T12401] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:19 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) 08:14:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x3}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 08:14:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1451.118322][T12401] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 08:14:19 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:19 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x1275, 0x0) [ 1451.416029][T12426] loop4: detected capacity change from 0 to 4096 [ 1451.438683][T12426] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1451.481107][T12426] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:19 executing program 3: mount$9p_fd(0x20000000, &(0x7f0000000000)='.\x00', 0x0, 0x1157, 0x0) 08:14:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="06ef", 0x2, 0x480}], 0x0, &(0x7f0000000180)={[{}]}) 08:14:19 executing program 0: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x1275, 0x0) 08:14:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 08:14:19 executing program 0: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x1275, 0x0) 08:14:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="0300000004", 0x5, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) mkdirat(r0, &(0x7f0000000380)='./file0\x00', 0x0) [ 1451.693990][T12447] loop4: detected capacity change from 0 to 4096 [ 1451.717547][T12447] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1451.785350][T12447] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 08:14:20 executing program 0: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x1275, 0x0) [ 1451.906707][T12459] loop3: detected capacity change from 0 to 4096 [ 1451.998602][T12459] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1452.028370][T12470] loop4: detected capacity change from 0 to 4096 [ 1452.062011][T12470] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1452.099447][T12470] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:20 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:20 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) io_setup(0x0, 0x0) io_setup(0x0, 0x0) 08:14:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000100)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x24, 0x80000001, 0x3, 0x2, 0x9, 0x5, 0x10001, 0xfffffff9}, 0x0) sched_setattr(r0, &(0x7f0000009a40)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)) sendfile(r3, r4, 0x0, 0x80000005) [ 1452.351559][T12492] loop1: detected capacity change from 0 to 4 [ 1452.469906][ T26] audit: type=1800 audit(1634372060.605:193): pid=12496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14902 res=0 errno=0 [ 1453.026661][T12492] erofs: (device loop1): erofs_read_inode: unsupported i_format 61190 of nid 36 [ 1453.283202][ T26] audit: type=1800 audit(1634372061.395:194): pid=12496 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14902 res=0 errno=0 [ 1453.327455][T12492] loop1: detected capacity change from 0 to 4 [ 1453.343489][T12492] erofs: (device loop1): erofs_read_inode: unsupported i_format 61190 of nid 36 08:14:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="06ef", 0x2, 0x480}], 0x0, &(0x7f0000000180)={[{}]}) 08:14:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 08:14:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:21 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) io_setup(0x0, 0x0) io_setup(0x0, 0x0) 08:14:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000100)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x24, 0x80000001, 0x3, 0x2, 0x9, 0x5, 0x10001, 0xfffffff9}, 0x0) sched_setattr(r0, &(0x7f0000009a40)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)) sendfile(r3, r4, 0x0, 0x80000005) 08:14:21 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1453.618608][T12517] loop4: detected capacity change from 0 to 4096 [ 1453.650925][T12517] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1453.787429][ T26] audit: type=1800 audit(1634372061.915:195): pid=12529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14913 res=0 errno=0 [ 1454.213438][T12517] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000100)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x24, 0x80000001, 0x3, 0x2, 0x9, 0x5, 0x10001, 0xfffffff9}, 0x0) sched_setattr(r0, &(0x7f0000009a40)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)) sendfile(r3, r4, 0x0, 0x80000005) 08:14:22 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:22 executing program 3: io_setup(0x7fff, &(0x7f0000000000)) io_setup(0x0, 0x0) io_setup(0x0, 0x0) [ 1454.512145][T12539] loop4: detected capacity change from 0 to 4096 [ 1454.568136][T12539] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1454.587526][T12539] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1454.824882][ T26] audit: type=1800 audit(1634372062.995:196): pid=12561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14484 res=0 errno=0 [ 1455.328061][T12564] loop1: detected capacity change from 0 to 4 [ 1455.345176][T12564] erofs: (device loop1): erofs_read_inode: unsupported i_format 61190 of nid 36 08:14:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') readv(r0, &(0x7f0000000b40)=[{&(0x7f0000001d40)=""/4096, 0x1000}], 0x1) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/54, 0x36}], 0x1, 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 08:14:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000100)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000000)={0x38, 0x2, 0x24, 0x80000001, 0x3, 0x2, 0x9, 0x5, 0x10001, 0xfffffff9}, 0x0) sched_setattr(r0, &(0x7f0000009a40)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e21}, 0x6e) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)) sendfile(r3, r4, 0x0, 0x80000005) 08:14:23 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1455.587648][T12575] loop4: detected capacity change from 0 to 4096 [ 1455.609873][T12575] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x80084503, 0x0) [ 1455.878787][ T26] audit: type=1800 audit(1634372064.075:197): pid=12602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=14771 res=0 errno=0 [ 1455.937109][T12603] loop4: detected capacity change from 0 to 4096 [ 1455.967734][T12603] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = dup(r0) lseek(r1, 0x2, 0x0) 08:14:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:24 executing program 3: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x30, r1, 0xf7cee5642e93e39, 0x0, 0x0, {{}, {}, {0x14}}}, 0x30}}, 0x0) [ 1456.399974][T12620] loop4: detected capacity change from 0 to 4096 [ 1456.425408][T12620] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:25 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:25 executing program 3: r0 = socket(0x2, 0x3, 0x7) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x2}, 0x63, &(0x7f0000000280)={&(0x7f00000001c0)={0x84, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8}, {0x57}}, {0x8}}}]}, 0x84}}, 0x6000000) 08:14:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f00000016c0), &(0x7f0000001700)=0x8) [ 1457.080379][T12638] loop1: detected capacity change from 0 to 4 [ 1457.099246][T12638] erofs: (device loop1): mounted with root inode @ nid 36. [ 1457.265880][T12651] loop4: detected capacity change from 0 to 4096 [ 1457.328782][T12651] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1457.360738][T12651] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000100)=@un=@file={0xa}, 0xa) 08:14:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x10) 08:14:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1457.769272][T12673] loop4: detected capacity change from 0 to 4096 [ 1457.810099][T12673] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1457.827700][T12673] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:26 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) [ 1458.162859][T12695] loop4: detected capacity change from 0 to 4096 [ 1458.196701][T12695] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1458.217883][T12695] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. [ 1458.317105][T12703] loop1: detected capacity change from 0 to 4 [ 1458.332413][T12703] erofs: (device loop1): mounted with root inode @ nid 36. 08:14:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000300), 0x4) 08:14:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}, @init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xc4}, 0x0) 08:14:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 08:14:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:27 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x40002) 08:14:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1459.134698][T12735] loop1: detected capacity change from 0 to 4 [ 1459.147480][T12735] erofs: (device loop1): mounted with root inode @ nid 36. 08:14:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000000c0)="e2e1f5e09521e93c020000000c0024", 0xf, 0x400}, {&(0x7f0000000480)="060045319544473344474521c1b0879e357d9f4e209e3a3357", 0x19, 0x480}], 0x0, &(0x7f0000000440)) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@random={'user.', 'erofs\x00'}, 0x0, 0x0) 08:14:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}, @init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast2}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xc4}, 0x0) 08:14:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:27 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x8) 08:14:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000300), 0x90) 08:14:27 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) [ 1459.531123][T12772] loop4: detected capacity change from 0 to 4096 [ 1459.629113][T12772] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1459.819739][T12787] loop1: detected capacity change from 0 to 4 [ 1459.835133][T12787] erofs: (device loop1): mounted with root inode @ nid 36. 08:14:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) socket$inet6(0xa, 0x6, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x8) 08:14:28 executing program 0: sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x24, &(0x7f0000000000), 0xfe6a) 08:14:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x7, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000240)={0x0, 0x0, 0xfffffffffffffcfe, '\x00'}, 0x9) [ 1460.017894][T12801] loop4: detected capacity change from 0 to 4096 08:14:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x121, 0x121, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x13e}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000000c0), &(0x7f00000001c0)=0x98) [ 1460.165803][T12801] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="ae", 0x1, 0x0, &(0x7f0000000080)={0x10}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='<', 0x1, 0x100, 0x0, 0x0) 08:14:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x121, 0x121, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x13e}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000000000)="48292d07e52f2c94eeccf5e14f81cd2b6b4c03548c036a0b70dc339219110e3744fa8d8e9fbb95b1731f682d3d0eb82ae9b339601cc307c61bbf65abed5be6607743ef9a380e9f0db9c78b129be4bc93c98694ed0619fc304a6286a5bc", 0x5d, 0x80, &(0x7f0000000080)={0x10, 0x2}, 0x10) [ 1460.527077][T12832] loop4: detected capacity change from 0 to 4096 [ 1460.567636][T12837] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 1460.592124][T12832] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x121, 0x121, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x13e}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0xbbe, 0x0, 0xa3c9}, 0x8) 08:14:29 executing program 0: select(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000004c0)=""/130, 0x82}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/6, 0x6}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r1, 0x0) select(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000780)={0x5}, &(0x7f00000007c0)={0x5}) shutdown(r2, 0x0) 08:14:29 executing program 4: sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:29 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x82) [ 1460.971169][T12857] loop4: detected capacity change from 0 to 4096 08:14:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, 0x0, 0x0) 08:14:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1461.053598][T12857] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:29 executing program 4: sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:29 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000240)='cubic\x00', 0x3) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='vegas\x00', 0x6) 08:14:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1461.372697][T12882] loop4: detected capacity change from 0 to 4096 [ 1461.437309][T12882] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) [ 1461.498913][T12882] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:29 executing program 4: sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1461.805313][T12908] loop4: detected capacity change from 0 to 4096 [ 1461.840641][T12908] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1461.907337][T12908] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00', @ANYRES32=0x0], &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 08:14:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:30 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000240)='cubic\x00', 0x3) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x4) 08:14:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000000c0), 0x8) 08:14:30 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0x5, 0x0, &(0x7f0000000040)) [ 1462.151783][T12936] loop4: detected capacity change from 0 to 4096 08:14:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)="ea", 0x1}], 0x1, &(0x7f00000004c0)=[@init={0x14}, @authinfo={0x10}, @authinfo={0x10}], 0x34}, 0x0) 08:14:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1462.269503][T12936] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000140), &(0x7f0000000180)=0x4) 08:14:30 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:30 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, 0x0, 0x0) 08:14:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:30 executing program 0: r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x3) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x4) 08:14:30 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket(0x2, 0x1, 0x0) r2 = dup2(r0, r1) listen(r2, 0x0) [ 1462.777652][T12975] loop4: detected capacity change from 0 to 4096 08:14:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180), 0x88) 08:14:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1462.904944][T12975] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:31 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000140)={@broadcast, @random="9a9f2ae5e8e3", @val, {@ipv6}}, 0x0) 08:14:31 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0xff}, 0x14) 08:14:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1463.248115][T13002] loop4: detected capacity change from 0 to 4096 [ 1463.320790][T13002] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1463.359253][T13002] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:31 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) 08:14:31 executing program 3: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1017, &(0x7f0000000180), 0x4) 08:14:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:31 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001340)=[@init={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) [ 1463.621230][T13023] loop4: detected capacity change from 0 to 4096 08:14:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@sndinfo={0x1c}], 0x1c}, 0x0) [ 1463.699170][T13023] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x8) 08:14:32 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:32 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cubic\x00', 0x4) [ 1464.141170][T13060] loop4: detected capacity change from 0 to 4096 [ 1464.229643][T13060] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r0, 0x0, 0x1b, &(0x7f0000000000), 0x4) 08:14:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[{0xc}], 0xc}, 0x0) 08:14:32 executing program 4: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:32 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f00000016c0), &(0x7f0000000280)=0xb0) [ 1464.590258][T13081] loop4: detected capacity change from 0 to 4096 08:14:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000200), 0x8) 08:14:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000780)=@in={0x10, 0x2}, 0x10) [ 1464.723759][T13081] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000580)=ANY=[@ANYBLOB="01"], &(0x7f00000000c0)=0x8) 08:14:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1465.069248][T13109] loop4: detected capacity change from 0 to 4096 [ 1465.124215][T13109] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1465.161431][T13109] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:33 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}], 0x1c}, 0x0) 08:14:33 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='htcp\x00', 0x5) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cdg\x00', 0x4) 08:14:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000000)=0xffffffff, 0x4) [ 1465.492149][T13124] loop4: detected capacity change from 0 to 4096 08:14:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:33 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket(0x2, 0x1, 0x0) r2 = dup2(r0, r1) sendto$inet(r2, &(0x7f00000001c0)="5d86cf0242ee79962a6c2ec5235b6786fc5633c56005a7f276864f90b5c8a82728d7ac5c82da17577f7051f40f5cdcddd06c8e7f70cc8ffdb3165f0c96375427c1ae79dabd4e7a9fb6ff21b0e5dac50869064549e31e369bc8306cb4ca8454d89c6d752e9013f29fce6e7866a5ee6f39d707a9c151212aec1f30db95507dc8dc21ca71628ebb9145d92e40e8794430ffedd96988c70d1a8a1ffff90b675acc68843365a93c294492f0a970800822cf8b77bbc399fad956267d4c636f", 0xbc, 0x100, &(0x7f00000000c0)={0x10, 0x2}, 0xd) 08:14:33 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0xffffffffffffffff}, 0x1c) sendto$inet6(r0, &(0x7f0000000bc0)='%', 0x1, 0x0, &(0x7f0000000cc0)={0x1c, 0x1c}, 0x1c) [ 1465.612139][T13124] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x149, 0x149, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x166}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000013c0)='cubic\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='cubic\x00', 0x6) [ 1466.009681][T13160] loop4: detected capacity change from 0 to 4096 [ 1466.072199][T13160] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000a00)={&(0x7f0000000300)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=[@sndrcv={0x2c}], 0x2c}, 0x0) 08:14:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x129, 0x129, 0x2, [@int, @array, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x146}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:34 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup(r0) connect$inet(r1, &(0x7f0000000140)={0x10, 0x2}, 0x10) 08:14:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:34 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@sndinfo={0x1c}], 0x1c}, 0x0) [ 1466.407655][T13179] loop4: detected capacity change from 0 to 4096 08:14:34 executing program 3: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cdg\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='htcp\x00', 0x5) 08:14:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x129, 0x129, 0x2, [@int, @array, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x146}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1466.501935][T13179] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:34 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = dup2(r0, r0) r2 = dup(r1) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x1c, 0x1c}, 0x1c) 08:14:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x129, 0x129, 0x2, [@int, @array, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x146}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000140), &(0x7f0000000240)=0xb0) 08:14:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:35 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1466.821508][T13216] loop4: detected capacity change from 0 to 4096 08:14:35 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) [ 1466.930428][T13216] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:36 executing program 3: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 08:14:36 executing program 1: socketpair(0x1, 0x2, 0x1, &(0x7f0000000580)) 08:14:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0xe}}], 0x4000000000000d0, 0x0) 08:14:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:36 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), 0x10) 08:14:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 08:14:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) [ 1468.129991][T13247] loop4: detected capacity change from 0 to 4096 08:14:36 executing program 0: munmap(&(0x7f0000ff0000/0x2000)=nil, 0x2000) munmap(&(0x7f0000fee000/0xf000)=nil, 0xf000) 08:14:36 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000100), 0x4) 08:14:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) [ 1468.279018][T13247] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:36 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) 08:14:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40), 0x0, 0x0) 08:14:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) fork() 08:14:36 executing program 3: keyctl$negate(0xd, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) 08:14:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40), 0x0, 0x0) [ 1468.732898][T13291] loop4: detected capacity change from 0 to 4096 08:14:37 executing program 3: r0 = fork() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/191, 0xbf}], 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/109, 0x6d}], 0x1, 0x0) 08:14:37 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000003f80)=[{0x0}, {&(0x7f0000003cc0)=""/19, 0x13}], 0x2}}], 0x1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x404e20, 0x0, @empty}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40), 0x0, 0x0) 08:14:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1468.881518][T13291] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0x7fffffff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x2d1ee37) write(r2, &(0x7f0000000100), 0xffffff65) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528aca1}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x2}, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2bbede8c}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) poll(&(0x7f00000003c0)=[{r2}], 0x1, 0xff) [ 1468.965905][ T26] audit: type=1326 audit(1634372077.165:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13285 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe58f3a8a39 code=0xffff0000 08:14:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1469.251873][T13322] loop4: detected capacity change from 0 to 4096 [ 1469.275032][T13322] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1469.302452][T13322] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:37 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) 08:14:37 executing program 0: syz_emit_ethernet(0xfc0, &(0x7f0000000a40)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "ebf1d6", 0xf8a, 0x21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, @dstopts={0x0, 0x1dc, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @pad1, @ra, @ra, @pad1, @generic={0x0, 0xebf, "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"}]}], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ee80da", 0x0, "c46624"}, "1e5eaea9c42b7c02c3e97724146dffb89b711cc27a62a562c62e7a5e44dc899fadd7106bcd0ab37f12f7f3efd5a3613a0810a2e0c8513fb325a180d027b6c1850b34a5d1fd4d5e6ae871cf93e672a723722ab6b993296251e4456a9f32e26405c9a0f6aba12e1007585ea8a530108c589556919cd0af7afd87de3c74f24523030dd4"}}}}}}, 0x0) 08:14:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000140)=0x5, 0x4) sendto$inet(r0, &(0x7f0000000280)="d7bf", 0x2, 0x0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) 08:14:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1469.512622][T13335] loop4: detected capacity change from 0 to 4096 08:14:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:37 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) 08:14:37 executing program 3: r0 = inotify_init1(0x0) flistxattr(r0, &(0x7f00000000c0)=""/136, 0x88) [ 1469.652388][T13335] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:38 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 08:14:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) [ 1470.018400][T13363] loop4: detected capacity change from 0 to 4096 [ 1470.079599][T13363] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1470.124956][T13363] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) 08:14:38 executing program 3: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x38800, 0x0) 08:14:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:38 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) 08:14:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1470.314966][T13381] loop4: detected capacity change from 0 to 4096 08:14:38 executing program 0: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r2, r1) 08:14:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) capget(&(0x7f0000000080)={0x19980330}, 0x0) 08:14:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1470.405255][T13381] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 08:14:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:38 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockname$inet(r0, 0x0, &(0x7f0000000180)) [ 1470.779963][T13414] loop4: detected capacity change from 0 to 4096 [ 1470.815996][T13414] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1470.837186][T13414] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) pivot_root(0x0, 0x0) 08:14:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) getxattr(0x0, 0x0, 0x0, 0x0) 08:14:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 08:14:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14d, 0x14d, 0x2, [@int, @array, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x16a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) timer_create(0x0, 0x0, &(0x7f0000000140)) timer_gettime(0x0, &(0x7f00000001c0)) 08:14:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:39 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_RESET(r0, 0xc01064c4, &(0x7f0000000280)={0x0}) 08:14:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) lgetxattr(0x0, 0x0, 0x0, 0x0) [ 1471.041626][T13427] loop4: detected capacity change from 0 to 4096 08:14:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x2, [@int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x15a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:39 executing program 3: r0 = memfd_create(&(0x7f0000000440)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11B\x84\xb6\x1e\x835F\xef\x19\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\xb8\xfe4\xda\x80e\x94az\x04\xf1k\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:14:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sync() [ 1471.165296][T13427] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) lgetxattr(0x0, 0x0, 0x0, 0x0) 08:14:39 executing program 3: sched_setattr(0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300), 0x5, 0x100082) r1 = memfd_create(&(0x7f0000000f00)='\x06\x00\x00!\x00\x00\x00\x00u\x86e\x00\x00\t\x00\xa9\x03\x00\x00\xd6\xecmZ\x84~\x9e\xf6\xb7\xaczc\x86l\xff\x7f\x00\x00\x90`\xc4\xf1L\x99\x06\x00\xe1\vnr\xea\xb8w\xf6@\xfd\xaa\x97C\x13\x02\xb5\xac-e\xe0\x8d\x8a\xf2g\xeb\xaaq\x82\xd6\x1f\x98\xd8\xc6k\xeb\xb2O\x8c\x81Y\xbc*\xb3\xb3\x7ft\xabloF\xcc\x1b8\xa29\xa7`\x91\xeb\x0f\xa2\xa5r\x0e4\t\xe3\xbf\xd43\x81\xa6\x19\xe1\xec\x85\xe9+\x197\xf1\xd3\xe2\xc6\xfbL\x91\xdf\xc5\xb2\x9c\xa2\a3\xb2\x8bN\x19\xb9x-\xe4k\xdd~\xe5\xbf\xc0]l\xf7\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00gwRf`\xd7\xb1\"\'\xa2l\xfc\x16:u 80g\xe4io3\x14\xf6(Yh\xa5\xcbw\xf9\x1f\x9a?\xe7\xbd>\xf0\x8f2f\xe9\xe3agZ\x05`\x9bv\xa7\x89S\x8dx\x01\x05\xd5\x85>\xf0J\x1er\x1f\xd2\xaa\x8b\x9b\x8b\x86\xa9\xaa\xf4\xe0\x8b\xd0\x00'/260, 0x0) pwritev(r1, &(0x7f0000000600)=[{&(0x7f00000007c0)="cd", 0x1}], 0x1, 0x8180a, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000003) 08:14:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sync() 08:14:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x2, [@int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x15a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) lgetxattr(0x0, 0x0, 0x0, 0x0) 08:14:39 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="8b", 0x1) [ 1471.530102][T13469] loop4: detected capacity change from 0 to 4096 08:14:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sync() 08:14:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x13d, 0x13d, 0x2, [@int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x15a}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:39 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) lgetxattr(0x0, 0x0, 0x0, 0x0) 08:14:39 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) [ 1471.605844][T13469] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sync() 08:14:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:40 executing program 2: sync() 08:14:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x145, 0x145, 0x2, [@array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x162}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000005b0c0)={0xfffffffffffffe01, [], 0x6c, "837cf958d7e8f3"}) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 08:14:40 executing program 2: sync() [ 1471.944743][ T26] audit: type=1326 audit(1634372080.144:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13493 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8347b5ca39 code=0x0 [ 1472.020811][T13507] loop4: detected capacity change from 0 to 4096 [ 1472.077330][T13507] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1472.102216][T13507] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:14:40 executing program 2: sync() 08:14:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1472.223865][T13516] "syz-executor.1" (13516) uses obsolete ecb(arc4) skcipher [ 1472.235364][T13519] "syz-executor.1" (13519) uses obsolete ecb(arc4) skcipher [ 1472.294333][T13525] loop4: detected capacity change from 0 to 4096 08:14:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) sync() 08:14:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:40 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:40 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) sync() [ 1472.465871][T13537] loop4: detected capacity change from 0 to 4096 [ 1472.617092][T13546] loop1: detected capacity change from 0 to 3792 08:14:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x145, 0x145, 0x2, [@array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x162}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1472.803183][ T26] audit: type=1326 audit(1634372080.994:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13554 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8347b5ca39 code=0x0 08:14:41 executing program 3: syz_emit_ethernet(0x16, &(0x7f0000000000)={@local, @remote}, 0x0) 08:14:41 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) sync() 08:14:41 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:14:41 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000a00)='./file0\x00', 0x4000800) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000a00)='./file0\x00', 0x4000800) [ 1473.071296][T13571] loop4: detected capacity change from 0 to 4096 08:14:41 executing program 0: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sync() 08:14:41 executing program 3: r0 = openat$sysfs(0xffffff9c, &(0x7f0000002040)='/sys/power/pm_trace_dev_match', 0x0, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000300)=""/131, 0x83}], 0x1, 0x0, 0x1001) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) 08:14:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1473.290441][T13587] loop4: detected capacity change from 0 to 4096 [ 1473.452957][T13597] loop1: detected capacity change from 0 to 3792 08:14:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x145, 0x145, 0x2, [@array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x162}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sync() 08:14:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:41 executing program 3: keyctl$clear(0x7, 0xfffffffffffffffd) setuid(0xee00) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, r0) 08:14:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="00006c6f775f7574696d653d3030303030303030303030302c757466383d312c666d6173703d30303030313030303030303030302000000000000000302c00060881e7e6820657f37c74cd19314b620a329e286f154d8d118d1b65929de3040ebaaf5be08c3992c9730ae211059914518c037876d8fa51ce14fc26563d6da682810f0c2037877884a66055193237000fca927485288efe2a73a2c9e173c0d9765fc08612d6230309010000008000fcb5014e16764636937835e03b39edaef2432d05f354382f989e2f9d2528d9f4005a0cf9347fa40169d72e1c2bc46aaf5e01f12f0baaeb6fc070221b2ff858ae6eac0ff2927596585871cc9ceadeda79ce87cf0d1f59a76058a9812000000000ac9934660ccc4b038a98bf6306e429c0b8b66f02160b75eeff2960040fffd630d12a0bdcd0be25ee7e82add46d15c84daac77e68dc303d8ddacfd5543b478c6be45dd68e760d654ae2000000000000009626249fc1c3b67552bd87fdcf7da5dbda942f775b429e40106d2ef6fd97786725bd7456fa36310b01000000f3bcfd6d348d7a6e675c0d9a69a2160c742205ccc88996285122356dea5537824a0dd2561ee388cb39b0facc491c8d60087a310ab2b3c459dac63c37af1c9a45d4a6170d581dd13c33eb6f4b139c09bfd7616683b8813805d9c689e4714a9fc7bab139dd41822191ed0a8272fc4eeaea17389bf8007b244d52dca9b0d9fcac667f86b8597c670bce06a3234c687723002a0eef9a416b0f5b4e28ec9ad2e363f2cbbb883242ace63ec9a2b44028e1c30687c3eacfe8e188583c0a854b5130866baefbfb23432ab76f98b5e33be4015e4faeaa8f37679499f89eb1b7e6bcd3bdce6404fe391298e4b8f0975dc989cd0b0b06808ab291b1da058493e102a9fbeec347c9d979147386b177af0c74c70000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:14:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sync() 08:14:41 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)) sync() [ 1473.738535][T13613] loop4: detected capacity change from 0 to 4096 08:14:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffff9}]}) listxattr(0x0, 0x0, 0x0) [ 1473.811140][ T26] audit: type=1326 audit(1634372082.004:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13614 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8347b5ca39 code=0x0 08:14:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)) sync() [ 1473.939023][T13631] loop4: detected capacity change from 0 to 4096 [ 1474.082145][T13641] loop1: detected capacity change from 0 to 3792 08:14:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:42 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:42 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000006200)='ns/net\x00') 08:14:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)) sync() 08:14:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:42 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) [ 1474.689968][T13654] loop4: detected capacity change from 0 to 1024 08:14:42 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) sync() [ 1474.731295][T13654] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 08:14:43 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002c40)='ns/ipc\x00') 08:14:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) sync() 08:14:43 executing program 3: sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYBLOB="10002abd7000fedbdf250e000000050035001f000000080032003a00000008000600945ba72f58c547d001f6381e3d2e34daaae5bd3a5b6e6f99d9aa49bf6eb552eaf3280bfe77fff9d8f961e2fe0427ca8a2dbf8f534f03af3fc30e7bac58c345e1c8e27d86c1939821a83e21c1625681cb4db1a31ad8f8d519135cf886c29c8987da7297a56a66ddd3ae83863221658720167816e5c5caf8974f5dc0c3116db8ea7c75438d716e9088ebbe1e37d78ef9387218a826b8a35b8a25abac3db83a190c1a", @ANYRES32, @ANYBLOB="060028000100000008005d736a0ad726c72f3b218d9159ed6aee310004000aca2e5d7ce39b797cf440db51e267e7d05e3232f6d390257f9c4794866efaa2cd649d115276831d25e5836ffaefa70e629667feaebab6"], 0x48}, 0x1, 0x0, 0x0, 0x20000801}, 0x4008800) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r0, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020025bd7000fedbdf25050000000500290000f600000008000b0000020000080003", @ANYRES32=r0, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x40880}, 0x80) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x100000000008d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000000600)=[{{&(0x7f0000000680)=@generic, 0x80, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000000700)=""/235, 0xeb}, 0x20}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f000005b0c0)={0xfffffffffffffe01, [], 0x6c, "837cf958d7e8f3"}) r5 = socket(0x10, 0x3, 0x0) write(r5, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) recvmmsg(r5, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 08:14:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) sync() [ 1474.975162][T13674] loop4: detected capacity change from 0 to 1024 [ 1475.000693][T13674] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 08:14:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000000880)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x40000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1475.242281][T13696] loop4: detected capacity change from 0 to 1024 [ 1475.252461][T13696] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (128 blocks) 08:14:43 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 08:14:43 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) sync() 08:14:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1475.497014][T13703] loop1: detected capacity change from 0 to 32760 [ 1475.533768][ T8439] Bluetooth: hci4: command 0x0406 tx timeout [ 1475.596404][ T26] audit: type=1326 audit(1634372083.794:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13712 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7c77875a39 code=0x0 08:14:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1475.875073][T13728] loop1: detected capacity change from 0 to 3792 08:14:44 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) 08:14:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:44 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) [ 1476.350985][T13753] loop1: detected capacity change from 0 to 3792 08:14:44 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) sync() 08:14:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x44, 0xa, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}]}]}, 0x44}}, 0x0) 08:14:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1476.530177][ T26] audit: type=1326 audit(1634372084.724:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13762 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7c77875a39 code=0x0 08:14:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:44 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002040)='ns/time_for_children\x00') [ 1476.576155][T13766] loop4: detected capacity change from 0 to 4096 08:14:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1476.695396][T13766] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 08:14:44 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7ffffff9}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:45 executing program 3: fanotify_mark(0xffffffffffffffff, 0x0, 0x47bb2e231db0ec17, 0xffffffffffffffff, 0x0) 08:14:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) [ 1477.237709][T13800] loop1: detected capacity change from 0 to 3792 08:14:45 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) sync() 08:14:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:45 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}, 0x144}) 08:14:45 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) [ 1477.412135][ T26] audit: type=1326 audit(1634372085.604:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13807 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7c77875a39 code=0x0 [ 1477.451266][T13813] loop4: detected capacity change from 0 to 4096 [ 1477.489901][T13813] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1477.532360][T13813] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:14:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1477.581419][ T26] audit: type=1326 audit(1634372085.644:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13804 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe58f3a8a39 code=0x0 08:14:45 executing program 3: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x2010, 0x0) 08:14:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:46 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000007600)='./file0\x00', 0x0, 0x0) [ 1477.842752][T13828] loop4: detected capacity change from 0 to 4096 [ 1477.870149][T13828] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1477.886117][T13828] EXT4-fs (loop4): mount failed 08:14:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1478.101970][T13843] loop4: detected capacity change from 0 to 4096 [ 1478.127861][T13843] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1478.143259][T13843] EXT4-fs (loop4): mount failed 08:14:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 08:14:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x406f408, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) 08:14:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) 08:14:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1478.332123][T13858] loop4: detected capacity change from 0 to 4096 [ 1478.383774][T13858] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1478.398795][T13858] EXT4-fs (loop4): mount failed [ 1478.441238][ T26] audit: type=1326 audit(1634372086.634:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13862 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe58f3a8a39 code=0x0 [ 1478.627231][T13879] loop1: detected capacity change from 0 to 3792 08:14:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={&(0x7f0000000100)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@flowinfo={{0x14}}], 0x18}, 0x0) 08:14:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) 08:14:46 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) 08:14:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1478.773872][T13888] loop4: detected capacity change from 0 to 4096 [ 1478.806667][T13888] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 08:14:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01edff000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de6c30d10ba51de4080211000001505050505050"], 0x448}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) 08:14:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1478.821698][T13888] EXT4-fs (loop4): mount failed 08:14:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 1478.986984][T13905] loop4: detected capacity change from 0 to 4096 [ 1479.008017][T13905] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1479.022976][T13905] EXT4-fs (loop4): mount failed [ 1479.038205][ T26] audit: type=1804 audit(1634372087.234:207): pid=13898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir225033029/syzkaller.BnMSDq/3020/cgroup.controllers" dev="sda1" ino=13982 res=1 errno=0 08:14:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1479.169863][T13919] loop4: detected capacity change from 0 to 4096 [ 1479.190520][T13919] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1479.206052][T13919] EXT4-fs (loop4): mount failed 08:14:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 1479.344066][ T26] audit: type=1326 audit(1634372087.544:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13928 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe58f3a8a39 code=0x0 [ 1479.416619][T13934] loop1: detected capacity change from 0 to 3792 08:14:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000002a00)={@private2}) 08:14:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0xc, &(0x7f00000002c0)) 08:14:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000140)={0x4c, r1, 0x411, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}]}, 0x4c}}, 0x0) 08:14:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:49 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) 08:14:49 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000a40)={&(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f00000009c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 08:14:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001980), 0x4) [ 1481.413172][T13948] loop4: detected capacity change from 0 to 4096 08:14:49 executing program 2: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x78) [ 1481.467339][T13948] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1481.495209][T13948] EXT4-fs (loop4): mount failed 08:14:49 executing program 0: epoll_create(0x80) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) pipe(0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40006142, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x80980, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x3) 08:14:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x0) 08:14:49 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x400, @any, 0x0, 0x2}, 0xe) 08:14:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/exe\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086604, &(0x7f0000000080)=0xffffffffffffffff) [ 1481.727867][T13979] loop4: detected capacity change from 0 to 4096 [ 1481.759030][T13979] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1481.775985][T13979] EXT4-fs (loop4): mount failed [ 1481.778307][T13987] EXT4-fs warning (device sda1): __ext4_ioctl:878: Setting inode version is not supported with metadata_csum enabled. [ 1481.983962][T14002] loop1: detected capacity change from 0 to 3792 [ 1483.705546][ T1355] ieee802154 phy0 wpan0: encryption failed: -22 [ 1483.712268][ T1355] ieee802154 phy1 wpan1: encryption failed: -22 08:14:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0xc, &(0x7f00000002c0)) 08:14:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086604, 0x0) 08:14:52 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/llc/socket\x00') 08:14:52 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000069340)={0x862e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "acd7f354acf6e3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006a340)={0xa6f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x3, "fe75ca494921f1"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000052440)={0x0, 0x0, "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", "fe196be2f539abc48a5528505c5ea336a918c3acd8a36780db200946456d4f9bbee6e4998019b4769a089ed766252e79227a00d5ea4fe724d7a90ce820c084785fc853afd0d5857d2cf97e2336e15f051054363559cee8a9cc1e4dc2559d264a96a8ef19beaac86451fa55cf1be5c15dcf8436c47db2e3a04cb09261ec76585d5bb03e3478a5db3961f92f9aa87f6d9d8179c55692e1424e5c079dd795a28bbcd1e9ce9e6de921147d151ac182eb8b86858bc74551543b973280c5795b1b71b41c986bd9e9645a04c2ec60d8a0811550cf3681672e7215f90fa4410ec29ab326751d3760db8982632ee74302b99b64f620ea876ff4adfc4ff16a0ab1544ad8b3467154696b119fc8e291ed7dd4f8fea07243c38cc66f2cdb414a87db1810974e16e06a27f9ca76ac3f8b17b607039e953506ae374e73fc29379dbc72cb545683fdd8137c190c88dac51ce1c14fc5f509d774e0b554106de503cafe036f3bed5f7b430ad55ea3de3c277e61355eae0f2dd0490813ea2cba6a911947dd025b548586d205924f4742f54babcc4bcce693293fb32f8c0a42b3518d43438ad264ead61ef173d66426f69382190b7b0758caf174d76e993d0a8a3179c4c180003c8e3ec707159f56dc707e6586e438fd4bdce38da3510ee1b88efd38a787106d58a99134eb44bac2c29bd53ef6908eb566a78e615aa482c17f2fadb590f21463286784b63afc2e95b7c6fdc7127ea273340b61ab51737530414203565f93c43125a3c06b301437ab2cc7941b2eaecae07c9d0ea8fa4688e56289c33272b04284908b701252f67b1e71b4e1eb695838e17d595876a47a1b6a34319bd97df5a68d5783f4224257d5ee00d5f83b2b1b5a61127296783ff0e379c624ba5d31c5a6a2ae49ce13b4e2882c9fa354722ff0ae0331d4770086a8efe1376b1a9e5894ed0c515ef3f29263ff618fbfe04b0b667a6c326afa2b5427cca54ccfc2b1d0dc60192ea2619a64f12d44056fdb2cce93dc66c1995ec2fecc93523a7dbc2ef8e7d0af55a93793ccd8c9b4bcf2f0f768422f8fdaf62b0afa42d79c0511f7dddcce26314122797730f9116ce394acc3cf527400efafec0f7e7f4e83d14ef87d8d8bd9bee5e927fa172a5dda8a4604efb7373345467573f7ed9842a9c025d7385d3c706594a3132be05b211268c5b7ab75746adde986ac5a99c2eb291ac1a54cf51aac82b9319fcaca0ee52d09fc132cc7fbca9f8bf7f537e5cf1d451bdb1742c207336af9608976e366e9adef72644574e8ccaa40437fd4c1ec31fb29c8daf22fa1bc0259b4d14f1303c1fc691131378019e4b2015a3667d248b710cf75c3ab4a0fd5b65992e63e352a85708489f74112053a0f285b72aaa377db5aff7000f573ac9538bb472030c8901bda9530c968fb43b3b7437fe8ebc259e20c680e7f333af3149479b1141c7ed1a6fd92989410e857d57ffc339751e6c9361cf7150e71845052b18e2d76f3251ed62bf34fb47e61c588259bc877cb4b260b1669887fac77c7a58ceed7aa5f3ca85b05459664cec9ecf2d60d22056ed0621ca141167a489d8ad892456d3de657c857a2ef1888b7ca988de18e1bddf13e403e276f0d5373c08c2cef424c63264b1c7a4a0caff745f18ce8af08080984bd6c4c4c37b3a5d7f5b66d5c36b156d2ca3d0aa2af0ab4434a6782395bb22b76c92f6df62d05eaae2d27a63b36f57d79bea736b8e6c7b0eec6a470e829f00b252e18a34c943ee62807b9a7e858f66f278d2ca47afe53e330e622b0c60c3247a7d9b7725345afcf21fde850041636717a4ec2ba71cc485a8b99b55f47ff74dc68444a76f3cd554964ec497104215dcefb42140e3c8cd341dc0461b6144bedf075bfb87011a9b07dac663275deced35c44a315dac808597fe7eea75780821ae2a4a1134460163c73409cef1d34f9869a3567e2ceff36eed94a9a128ac741317dbb66a64b28f0e7951543a45772cbb515f41b9b1ac96e74fd0baaf4d17365b64450be8ec63b6fe4e8548262f27d521c33e9dfde7eb412ef5f1a4b5f9456e3e20bef94b66625635557a95ef7ea3c6afb7df584af5c77f24131b2aaf7c632332c2d6248dcec5293fe0a72f6fa0f6a48b267ee8c18c693bff9835b11d364e82cd8ca3113be28cd43d84612d2a2240a7bde825aaa9bb4dc6477e6503ae19a515f4d9e43c306d38ae68ff4a49a6f6cb9d9e5b31293cabbfa7dc5975c692658995f940871731d6e0dac8dc8b5899a99715b6b1db806db920641721979f01aeab85db6be1f9d852142d7888cbada033cd131963761754810d7f8aa4d5b98726e196890d780fe9effc615445f5d9aedc419f5b825a2da3dd13f78a466f7dbccc9f23b4280611b27b18351ed2075d25081c04b0f1580f819930bd1d4b2b1417539ffa0578a044bfb80bfca8d38fca424f2d9c420c963b7ec58553eeb0d2142ecd8785748ecbb35c3d7cc8546b4f23ed6e7097f9652787fc226f9018b44fbffdeaa18725236245ad865fe4764d079127e309a9982aa956e1e60d7d8f71c907a55dc80bca6544c891891e1e14f261477e11dd147dcc65debf9beba52967ebb480b5795a9e40be12b36164f3864ed9f16110fb18fcebc969d17986c6090bdaed73961a5a4a312f770782ed8b510931661401f00efcf310ce258f6ed8b3113266f3a4a3b450dff7babeb3cde2c410f39a509769077368c19940cdb8b99562164be51010f06e52ee45a4a4e7aeff651cc2a51aa98c598862376f5f0b9ddd0d40f1c29d004da2eb4b7933c79aa4845144fa15eaa32863a8cf2e71afbb6aea3d7d20f2feb340b41dc2f090315493dd30150c6995fa32e6d3d0857508c454183515fe6104a4cbfc3e7110746fe96dee9e0c75ef25bfc34a63b1503d88d77eea67f1bd9a7d4137da5723e4bd444c42d2fa17b886491477b3a9cd9fbe59084221301d00b3d1450fe743f0f39d84c52b85c0974b55876a04710d397faf2cad649bcbfff737bfa3b895a00cf54c5e4dc45a7a29051fb44dd8426fdbd92245592509c60cef7fc927e4e8d13f413b6e2dd7d7fd5ae95dcf32421f820924567e6b9a3c49e7960fda2d5257fa8ff3703198818610babff58c25d7b249e34c0ed518fec096f41e61409084f84b824a89838c7416a8aaf1258fa019a128f2900a314715595a1adc1107812c35dbb8b90e6e110fb0e0172bfd348e0ed30e3b66cdb428deea3cbdd1c908c9ae6aece582f08d4dd3262f824af67d0955cd543df2a9a52d06a909b213c97f1fb54bfab87118398570426a3243fcc81993446082a2ba32a82af3a51e36760dde98f68f5d29dd3b216cad70540a7f24793e651edbed260d14ddefd5809535f71e8f27e352d705ff1113b1936d27da31693bd33ef6eedb59dbdd362371ce52e7b0084d87286d6230537e176b0d7b014cdd95b15ebfeeed2713574fb3a1ebaed719d092dda4bc95cb71f1d9163b48a70ae32a4e1164616d0707a18d610e2e460fe66008e1b0eadefc606a0801fd0820515f9d881909a7c9f86c3f85590fae95d94400f9a8d3b153c8140b364cf46b737a0f0484f7750986c727a671c73c0c3c1e24fc61b153e01ba5532833f6ff52ec72852336dd2454d1fc2b1ae0771154e7f6babc3108dd61ca4459a157fdf3c80e7ca7736e1b192a20d3946fbdbf8b2532b008cda1075122d40ed6756b18a177dc6040b56cc704c222918f3991c36ec51f13f0756cd62f405d0f6af37bec4b6fbaf5ca68f2e933806fdd6dfb7ba35107952b7933930723b433179cbec74ddbf817675f73a20b26e6c67a7284ae347bc15c465cc4e9a2425d73a2529927d6ff077308db8aedcc4d43e933200dcdd90d62f84ab378ca4b16a0bfbacb521bb6661de293e828dfe4bad32038216a3004f16cc14846387eb75a4515e7c0343cd0426d6dc82b6392f2dd2a2fcf5250551dd30435a0dc670f04eaf53b2f48adc72c77219851f5e746550d62b524a423bf281560938cf78d6eb917bdd85e6041c39b6846e498106bd533a8d7a30169b30b62ca14cf8f98dd5f16d4278831d3555fd4eb8859c0ceebdbdc6e2ed70cedb0b218ea7a70a61ebba2424a055f7074a559241e55421879bdc9aad8d8f57a06140d2df014eedabb1653ab5a5bb9e55db055adf75dcfbebebd9415a9ddf6eb429053d5845205e5f056030f24f411f7d72ff5024efae5c574b1d3b59f785a9880327ea87c350e8197f36e30935342fa46d1912b00d7a4518696a7c139e20a9b87f1759d74b905a29c25b008522d0383a648d53d8ff2b9aeedf7872ea6477c294f0ff7eecbf13477a8be3137bf62e591b13b6680668a0f18cb2a78636657fc32d0c61ed55acd317ec20ec8f73fec5f158eac35ac3035c1e31a8f967850d1a6449df5aad349fe2038990a14b8e50c9fc71c9fffffce3d9ede842dd4d4105aeeafe8551c8be117967ecd30ad3fbc79d42a2511a7b17bc6ed05c94588c6972c018a9b551c7a78f65bfcd4bac6a70ca32d5f2b6e0200e5fe81865e19216cc58b2f5e551b7fe0c33a0dd87c5fc4f5487deccd60ada9054d60b256ab6d1d17d15795912178e353c75e0ed63ae197f305ec87c58bfc1eba18272ac8ea9adca1b10320b0e5c284e232a6032d95199ddb757d09a75a5f4f51959c2055264e20e6ef18978608447d410eec490663c799c97c19f9cec266e6e6e63efa1002868a8e8b98a6159f8f0463f35ed4c29195759f042612c794fc8c74f33d51199791e373da6014708fceb13718f17e082b8936f0bd76c97688cad5ed30a7c64b9c2c0ce1d304cbf21771bdd30403ee6b358332bfc95b8a375daf7193ad79798c560385aa92719e785de449bd121f43e483380ea0847f8a71cc5ee084b16d8e6c68b9ee6f7ebfb4870226c0dc25a58e2a53ad3ff5945dbd02a3a4f05b692cfadcb4583c33241f7aca7e12c6938fbe06d1025daf672d20d80a468a9cf1b909768894048c70dbfb568de9992a1ecef701d5df3e3636fd7ae88e614b707c300254b1db293f37b96c585c37ae24d3a3ab8220ab295d55db01006ea60d46cc4be4b1bdc8377d2941c6a289f1310f531be4c0920370b72dd1de92fce720ba154ba7b05b594956bf811ec1aab91a9a013df8dffd3f579a3590edf3bac9550c4129d2a05bffa2a7ed382990088670a991de752f6f09cd63bc54c8a68d2d7e02146d032ca995bdf6a917c58e5afd6c84cc60dee83b8b2f0ac596e1972d24839079f2e4026e6419a05f822ac4186767222a72d19617667d62c36c1e76d11702269f19b474124828715050730da557c020d1630fabb80d6187e8acf849afdc25c4325a6cc3d0269b2446932ebb636f62f515f815065b335aab9913f94a81fbebaa001d507d5fff00ab0bb21cc93da9d12c43a64ddad111a02e87b"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0}) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000053440)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x7, "d7912f22521df4"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000640)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "6ad0f778983883"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f000005d2c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057b40)={0x0, [], 0x0, "30fc7c67d14296"}) sigaltstack(&(0x7f0000bdc000/0x4000)=nil, 0x0) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:14:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:52 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) [ 1484.386375][T14013] EXT4-fs warning (device sda1): __ext4_ioctl:878: Setting inode version is not supported with metadata_csum enabled. [ 1484.417961][T14015] EXT4-fs warning (device sda1): __ext4_ioctl:878: Setting inode version is not supported with metadata_csum enabled. [ 1484.431636][T14016] loop4: detected capacity change from 0 to 4096 08:14:52 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/tty/ldiscs\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000500)=""/207, 0xcf, 0x0) [ 1484.465008][T14016] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1484.480372][T14016] EXT4-fs (loop4): mount failed 08:14:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x4) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000001380)=""/164) 08:14:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000180), 0xc) 08:14:52 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000069340)={0x862e, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x1, "acd7f354acf6e3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006a340)={0xa6f, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x3, "fe75ca494921f1"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000052440)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0}) r4 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000053440)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x7, "d7912f22521df4"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000640)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "6ad0f778983883"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000058c40)={0x0, [], 0x0, "2156816c73038c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f000005d2c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057b40)={0x0, [], 0x0, "30fc7c67d14296"}) sigaltstack(&(0x7f0000bdc000/0x4000)=nil, 0x0) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:14:52 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000680)={&(0x7f0000000040)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000600)=[@cred], 0x60}, 0x0) [ 1484.763276][T14043] loop4: detected capacity change from 0 to 4096 [ 1484.803669][T14043] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1484.814615][T14043] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1484.830044][T14043] EXT4-fs (loop4): mount failed [ 1485.022183][T14054] loop1: detected capacity change from 0 to 3792 08:14:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0xc, &(0x7f00000002c0)) 08:14:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xfff}, 0x14) 08:14:55 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x4) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000001380)=""/164) 08:14:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), &(0x7f00000001c0)=0x98) 08:14:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:14:55 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 1487.532723][T14070] loop4: detected capacity change from 0 to 4096 [ 1487.602997][T14070] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1487.612952][T14070] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1487.627994][T14070] EXT4-fs (loop4): mount failed 08:14:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f0000000000)=0x1, 0x4) 08:14:55 executing program 3: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40, 0x0) renameat2(r1, &(0x7f00000002c0)='./file0\x00', r0, &(0x7f0000000300)='./file0\x00', 0x0) 08:14:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:56 executing program 2: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') llistxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 08:14:56 executing program 0: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 1487.920381][T14104] loop4: detected capacity change from 0 to 4096 [ 1487.959138][T14104] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1487.969221][T14104] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1487.984482][T14104] EXT4-fs (loop4): mount failed [ 1488.178185][T14116] loop1: detected capacity change from 0 to 3792 08:14:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f00000002c0)) 08:14:58 executing program 3: rmdir(&(0x7f0000007000)='./file0\x00') 08:14:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000005980)=[{{0x0, 0x0, &(0x7f0000004940)=[{&(0x7f00000045c0)=""/129, 0x81}], 0x1}}], 0x1, 0x0, 0x0) 08:14:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:58 executing program 0: pipe(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 08:14:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) [ 1490.614494][T14134] loop4: detected capacity change from 0 to 4096 08:14:58 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40, 0x0) [ 1490.671263][T14134] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1490.681660][T14134] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1490.696938][T14134] EXT4-fs (loop4): mount failed 08:14:58 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001600), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) 08:14:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:14:59 executing program 3: open$dir(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) 08:14:59 executing program 0: rmdir(0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000007040)='./file0\x00', &(0x7f0000007080), 0x0, 0x0, 0x0) [ 1491.019115][T14155] loop4: detected capacity change from 0 to 4096 [ 1491.051642][T14155] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1491.062067][T14155] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1491.077448][T14155] EXT4-fs (loop4): mount failed 08:14:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1491.274060][T14170] loop4: detected capacity change from 0 to 4096 [ 1491.302024][T14170] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1491.311832][T14170] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1491.327183][T14170] EXT4-fs (loop4): mount failed [ 1491.433086][T14180] loop1: detected capacity change from 0 to 3792 08:15:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f00000002c0)) 08:15:01 executing program 3: accept4(0xffffffffffffffff, 0x0, 0x0, 0x400) 08:15:01 executing program 0: pipe(&(0x7f0000001cc0)={0xffffffffffffffff}) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 08:15:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:01 executing program 2: r0 = socket(0x1, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, &(0x7f0000000100)={'tunl0\x00', 0x0}) 08:15:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020}, 0x2020) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x19, 0x0, 0x1000000) [ 1493.712037][T14198] loop4: detected capacity change from 0 to 4096 [ 1493.747666][T14198] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). 08:15:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x8, &(0x7f0000000000)=0xa, 0x4) [ 1493.758398][T14198] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1493.773558][T14198] EXT4-fs (loop4): mount failed 08:15:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000010c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f0000001180)=""/188, 0x2e, 0xbc, 0x1}, 0x20) 08:15:02 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000000c0)={'syztnl0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x1, 0xee1f, 0x6b5c, 0x1, 0x0, r0, 0x9f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x40) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000340)=0x9, 0x4) 08:15:02 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000003a80)={0x0, 0x0, &(0x7f0000003a40)={&(0x7f0000002580)={0x38, 0x14, 0x1, 0x0, 0x0, {0x2}, [@INET_DIAG_REQ_BYTECODE={0x22, 0x1, "61743167d24d15c57e325f141f2b64771fb3c3df08d21d63867000c278e5"}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008080}, 0x8004) 08:15:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1494.069238][T14224] loop4: detected capacity change from 0 to 4096 [ 1494.138379][T14224] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1494.149407][T14224] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1494.164766][T14224] EXT4-fs (loop4): mount failed [ 1494.270390][T14234] loop1: detected capacity change from 0 to 3792 08:15:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f00000002c0)) 08:15:04 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000005040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc4c85513, 0x0) 08:15:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000140)="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", 0x12c, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 08:15:04 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) listen(r0, 0x0) shutdown(r0, 0x2) 08:15:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020}, 0x2020) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0xb, &(0x7f0000000100)=@framed={{}, [@func, @exit, @exit, @initr0, @func, @map]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x63, &(0x7f0000000180)=""/99, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240), 0x8, 0x10, &(0x7f0000000280), 0x10}, 0x1c) [ 1496.778564][T14248] loop4: detected capacity change from 0 to 4096 [ 1496.816118][T14250] loop3: detected capacity change from 0 to 256 08:15:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x6, 0xbb1}, 0x10) [ 1496.845639][T14248] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1496.855474][T14248] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1496.871320][T14248] EXT4-fs (loop4): mount failed 08:15:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1496.935081][T14250] BTRFS: device label ‘ devid 4 transid 7 /dev/loop3 scanned by syz-executor.3 (14250) 08:15:05 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x1a, 0x0, &(0x7f0000000140)) 08:15:05 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x3, 0x0, &(0x7f0000000140)) [ 1497.016641][T14250] BTRFS error (device loop3): superblock checksum mismatch [ 1497.057654][T14250] BTRFS error (device loop3): open_ctree failed 08:15:05 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x1267, &(0x7f00000000c0)) [ 1497.105151][T14277] loop4: detected capacity change from 0 to 4096 [ 1497.139185][T14277] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1497.148862][T14277] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1497.163954][T14277] EXT4-fs (loop4): mount failed [ 1497.192382][T14250] loop3: detected capacity change from 0 to 256 [ 1497.282241][T14250] BTRFS error (device loop3): superblock checksum mismatch [ 1497.353710][T14250] BTRFS error (device loop3): open_ctree failed [ 1497.493011][T14300] loop1: detected capacity change from 0 to 3792 08:15:07 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x4, 0x2, 0x1c}, 0x24) 08:15:07 executing program 2: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 08:15:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:07 executing program 3: r0 = socket(0x18, 0x0, 0x1) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) 08:15:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, 0x0) 08:15:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020}, 0x2020) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 1499.874495][T14321] loop4: detected capacity change from 0 to 4096 08:15:08 executing program 2: r0 = socket(0x2b, 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000040)) [ 1499.920497][T14321] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1499.930779][T14321] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1499.945662][T14321] EXT4-fs (loop4): mount failed 08:15:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8906, 0x0) 08:15:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:08 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x0, 0x0, &(0x7f00000000c0)="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"}) 08:15:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0), 0x4) 08:15:08 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, &(0x7f0000000280)) 08:15:08 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x1, 0x0, 0x11, &(0x7f0000000100)="52f9b9e24d84b2b00fcff8ee4950c5c0d0"}) [ 1500.199538][T14349] loop4: detected capacity change from 0 to 4096 08:15:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000100)={'ip6gre0\x00', 0x0}) 08:15:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x8a, 0x2, 0x1, 0x0, 0x1, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x40) [ 1500.245098][T14349] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1500.254723][T14349] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1500.269564][T14349] EXT4-fs (loop4): mount failed [ 1500.558233][T14369] loop1: detected capacity change from 0 to 3792 08:15:11 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000040), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:15:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, 0x0) 08:15:11 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c, 0x0}, 0x0) 08:15:11 executing program 3: syz_mount_image$hfsplus(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f00000015c0)={[{@umask}, {@nobarrier}, {}]}) 08:15:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:11 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r0, 0x4b4a, 0x0) [ 1502.962234][T14385] loop4: detected capacity change from 0 to 4096 08:15:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000000)="55b0d5382dd250ee14081c91adbb4270", 0x10) [ 1503.015018][T14385] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1503.032678][T14385] EXT4-fs (loop4): mount failed 08:15:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1503.075884][T14386] hfsplus: unable to find HFS+ superblock 08:15:11 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={0x0}) 08:15:11 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000040)="29000000140005b7ff000000040860eb0101b6ff00159f02c26ed638eeb738250300000ec00000007e", 0x29) socket$inet6(0xa, 0x5, 0x0) [ 1503.164997][T14386] hfsplus: unable to find HFS+ superblock 08:15:11 executing program 3: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0) socket$inet(0x2, 0x800, 0x4) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000002cc0)={&(0x7f0000002c00), 0xc, &(0x7f0000002c80)={&(0x7f0000002c40)=ANY=[@ANYBLOB="0000f503", @ANYRES16=0x0, @ANYBLOB="01000000000000"], 0x14}}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001080)={'batadv_slave_1\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x40040, &(0x7f00000010c0)={0x11, 0x19, r2}, 0x14) [ 1503.328566][T14420] loop4: detected capacity change from 0 to 4096 [ 1503.365557][T14420] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1503.383093][T14420] EXT4-fs (loop4): mount failed 08:15:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, 0x0) 08:15:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000daf4655fdaf4655fdaf4655f01000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1503.640300][T14441] loop4: detected capacity change from 0 to 4096 [ 1503.669647][T14441] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1503.685624][T14441] EXT4-fs (loop4): mount failed [ 1503.892266][T14449] loop1: detected capacity change from 0 to 3792 08:15:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x155, 0x155, 0x2, [@int, @array, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x8, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}], "ff"}, @struct={0x0, 0x6, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x172}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, 0x0) 08:15:14 executing program 0: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) preadv(r0, 0x0, 0x0, 0x3ff, 0x0) sendmmsg(r1, &(0x7f0000004d80), 0x400000000000065, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7ffff000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x3f, 0x3, 0x0, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x76f, 0x7}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x0, "8bebeb894f74c3"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059d40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x81, "d1369540e8b693"}) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r6, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000006c0)={r5, r2, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x0, "8bebeb894f74c3"}) 08:15:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:14 executing program 3: syz_open_dev$dri(&(0x7f0000000140), 0x0, 0x0) 08:15:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@ethernet={0x0, @remote}, 0x80) 08:15:14 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x540e, 0x0) sendfile(r0, r0, 0x0, 0x24002da8) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0xff, 0x0, 0x6, 0x0, 0x0, 0xc0030, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x9, 0x7, 0x3, 0x0, 0x5, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0xfffff000) inotify_init() [ 1506.050328][T14468] loop4: detected capacity change from 0 to 4096 08:15:14 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) write(r0, &(0x7f0000000040)="29000000140005b7ff000000040860eb0101b6ff00159f02c26ed638eeb738250300000ec00000007e", 0x29) [ 1506.102221][T14468] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 1506.122236][T14468] EXT4-fs (loop4): re-mounted. Opts: (null). Quota mode: writeback. 08:15:14 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000100)={0x1, 0x3ff}) 08:15:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, 0x0) 08:15:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000480)=@nat={'nat\x00', 0x19, 0x2, 0x90, [], 0x0, 0x0, &(0x7f0000000100)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) [ 1506.449996][T14496] loop4: detected capacity change from 0 to 4096 [ 1506.492275][T14496] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1506.508439][T14496] EXT4-fs (loop4): mount failed [ 1506.696549][T14509] loop1: detected capacity change from 0 to 3792 08:15:17 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0x2) 08:15:17 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={[{@block={'block', 0x3d, 0x400}}]}) 08:15:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x2a04400, &(0x7f0000000100)={[{@fat=@umask={'umask', 0x3d, 0x800000000c14}}]}) 08:15:17 executing program 5: semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x201}, {}], 0x2, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0xfff7, 0x1000}], 0x1, &(0x7f0000000180)) 08:15:17 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x108, 0x354, 0x98, 0x108, 0x5003, 0x208, 0x198, 0x198, 0x208, 0x198, 0x3, 0x0, {[{{@uncond, 0x0, 0xc0, 0x108, 0x292, {}, [@common=@inet=@socket1={{0x28}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@dev}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x300) [ 1509.129879][T14526] loop4: detected capacity change from 0 to 4096 [ 1509.162971][T14526] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1509.179940][T14526] EXT4-fs (loop4): mount failed [ 1509.217948][T14536] x_tables: ip_tables: mac match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT/FORWARD 08:15:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 08:15:17 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000080)={0x2, 0x4, 0x4, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000580), &(0x7f0000000380)=@udp6, 0x2ccbadc6fecfe978}, 0x20) 08:15:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1509.260713][T14538] x_tables: ip_tables: mac match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT/FORWARD 08:15:17 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x108, 0x354, 0x98, 0x108, 0x5003, 0x208, 0x198, 0x198, 0x208, 0x198, 0x3, 0x0, {[{{@uncond, 0x0, 0xc0, 0x108, 0x292, {}, [@common=@inet=@socket1={{0x28}}, @common=@ttl={{0x28}}]}, @unspec=@CT0={0x48}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@dev}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x300) 08:15:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x10}}, 0x0) [ 1509.387671][T14545] x_tables: ip_tables: mac match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT/FORWARD [ 1509.495863][T14551] loop4: detected capacity change from 0 to 4096 [ 1509.530470][T14551] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1509.547175][T14551] EXT4-fs (loop4): mount failed [ 1509.758217][T14563] loop1: detected capacity change from 0 to 3792 08:15:18 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_key={0x1, 0x8, 0x2}]}, 0x30}}, 0x0) 08:15:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x8, 0x0, 0x0, 0x2}, 0x10}, 0x8}, 0x0) 08:15:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000006800010200000000004b00000a00000000000000080005001b76"], 0x20}}, 0x0) 08:15:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x553, 0x3}, 0x0) setrlimit(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x161242, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x4000000000010046) 08:15:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$netlink(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000000100)=[{0x0, 0x2}, {&(0x7f0000000540)={0x10}, 0x10}], 0x2}, 0x0) [ 1509.991283][T14578] loop4: detected capacity change from 0 to 4096 [ 1510.041587][T14578] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1510.056955][T14578] EXT4-fs (loop4): mount failed 08:15:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') read$FUSE(r0, &(0x7f0000000580)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 08:15:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x17}]}, 0x18}}, 0x0) 08:15:18 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:15:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:18 executing program 2: syz_read_part_table(0x0, 0x5, &(0x7f0000000740)=[{&(0x7f0000000100)="c8404a1c2ebfebed699f1343ec38e10b56b40f406ec126bfc9b4299f058599db8307d65fc4a7bb4da375f8b00437e094254eb7ace1cea41f4dfa97f3d383dbb13489757599303206ae778b43dad1c415cd3d14e3d45aaa279a3e63e642644e9b2174be4e6678e436d0575684966cdcde9c477a29012ae7a25d7883dc4444c197e1e5441583c040", 0x87, 0x1ff}, {&(0x7f00000001c0)="f8701beb0d50c537b2e1199a3a404a19675e6143775fda3840771acc7745283f4064f23e30756f5904fcce555cbf111e8dfca1487142091c700e767b2286e56b853ae4c3af0116c19afd9a395b6d", 0x4e, 0x9}, {&(0x7f0000000280)="5fd8e704017140961c89fc93e853280a615a26b5612c9b4db3695b373708828dcc9d102a97c91452f7269aee0eb5b0996c837ad1b14e7b1566c4ccf6aae92b699c58d691b9288c37e513172d8bd4f0565148256584865015f7549fd1ac5a66f1ccc3c7504aad0dc1472fca44f843f5d27e152f75244f49ca8333cf4424bbcc6cf652fef1035bb316709252cd39fb06f1cede345ba4f53483e19d5e46d52f016ed35407a9ec3e5e901a297c23", 0xac}, {0x0, 0x25}, {0x0}]) [ 1510.379011][T14601] loop4: detected capacity change from 0 to 4096 [ 1510.408677][T14601] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1510.424172][T14601] EXT4-fs (loop4): mount failed [ 1510.700897][T14613] loop1: detected capacity change from 0 to 3792 08:15:19 executing program 2: syz_read_part_table(0x0, 0x5, &(0x7f0000000740)=[{&(0x7f0000000100)="c8404a1c2ebfebed699f1343ec38e10b56b40f406ec126bfc9b4299f058599db8307d65fc4a7bb4da375f8b00437e094254eb7ace1cea41f4dfa97f3d383dbb13489757599303206ae778b43dad1c415cd3d14e3d45aaa279a3e63e642644e9b2174be4e6678e436d0575684966cdcde9c477a29012ae7a25d7883dc4444c197e1e5441583c040", 0x87, 0x1ff}, {&(0x7f00000001c0)="f8701beb0d50c537b2e1199a3a404a19675e6143775fda3840771acc7745283f4064f23e30756f5904fcce555cbf111e8dfca1487142091c700e767b2286e56b853ae4c3af0116c19afd9a395b6d", 0x4e, 0x9}, {&(0x7f0000000280)="5fd8e704017140961c89fc93e853280a615a26b5612c9b4db3695b373708828dcc9d102a97c91452f7269aee0eb5b0996c837ad1b14e7b1566c4ccf6aae92b699c58d691b9288c37e513172d8bd4f0565148256584865015f7549fd1ac5a66f1ccc3c7504aad0dc1472fca44f843f5d27e152f75244f49ca8333cf4424bbcc6cf652fef1035bb316709252cd39fb06f1cede345ba4f53483e19d5e46d52f016ed35407a9ec3e5e901a297c23", 0xac}, {0x0, 0x25}, {0x0}]) 08:15:19 executing program 0: syz_read_part_table(0x3, 0xc203, &(0x7f0000000740)=[{&(0x7f0000000100)="c8404a1c2ebfebed699f1343ec38e10b56b40f406ec126bfc9b4299f058599db8307d65fc4a7bb4da375f8b00437e094254eb7ace1cea41f4dfa97f3d383dbb13489757599303206ae778b43dad1c415cd3d14e3d45aaa279a3e63e642644e9b2174be4e6678e436d0575684966cdcde9c477a29012ae7a25d7883dc4444c197e1e5441583c040", 0x87, 0x1ff}, {&(0x7f00000001c0)="f8701beb0d50c537b2e1199a3a404a19675e6143775fda3840771acc7745283f4064f23e30756f5904fcce555cbf111e8dfca1487142091c700e767b2286e56b853ae4c3af0116c19afd9a395b6d", 0x4e, 0x9}, {&(0x7f0000000280)="5fd8e704017140961c89fc93e853280a615a26b5612c9b4db3695b373708828dcc9d102a97c91452f7269aee0eb5b0996c837ad1b14e7b1566c4ccf6aae92b699c58d691b9288c37e513172d8bd4f0565148256584865015f7549fd1ac5a66f1ccc3c7504aad0dc1472fca44f843f5d27e152f75244f49ca8333cf4424bbcc6cf652fef1035bb316709252cd39fb06f1cede345ba4f53483e19d5e46d52f016ed35407a9ec3e5e901a297c23", 0xac}, {0x0}, {0x0}]) 08:15:19 executing program 3: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getpgid(r1) r4 = fcntl$getown(r3, 0x9) sched_setattr(r4, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) 08:15:19 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:19 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0xc0102, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 08:15:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:19 executing program 2: syz_read_part_table(0x0, 0x5, &(0x7f0000000740)=[{&(0x7f0000000100)="c8404a1c2ebfebed699f1343ec38e10b56b40f406ec126bfc9b4299f058599db8307d65fc4a7bb4da375f8b00437e094254eb7ace1cea41f4dfa97f3d383dbb13489757599303206ae778b43dad1c415cd3d14e3d45aaa279a3e63e642644e9b2174be4e6678e436d0575684966cdcde9c477a29012ae7a25d7883dc4444c197e1e5441583c040", 0x87, 0x1ff}, {&(0x7f00000001c0)="f8701beb0d50c537b2e1199a3a404a19675e6143775fda3840771acc7745283f4064f23e30756f5904fcce555cbf111e8dfca1487142091c700e767b2286e56b853ae4c3af0116c19afd9a395b6d", 0x4e, 0x9}, {&(0x7f0000000280)="5fd8e704017140961c89fc93e853280a615a26b5612c9b4db3695b373708828dcc9d102a97c91452f7269aee0eb5b0996c837ad1b14e7b1566c4ccf6aae92b699c58d691b9288c37e513172d8bd4f0565148256584865015f7549fd1ac5a66f1ccc3c7504aad0dc1472fca44f843f5d27e152f75244f49ca8333cf4424bbcc6cf652fef1035bb316709252cd39fb06f1cede345ba4f53483e19d5e46d52f016ed35407a9ec3e5e901a297c23", 0xac}, {0x0, 0x25}, {0x0}]) [ 1510.950302][T14624] loop4: detected capacity change from 0 to 4096 [ 1510.985644][T14624] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 08:15:19 executing program 2: syz_read_part_table(0x0, 0x5, &(0x7f0000000740)=[{&(0x7f0000000100)="c8404a1c2ebfebed699f1343ec38e10b56b40f406ec126bfc9b4299f058599db8307d65fc4a7bb4da375f8b00437e094254eb7ace1cea41f4dfa97f3d383dbb13489757599303206ae778b43dad1c415cd3d14e3d45aaa279a3e63e642644e9b2174be4e6678e436d0575684966cdcde9c477a29012ae7a25d7883dc4444c197e1e5441583c040", 0x87, 0x1ff}, {&(0x7f00000001c0)="f8701beb0d50c537b2e1199a3a404a19675e6143775fda3840771acc7745283f4064f23e30756f5904fcce555cbf111e8dfca1487142091c700e767b2286e56b853ae4c3af0116c19afd9a395b6d", 0x4e, 0x9}, {&(0x7f0000000280)="5fd8e704017140961c89fc93e853280a615a26b5612c9b4db3695b373708828dcc9d102a97c91452f7269aee0eb5b0996c837ad1b14e7b1566c4ccf6aae92b699c58d691b9288c37e513172d8bd4f0565148256584865015f7549fd1ac5a66f1ccc3c7504aad0dc1472fca44f843f5d27e152f75244f49ca8333cf4424bbcc6cf652fef1035bb316709252cd39fb06f1cede345ba4f53483e19d5e46d52f016ed35407a9ec3e5e901a297c23", 0xac}, {0x0, 0x25}, {0x0}]) [ 1511.000745][T14624] EXT4-fs (loop4): mount failed 08:15:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:19 executing program 2: socket(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="74000000280027a0c00000000000000080000000", @ANYRES32], 0x74}}, 0x0) 08:15:19 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x59, 0x103000) read$usbmon(r0, 0x0, 0x0) [ 1511.227250][T14646] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:19 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000100)={0x2, 0x4, 0x4, 0x1ff}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x7, &(0x7f0000000000)=@framed={{}, [@func, @map={0x18, 0x0, 0x2, 0x0, r0}, @exit]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1511.350415][T14651] loop4: detected capacity change from 0 to 4096 [ 1511.386368][T14651] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). 08:15:19 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = getpgid(r1) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x0, 0x3, 0x80000000, 0x5}, 0x0) fcntl$getown(r3, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) [ 1511.396511][T14651] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1511.411330][T14651] EXT4-fs (loop4): mount failed 08:15:20 executing program 0: r0 = fork() tkill(r0, 0x41) 08:15:20 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x1, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040), 0x3, 0x84400) ioctl$MON_IOCX_GET(r0, 0x4b47, 0x0) [ 1512.812332][T14690] loop1: detected capacity change from 0 to 3792 08:15:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:21 executing program 0: r0 = fork() tkill(r0, 0x41) 08:15:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="1810000007"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:15:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x2, 0x6, 0xff, 0x0, 0x2, 0x0, 0x20000}, 0x10}}, 0x0) 08:15:21 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = getpgid(r1) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x0, 0x3, 0x80000000, 0x5}, 0x0) fcntl$getown(r3, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) [ 1513.039850][T14701] loop4: detected capacity change from 0 to 4096 [ 1513.108873][T14701] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1513.120028][T14701] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1513.135090][T14701] EXT4-fs (loop4): mount failed 08:15:21 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = getpgid(r1) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x0, 0x3, 0x80000000, 0x5}, 0x0) fcntl$getown(r3, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) 08:15:21 executing program 5: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = getpgid(r1) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x0, 0x3, 0x80000000, 0x5}, 0x0) fcntl$getown(r3, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) 08:15:21 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@initr0]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:15:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:21 executing program 0: r0 = fork() tkill(r0, 0x41) [ 1513.740754][T14735] loop4: detected capacity change from 0 to 4096 08:15:22 executing program 3: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @sco, 0xffff}) [ 1513.819878][T14735] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1513.829770][T14735] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1513.844766][T14735] EXT4-fs (loop4): mount failed [ 1514.932018][T14758] loop1: detected capacity change from 0 to 3792 08:15:23 executing program 0: r0 = fork() tkill(r0, 0x41) 08:15:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:23 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x4240, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)) 08:15:23 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = getpgid(r1) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x0, 0x3, 0x80000000, 0x5}, 0x0) fcntl$getown(r3, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) 08:15:23 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:23 executing program 5: socket(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = getpgid(r1) sched_setattr(r4, &(0x7f0000000180)={0x38, 0x0, 0x8, 0x0, 0x3, 0x80000000, 0x5}, 0x0) fcntl$getown(r3, 0x9) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x3, 0x20, 0x0, 0x200, 0xe200, 0x7, 0x200000000, 0x100000}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, &(0x7f0000000480)=""/110, 0xfffffe32, 0x700, 0x0, 0xfffffffffffffecb) sendto$inet(r0, &(0x7f00000002c0)="53ed12d8447c02506bb48a55b2d715c28e9df4703730cf870677ac60bab01b994265891f9ab1eb255e9edad3aa069517b081aaa5597ad9fa95d1689af68a3b72eb8f6b6ca355c007aee2c8bb9655aaac72a926eae1f3378fc0af44d97efc9224586e5cd1a548a56102c59e9c45be8fb6a93963547f6d76d111bf4bda1063638af5c73d0d7f97", 0x86, 0x0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) [ 1515.147681][T14773] loop4: detected capacity change from 0 to 4096 [ 1515.176635][ T26] audit: type=1800 audit(1634372123.374:209): pid=14770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name=".pending_reads" dev="sda1" ino=15457 res=0 errno=0 [ 1515.244423][T14773] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1515.254163][T14773] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1515.269713][T14773] EXT4-fs (loop4): mount failed 08:15:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, &(0x7f0000000080)) 08:15:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1515.397745][ T26] audit: type=1800 audit(1634372123.434:210): pid=14770 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name=".pending_reads" dev="sda1" ino=15457 res=0 errno=0 08:15:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001600)={0x2020}, 0x2020) [ 1515.641613][T14795] loop4: detected capacity change from 0 to 4096 [ 1515.680994][T14795] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1515.690851][T14795] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1515.706093][T14795] EXT4-fs (loop4): mount failed 08:15:23 executing program 3: syz_mount_image$udf(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000000c0)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) 08:15:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900", 0x10, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:24 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000006940)={0x2020, 0x0, 0x0, 0x0}, 0x2020) getresgid(&(0x7f0000008980), &(0x7f00000089c0), &(0x7f0000008a00)=0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000002380)="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", 0x2000, &(0x7f000000b140)={0x0, &(0x7f0000004400)={0x18, 0x0, 0x0, {0x80000000}}, &(0x7f0000004440)={0x18}, &(0x7f0000004480)={0x18, 0x0, 0x3, {0x9a}}, &(0x7f00000044c0)={0x18, 0x0, 0x0, {0x5}}, 0x0, &(0x7f0000004540)={0x60, 0x0, 0x7, {{0x0, 0x5, 0x7, 0x5, 0x1, 0x10001, 0x0, 0x2}}}, &(0x7f00000045c0)={0x18, 0x0, 0x100000001, {0x7f}}, 0x0, &(0x7f0000004640)={0x20, 0x0, 0x7fff}, &(0x7f00000066c0)={0x78, 0x0, 0x3, {0x4, 0x1, 0x0, {0x0, 0xff, 0x0, 0x1000, 0x0, 0x7, 0x0, 0xfff, 0x6, 0xf000, 0x0, 0x0, 0x0, 0x5}}}, 0x0, &(0x7f0000006800)={0x68, 0x0, 0x3f, [{0x0, 0xdb8a, 0xf, 0x4c8f, '\'-!$&(N(.+:}[:#'}, {0x0, 0x2}, {0x6, 0x8, 0x0, 0x8}]}, &(0x7f000000aa80)={0x5b8, 0xfffffffffffffff5, 0x100000000, [{{0x6, 0x0, 0x5, 0x2, 0x7fffffff, 0x0, {0x4, 0x2, 0x5, 0x4, 0x0, 0xd, 0xe6, 0xffff3260, 0x7fff, 0xa000, 0x2c96, 0x0, 0x0, 0x1, 0x6}}, {0x6, 0xa7, 0x1, 0x0, '\xeb'}}, {{0x0, 0x2, 0x8, 0x7f, 0x0, 0x4, {0x1, 0x4, 0x0, 0x8, 0x6, 0x9, 0x2, 0x6, 0x1, 0xa000, 0x69bab704, 0x0, 0x0, 0xfffffffd}}, {0x6, 0xf05, 0x11, 0x1ff, '$[!^}:.\'!-&+[.*,+'}}, {{0x6, 0x2, 0x65, 0x0, 0x7, 0x2040, {0x0, 0x4, 0x8000, 0x10001, 0x9, 0x8, 0x5, 0x401, 0x5, 0x2000, 0x0, 0x0, 0x0, 0x8000, 0x7fff}}, {0x3, 0x10001, 0x0, 0x200}}, {{0x3, 0x0, 0x1f, 0x40, 0x715004e8, 0x2, {0x3, 0x0, 0x275f, 0x19f, 0x0, 0x5, 0x1000, 0x9, 0x8001, 0x6000, 0x100, 0x0, 0x0, 0x7ff, 0x5}}, {0x4, 0x7, 0x7, 0x7, '$\'+}\xca\')'}}, {{0x2, 0x1, 0x3, 0x5115760e, 0x20, 0x7, {0x4, 0x79, 0x6, 0x0, 0x401, 0x3, 0x7, 0xfffffffe, 0x10000, 0x1000, 0xfffffffd, 0x0, 0x0, 0x401, 0x2}}, {0x2, 0x20, 0x6, 0x7, '\a/,,\xc8*'}}, {{0x1, 0x3, 0x3, 0x6, 0x4c, 0xb1, {0x6, 0xad8c, 0x0, 0x4, 0x1f, 0x6, 0x70, 0xfffffff9, 0x40, 0xf000, 0x6, r0, r1, 0x22de, 0x9c62}}, {0x1, 0x7f, 0x1, 0xffffffff, '&'}}, {{0x0, 0x1, 0x8, 0x8001, 0x8000, 0x2, {0x2, 0x4, 0x7, 0x1, 0x6, 0x8, 0x9, 0xfa, 0x4, 0x6000, 0x8, 0x0, 0x0, 0x2}}, {0x2, 0xffffffffffffffc0, 0x5, 0x0, '!\xdf-+,'}}, {{0x3, 0x1, 0x1000, 0x4, 0x40, 0x1, {0x2, 0x453c, 0x1000, 0x400, 0x7, 0x6, 0x4, 0xbd61, 0x0, 0x9000, 0x9960, 0xee00, 0x0, 0x7}}, {0x5, 0xe21, 0x5, 0x2, '!.\')]'}}, {{0x1, 0x1, 0x400, 0x80000001, 0x7fff, 0x3, {0x3, 0xfd7, 0x5e045052, 0x3f, 0x2, 0x1, 0x10001, 0x0, 0x84a, 0xa000, 0x6, 0x0, 0x0, 0x5, 0x5}}, {0x1, 0x2, 0x4, 0x2, '[%$%'}}]}, &(0x7f000000b040)={0xa0, 0x0, 0x4, {{0x0, 0x0, 0x8c9, 0x64, 0x3ff, 0x3ff, {0x6, 0x2, 0xfff, 0x2, 0x1ff, 0x6, 0x7af, 0x8, 0x3, 0x2000, 0x80000000, 0x0, 0x0, 0x4, 0x9}}, {0x0, 0x1c}}}, &(0x7f000000b100)={0x20, 0x0, 0xf69f, {0x1, 0x4, 0x80000001, 0x7}}}) syz_mount_image$vfat(&(0x7f000000b200), &(0x7f000000b240)='./file0\x00', 0x7, 0x2, &(0x7f000000b3c0)=[{&(0x7f000000b280)="7707d6ee120af10466d564ce3d4c14c7a455d7f0aae798072468b10e263980c5ad8f42656166775052bce85c0c1371ab33d4b1ecf916ebbc6409ad5d300639e56fcb484aa85572d7dd03ee14062dbc8e41979af789d14405732234aa1f0e2df5bfd8cedc54592d3c33a53de50872cf53a6f04e745855d879dbf09ace4a16ac1b665bc322cdd12397da145ea54376273e799d916c0bd796197fac9f9b69945b5ae7c680bb273d81d3135c56503b0b348214dc0fcde94f1648a8500ecfdc5149ed82629a3bc57f05", 0xc7, 0xfff}, {&(0x7f000000b380)="e811242012e3", 0x6, 0xc2}], 0x80, &(0x7f000000b400)={[{@utf8}, {@nonumtail}, {@iocharset={'iocharset', 0x3d, 'cp874'}}, {@shortname_lower}, {@shortname_winnt}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@obj_user={'obj_user', 0x3d, '&'}}]}) 08:15:24 executing program 3: syz_mount_image$udf(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000ac0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}}) fork() [ 1515.956897][T14809] loop4: detected capacity change from 0 to 4096 [ 1516.010956][T14809] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1516.021281][T14809] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1516.036153][T14809] EXT4-fs (loop4): mount failed 08:15:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000a040)={0x0, 0x0, &(0x7f0000009f80)=[{&(0x7f00000053c0)={0x14, 0x38, 0x1, 0x0, 0x0, "", [@generic='Y']}, 0x14}], 0x1}, 0x0) 08:15:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffd}]}) prctl$PR_GET_NO_NEW_PRIVS(0x27) [ 1516.406612][T14832] loop4: detected capacity change from 0 to 4096 [ 1516.443314][T14832] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1516.452976][T14832] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1516.468677][T14832] EXT4-fs (loop4): mount failed [ 1516.507488][ T26] audit: type=1326 audit(1634372124.704:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14829 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe58f3a8a39 code=0xffff0000 08:15:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:25 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:15:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 08:15:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:25 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/ipc\x00') 08:15:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)={[{@iocharset={'iocharset', 0x3d, 'utf8'}}, {@rodir}, {@utf8no}]}) 08:15:25 executing program 2: r0 = socket(0x1, 0x3, 0x0) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x4000081) 08:15:25 executing program 2: r0 = socket(0x18, 0x0, 0x4) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, 0x0) [ 1517.106753][ T26] audit: type=1326 audit(1634372125.304:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14852 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff802d1da39 code=0xffff0000 [ 1517.143014][T14858] loop4: detected capacity change from 0 to 4096 [ 1517.186065][T14858] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1517.197323][T14858] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1517.212779][T14858] EXT4-fs (loop4): mount failed 08:15:25 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x4240, 0x0) syncfs(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x84100, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x80, 0x7f, 0x8e, 0x4, 0x3f, 0x0, 0x56, 0x400, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x44cd, 0x1, @perf_config_ext={0x5, 0x7}, 0x2400, 0x401, 0x0, 0x7, 0x0, 0xffff7fff, 0x2, 0x0, 0x8000, 0x0, 0x81}, 0xffffffffffffffff, 0xc, r1, 0x3) 08:15:25 executing program 3: r0 = socket(0x11, 0xa, 0x0) recvmmsg(r0, &(0x7f000000c280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 08:15:25 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 08:15:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) [ 1517.368924][ T26] audit: type=1800 audit(1634372125.564:213): pid=14874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=".pending_reads" dev="sda1" ino=15475 res=0 errno=0 [ 1517.487592][ T26] audit: type=1800 audit(1634372125.674:214): pid=14874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=".pending_reads" dev="sda1" ino=15475 res=0 errno=0 08:15:25 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000", 0x13, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x1, 0x3, 0x101}, 0x14}}, 0x0) 08:15:25 executing program 0: syz_emit_ethernet(0x8e, &(0x7f00000000c0)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fd6e23", 0x58, 0x6, 0x0, @loopback, @private1, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0xca, 0x7, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x11, 0xf989, "59f5ce9b768baadcbf99714cd4"}, @exp_smc={0xfe, 0x6}, @generic={0x0, 0x2}, @timestamp={0x8, 0xa}, @sack={0x5, 0x1e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 08:15:25 executing program 5: syz_mount_image$udf(0x0, 0x0, 0x0, 0x2, &(0x7f0000000b00)=[{&(0x7f0000000700)="82", 0x1, 0xfdae}, {&(0x7f00000007c0)='k', 0x1, 0x80000001}], 0x0, 0x0) 08:15:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="40ea73d24002d066b3fb992eaf7eaddbd465a6e0", 0x14, 0x2}, {&(0x7f00000008c0)="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", 0x16d, 0x93}], 0x0, &(0x7f0000000280)={[{@iocharset={'iocharset', 0x3d, 'utf8'}}, {@rodir}, {@utf8no}]}) [ 1517.704911][T14894] loop4: detected capacity change from 0 to 4096 08:15:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000200)={"52945b7cc0518dcde6be0314887eee43"}) [ 1517.748710][T14894] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1517.759031][T14894] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1517.774311][T14894] EXT4-fs (loop4): mount failed 08:15:26 executing program 0: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) 08:15:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = gettid() sendmsg$netlink(r0, &(0x7f0000005840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000057c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 08:15:26 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) read$char_usb(r0, &(0x7f0000000180)=""/19, 0x13) 08:15:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) 08:15:26 executing program 2: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @l2tp={0x2, 0x0, @local}, @nl, 0xffff, 0x0, 0x0, 0x0, 0x3}) 08:15:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:26 executing program 0: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00'}) 08:15:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:26 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000002700)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 1518.391401][T14932] loop4: detected capacity change from 0 to 4096 [ 1518.410108][ T26] audit: type=1326 audit(1634372126.604:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14924 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8347b5ca39 code=0xffff0000 08:15:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="4400000001020101000021000000000002000000300001802c0001"], 0x44}}, 0x0) [ 1518.470132][T14932] Quota error (device loop4): v2_read_file_info: Free block number too big (0 >= 0). [ 1518.480186][T14932] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1518.495203][T14932] EXT4-fs (loop4): mount failed 08:15:26 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f000000b500), 0xffffffffffffffff) 08:15:26 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0xfffffffe}]}) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{0x0}]) 08:15:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000006c0), 0x4) [ 1518.559922][T14943] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1518.582332][T14943] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:26 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@dev, @remote, @val={@void}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "7df2f7aedc753794b8eedc55127e65d1ef7fe44b687a2a5b1da9b08a05ece91287b7dc63a4df3555e926e396b9cbf0ef58ff5b2e56214cf7356b66bd969a9920"}}}}, 0x0) 08:15:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:26 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, 0x0) [ 1518.699164][ T26] audit: type=1326 audit(1634372126.894:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14947 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe58f3a8a39 code=0xffff0000 08:15:27 executing program 2: syz_mount_image$hfsplus(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000440)={[{@creator={'creator', 0x3d, "20852ce9"}}]}) 08:15:27 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x4240, 0x0) syncfs(r0) openat$full(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 08:15:27 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001180)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f00000031c0)={0x2020}, 0x2020) [ 1518.850068][T14959] loop4: detected capacity change from 0 to 4096 [ 1518.881631][T14959] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1518.897489][T14959] EXT4-fs (loop4): mount failed [ 1519.160415][T14977] loop1: detected capacity change from 0 to 3792 08:15:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="00006c6f775f7574696d653d3030303030303030303030302c757466383d312c666d6173703d30303030313030303030303030302000000000000000302c00060881e7e6820657f37c74cd19314b620a329e286f154d8d118d1b65929de3040ebaaf5be08c3992c9730ae211059914518c037876d8fa51ce14fc26563d6da682810f0c2037877884a66055193237000fca927485288efe2a73a2c9e173c0d9765fc08612d6230309010000008000fcb5014e16764636937835e03b39edaef2432d05f354382f989e2f9d2528d9f4005a0cf9347fa40169d72e1c2bc46aaf5e01f12f0baaeb6fc070221b2ff858ae6eac0ff2927596585871cc9ceadeda79ce87cf0d1f59a76058a9812000000000ac9934660ccc4b038a98bf6306e429c0b8b66f02160b75eeff2960040fffd630d12a0bdcd0be25ee7e82add46d15c84daac77e68dc303d8ddacfd5543b478c6be45dd68e760d654ae2000000000000009626249fc1c3b67552bd87fdcf7da5dbda942f775b429e40106d2ef6fd97786725bd7456fa36310b01000000f3bcfd6d348d7a6e675c0d9a69a2160c742205ccc88996285122356dea5537824a0dd2561ee388cb39b0facc491c8d60087a310ab2b3c459dac63c37af1c9a45d4a6170d581dd13c33eb6f4b139c09bfd7616683b8813805d9c689e4714a9fc7bab139dd41822191ed0a8272fc4eeaea17389bf8007b244d52dca9b0d9fcac667f86b8597c670bce06a3234c687723002a0eef9a416b0f5b4e28ec9ad2e363f2cbbb883242ace63ec9a2b44028e1c30687c3eacfe8e188583c0a854b5130866baefbfb23432ab76f98b5e33be4015e4faeaa8f37679499f89eb1b7e6bcd3bdce6404fe391298e4b8f0975dc989cd0b0b06808ab291b1da058493e102a9fbeec347c9d979147386b177af0c74c70000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:27 executing program 0: futex(&(0x7f0000000000)=0x1, 0x8b, 0x1, &(0x7f0000000040)={0x0, 0x3938700}, 0x0, 0x0) 08:15:27 executing program 2: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'vlan0\x00'}) 08:15:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a090000000000", 0x14, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:27 executing program 5: r0 = add_key$keyring(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000010c0), &(0x7f0000001100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) add_key$user(&(0x7f0000000700), 0x0, 0x0, 0x0, r0) 08:15:27 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000002180)='ns/pid\x00') [ 1519.361859][T14990] loop4: detected capacity change from 0 to 4096 08:15:27 executing program 2: r0 = socket(0x28, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000140)) [ 1519.402122][T14990] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1519.422239][T14990] EXT4-fs (loop4): mount failed 08:15:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:27 executing program 2: futex(&(0x7f0000000000)=0x1, 0x88, 0x0, 0x0, 0x0, 0x0) 08:15:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = gettid() sendmsg$netlink(r0, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee00}}}], 0x20}, 0x0) 08:15:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x6, 0x1, 0x101}, 0x14}}, 0x0) 08:15:27 executing program 5: syz_emit_ethernet(0x45, &(0x7f00000002c0)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @dev, @remote}, "3f8bf11ad774ad"}}}}}, 0x0) [ 1519.623568][T15004] loop4: detected capacity change from 0 to 4096 [ 1519.657373][T15004] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1519.672498][T15004] EXT4-fs (loop4): mount failed [ 1519.960370][T15025] loop1: detected capacity change from 0 to 3792 08:15:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:28 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000001140), 0x0, 0x2141) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000001180)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "504835a7a4dbd71499743efec8bcb0f6973d349ca869f50b31db85dc028bdc2970cfc99139effc1ee542e6468cc2701cb5cb43996e0055ce16ae79fc8f56fa5c", "0aad012bd69a619ff2e98e5bb99954e0b76e62a2b252620203c5a4d051bd7122"}) 08:15:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 08:15:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x6, 0x1, 0x101}, 0x14}}, 0x0) 08:15:28 executing program 0: syz_open_dev$loop(&(0x7f0000001140), 0x0, 0x0) 08:15:28 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004480)={0x2020}, 0xffffff5a) [ 1520.136756][T15038] loop4: detected capacity change from 0 to 4096 [ 1520.183672][T15038] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1520.199313][T15038] EXT4-fs (loop4): mount failed 08:15:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x6, 0x1, 0x101}, 0x14}}, 0x0) 08:15:28 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaaaaaaaaab9b, &(0x7f00000002c0)=[{&(0x7f0000000000)="a924a92a71a2d0ed376d019cce4518853d6d93cd39dbe767aa7ffbc96727389866961372a8e13e9d17ec4541ef435a8cbf35291d826859c234b0f0ccfe58804f58b076d0024a4cf64f0ce71124f0b00509c54239145fef2fab85f7ff9887ba28d8d7d360b5f840da9638a8cbf7c32ac785e68c671dd83a5dc4932e64fa", 0x0, 0x20}, {&(0x7f0000000100)="df8702d608c06711c62a75f7c3d106087e87671596ee4e88a1cb6b7f1f5a06f40f112fdb77dab321fb48a7b96a22457df187489755747d82023b840e384761b90b890eb79a076e1407", 0x0, 0x9}, {&(0x7f0000000180)="c61972c595f259112aa2fe9da698ad69ba1126a29b05ee1329aa7babc101746612c68c1720f65071f79e35e7e08486a81d9bb4d56fb30174afeadd1b056b833c3d8a72e69cd13bc913e2cb4ca7f656955984714bd4d111ae1876a2cd91cd18019116b1a652fceff045bd2bcca1dee969e6f48413792b9bf186e270c10980fb9c4cf8dde6d876b710ea1df4271d0a51c11dfa30d63eec15228f325ecc76230864e0f175633311e4267dbe10fcfee2b3d445096f8a08e628", 0x0, 0x401}, {&(0x7f0000000240)="e89c6bf6c7fd4b6cd783cbc1f396a494d40fb06566fb7baa033872a5e7312c24f49828176a8d65fa2ef6a9a55465c9d1ac9ede051926af2b911e508e81f103591e58ebe5a7417414dd49", 0x0, 0x9}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6e6c733d63703837347558a00912af3146194240f81a8d8ccb822b9687448d164a3d01002fa657a704afac2e7e4f3363e62c7cecd60e166d97010d44b9bea213b6f3d69c1b538a44ba77b96a4f2ebe5d6c66e746482aa124b689089fed4c6d2f6f300719ec7b22cb8a8366de83a7bcd095288b88f457e53829c77a2b9fa5144dbaf5c972"]) 08:15:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 08:15:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x6, 0x1, 0x101}, 0x14}}, 0x0) [ 1520.498796][T15055] loop4: detected capacity change from 0 to 4096 [ 1520.533186][T15055] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1520.548286][T15055] EXT4-fs (loop4): mount failed [ 1521.401918][T15072] loop1: detected capacity change from 0 to 3792 08:15:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x5a8, 0x390, 0x190, 0xffffffff, 0x280, 0x390, 0x4d8, 0x4d8, 0xffffffff, 0x4d8, 0x4d8, 0x5, 0x0, {[{{@uncond, 0x0, 0x148, 0x190, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'macvtap0\x00', {0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0xf2a9}}}, @common=@hbh={{0x48}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@private2, @gre_key}}}, {{@ipv6={@local, @remote, [], [], 'syzkaller1\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv6=@private1, @icmp_id, @gre_key}}}, {{@ipv6={@mcast2, @mcast2, [], [], 'veth1_virt_wifi\x00', 'bond_slave_0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "7e94"}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f543bb27270d13c23bc9b235b028dc3f1567a920b4ee252ee64ccb0f17e4"}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@srh={{0x30}}, @common=@ipv6header={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@dev, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) 08:15:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x3, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "96"}, @func, @typedef]}, {0x0, [0x0]}}, 0x0, 0xc3}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 08:15:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x290, 0x100, 0xffffffff, 0xffffffff, 0x100, 0xffffffff, 0x1f8, 0xffffffff, 0xffffffff, 0x1f8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x15, 0x0, 0x0, 0x0, 'syz1\x00', 'syz0\x00'}}}, {{@ip={@loopback, @loopback, 0x0, 0x0, 'netdevsim0\x00', 'veth1_to_hsr\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) 08:15:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000b00)=""/102, &(0x7f0000000b80)=0x66) 08:15:29 executing program 2: syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@multicast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010101, @dev}, @info_request}}}}, 0x0) [ 1521.617528][T15088] loop4: detected capacity change from 0 to 4096 [ 1521.632911][T15087] IPVS: length: 102 != 8 [ 1521.642066][T15089] x_tables: duplicate underflow at hook 3 08:15:29 executing program 2: r0 = msgget(0x2, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) [ 1521.658467][T15088] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1521.672846][T15088] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1521.689290][T15088] EXT4-fs (loop4): mount failed 08:15:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x5a8, 0x390, 0x190, 0xffffffff, 0x280, 0x390, 0x4d8, 0x4d8, 0xffffffff, 0x4d8, 0x4d8, 0x5, 0x0, {[{{@uncond, 0x0, 0x148, 0x190, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'macvtap0\x00', {0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0xf2a9}}}, @common=@hbh={{0x48}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@private2, @gre_key}}}, {{@ipv6={@local, @remote, [], [], 'syzkaller1\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv6=@private1, @icmp_id, @gre_key}}}, {{@ipv6={@mcast2, @mcast2, [], [], 'veth1_virt_wifi\x00', 'bond_slave_0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "7e94"}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f543bb27270d13c23bc9b235b028dc3f1567a920b4ee252ee64ccb0f17e4"}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@srh={{0x30}}, @common=@ipv6header={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@dev, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) 08:15:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f00000000c0), &(0x7f0000000580)=0x8) 08:15:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) connect$inet(r1, &(0x7f0000000100)={0x10, 0x2}, 0x10) 08:15:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1522.024696][T15117] loop4: detected capacity change from 0 to 4096 [ 1522.070412][T15117] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1522.081967][T15117] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1522.097816][T15117] EXT4-fs (loop4): mount failed 08:15:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x88) 08:15:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x5a8, 0x390, 0x190, 0xffffffff, 0x280, 0x390, 0x4d8, 0x4d8, 0xffffffff, 0x4d8, 0x4d8, 0x5, 0x0, {[{{@uncond, 0x0, 0x148, 0x190, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'macvtap0\x00', {0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0xf2a9}}}, @common=@hbh={{0x48}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@private2, @gre_key}}}, {{@ipv6={@local, @remote, [], [], 'syzkaller1\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv6=@private1, @icmp_id, @gre_key}}}, {{@ipv6={@mcast2, @mcast2, [], [], 'veth1_virt_wifi\x00', 'bond_slave_0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "7e94"}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f543bb27270d13c23bc9b235b028dc3f1567a920b4ee252ee64ccb0f17e4"}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@srh={{0x30}}, @common=@ipv6header={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@dev, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) 08:15:30 executing program 3: fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) [ 1522.429791][T15131] loop1: detected capacity change from 0 to 32760 08:15:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1522.549719][T15140] loop4: detected capacity change from 0 to 4096 [ 1522.576738][T15140] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 08:15:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket$unix(0x1, 0x2, 0x0) r3 = dup2(r0, r2) sendto$inet(r3, &(0x7f0000000280)="a9", 0x1, 0x0, &(0x7f0000001280)={0x10, 0x2}, 0x10) dup2(r1, r3) dup2(r2, r0) [ 1522.589118][T15140] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1522.604050][T15140] EXT4-fs (loop4): mount failed 08:15:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0x356}, 0x98) 08:15:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a80)=@nat={'nat\x00', 0x1b, 0x5, 0x5a8, 0x390, 0x190, 0xffffffff, 0x280, 0x390, 0x4d8, 0x4d8, 0xffffffff, 0x4d8, 0x4d8, 0x5, 0x0, {[{{@uncond, 0x0, 0x148, 0x190, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'macvtap0\x00', {0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0xf2a9}}}, @common=@hbh={{0x48}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@private2, @gre_key}}}, {{@ipv6={@local, @remote, [], [], 'syzkaller1\x00', 'veth1_macvtap\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv6=@private1, @icmp_id, @gre_key}}}, {{@ipv6={@mcast2, @mcast2, [], [], 'veth1_virt_wifi\x00', 'bond_slave_0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "7e94"}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f543bb27270d13c23bc9b235b028dc3f1567a920b4ee252ee64ccb0f17e4"}}, {{@uncond, 0x0, 0x100, 0x148, 0x0, {}, [@common=@srh={{0x30}}, @common=@ipv6header={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@loopback, @ipv4=@dev, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x608) 08:15:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1) 08:15:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)=@in={0x10, 0x2}, 0x10) [ 1522.824807][T15161] loop4: detected capacity change from 0 to 4096 [ 1522.848874][T15161] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1522.860423][T15161] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 08:15:31 executing program 2: fchownat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) [ 1522.882158][T15161] EXT4-fs (loop4): mount failed 08:15:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) sendto(r1, 0x0, 0x0, 0x100, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 08:15:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 08:15:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x10, 0x2}, 0x10) [ 1523.510782][T15194] loop1: detected capacity change from 0 to 32760 08:15:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000100), 0x90) 08:15:31 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/7, 0x7}], 0x1) connect$inet6(r0, &(0x7f0000000340)={0x1c, 0x1c, 0x2}, 0x1c) 08:15:31 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) bind(r2, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 08:15:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0xffffffffffffffff}, 0xd) 08:15:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="00006c6f775f7574696d653d3030303030303030303030302c757466383d312c666d6173703d30303030313030303030303030302000000000000000302c00060881e7e6820657f37c74cd19314b620a329e286f154d8d118d1b65929de3040ebaaf5be08c3992c9730ae211059914518c037876d8fa51ce14fc26563d6da682810f0c2037877884a66055193237000fca927485288efe2a73a2c9e173c0d9765fc08612d6230309010000008000fcb5014e16764636937835e03b39edaef2432d05f354382f989e2f9d2528d9f4005a0cf9347fa40169d72e1c2bc46aaf5e01f12f0baaeb6fc070221b2ff858ae6eac0ff2927596585871cc9ceadeda79ce87cf0d1f59a76058a9812000000000ac9934660ccc4b038a98bf6306e429c0b8b66f02160b75eeff2960040fffd630d12a0bdcd0be25ee7e82add46d15c84daac77e68dc303d8ddacfd5543b478c6be45dd68e760d654ae2000000000000009626249fc1c3b67552bd87fdcf7da5dbda942f775b429e40106d2ef6fd97786725bd7456fa36310b01000000f3bcfd6d348d7a6e675c0d9a69a2160c742205ccc88996285122356dea5537824a0dd2561ee388cb39b0facc491c8d60087a310ab2b3c459dac63c37af1c9a45d4a6170d581dd13c33eb6f4b139c09bfd7616683b8813805d9c689e4714a9fc7bab139dd41822191ed0a8272fc4eeaea17389bf8007b244d52dca9b0d9fcac667f86b8597c670bce06a3234c687723002a0eef9a416b0f5b4e28ec9ad2e363f2cbbb883242ace63ec9a2b44028e1c30687c3eacfe8e188583c0a854b5130866baefbfb23432ab76f98b5e33be4015e4faeaa8f37679499f89eb1b7e6bcd3bdce6404fe391298e4b8f0975dc989cd0b0b06808ab291b1da058493e102a9fbeec347c9d979147386b177af0c74c70000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) [ 1523.687199][T15212] loop4: detected capacity change from 0 to 4096 08:15:31 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='vegas\x00', 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='htcp\x00', 0x5) [ 1523.734618][T15212] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1523.746585][T15212] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1523.761546][T15212] EXT4-fs (loop4): mount failed 08:15:32 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000580), &(0x7f00000005c0)=0x18) 08:15:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000840), &(0x7f0000000900)=0x98) 08:15:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000000)='\a', 0x1, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 08:15:32 executing program 3: r0 = socket(0x2, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0xffffffffffffff77, 0x2}, 0x10) dup2(r1, r0) sendto$inet(r0, &(0x7f00000002c0)="b0", 0x1, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 08:15:32 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 08:15:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:32 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000180)='dctcp\x00', 0x6) 08:15:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$sock_int(r2, 0xffff, 0x40, &(0x7f0000000000), 0x4) 08:15:32 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$inet_sctp(r1, &(0x7f0000003500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@prinfo={0x14}], 0x14}, 0x0) [ 1524.125455][T15254] loop4: detected capacity change from 0 to 4096 [ 1524.155355][T15254] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1524.166783][T15254] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1524.182446][T15254] EXT4-fs (loop4): mount failed 08:15:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000000)=0x9, 0x4) 08:15:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, 0x0, 0x1c}, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x100) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@sndrcv={0x2c}], 0x2c}, 0x0) 08:15:33 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x14, &(0x7f0000000240), 0x4) 08:15:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 08:15:33 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000008c0)={0x1c, 0x1c, 0x1}, 0x1c) [ 1524.840105][T15291] loop1: detected capacity change from 0 to 32760 08:15:33 executing program 2: poll(&(0x7f0000000140), 0x41, 0x0) 08:15:33 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @random="ff0010079200", @val, {@ipv4}}, 0x0) [ 1525.032109][T15307] loop4: detected capacity change from 0 to 4096 [ 1525.057681][T15307] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1525.089072][T15307] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1525.104879][T15307] EXT4-fs (loop4): mount failed 08:15:33 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/103, 0x67}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 08:15:33 executing program 2: r0 = getpgrp(0x0) wait4(r0, 0x0, 0xd, 0x0) 08:15:33 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)}, 0x0) 08:15:33 executing program 2: r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) [ 1525.767290][T15342] loop1: detected capacity change from 0 to 32760 08:15:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 08:15:34 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 08:15:34 executing program 2: syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60a63b5f00202c008516b5b3d544bb90a6f1552d346a63aa54ab596e0000d0cde4529cb2bd16c9707a64c1"], 0x0) 08:15:34 executing program 3: unshare(0x6c060000) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 08:15:34 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000006f80)=[{{0x0, 0x0, &(0x7f0000005700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}}], 0x1, 0x0, 0x0) 08:15:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[{0x88, 0x1, 0x0, "ce96ab83f115423488b55c5cbeaff378f8e4a411a8d23dc287ff3c53292cd694cb7c902f46425343b85b5ff8c3f4e26752e166544713889eb88c411c629e14de98362ff9d480afb1e8d9f9e24c9b552ac4537cca963661b1def1de176fa6a5e1e4bf06feecaf92b9a7014cbc196bda8444"}, {0x60, 0x0, 0x0, "5288122451d7999cca490c28741e3bfddd8aac571b01a7653ee5545f054abf96c84d5575de047a14d14ca917044a78c829122ee196e4d6902e17a62611aeaa922f6966dd76ff64bd8e"}], 0xe8}, 0x0) [ 1525.952275][T15359] loop4: detected capacity change from 0 to 4096 08:15:34 executing program 2: capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x20}) [ 1526.009104][T15359] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1526.020659][T15359] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1526.035606][T15359] EXT4-fs (loop4): mount failed 08:15:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:34 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40100, 0x0) 08:15:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14, 0x3, 0x8, 0x201}, 0x14}}, 0x0) [ 1526.379491][T15406] loop4: detected capacity change from 0 to 4096 [ 1526.437231][T15406] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1526.449008][T15406] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 1526.463899][T15406] EXT4-fs (loop4): mount failed [ 1526.872954][T15423] loop1: detected capacity change from 0 to 32760 08:15:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) getpid() mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:35 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20088881, &(0x7f00000000c0)={0xa, 0x4e1d, 0x0, @remote}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 08:15:35 executing program 0: syz_emit_ethernet(0x23, &(0x7f0000000000)={@random="bfee317cfbfe", @remote, @val, {@ipv4}}, 0x0) 08:15:35 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001940)=[{0x10}, {0x10}], 0x20}, 0x180) 08:15:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000002480), 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/161) 08:15:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000002480), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000100)={0x0, 0x1, &(0x7f0000000000)="ca"}) [ 1527.064049][T15437] loop4: detected capacity change from 0 to 4096 [ 1527.095556][T15437] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 08:15:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000280), &(0x7f00000002c0)=0x40) [ 1527.111501][T15437] EXT4-fs (loop4): mount failed 08:15:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001400)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x16, 0x0, 0x0, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}, @mptcp=@mp_join, @timestamp={0x8, 0xa}, @mss, @md5sig={0x13, 0x4, "91d785d58954605c802acf9f965fe399"}]}}}}}}}, 0x0) 08:15:35 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "097304d5f3c2a9db6f020f226a07e709297b2aa1719ef0abe129d1676ef53b2a195bfa15520f4c7a7d6eca1ee80ba52879faaeb72c801f2c084f8474f76821df"}, 0x48, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "097304d5f3c2a9db6f020f226a07e709297b2aa1719ef0abe129d1676ef53b2a195bfa15520f4c7a7d6eca1ee80ba52879faaeb72c801f2c084f8474f76821df"}, 0x48, 0xfffffffffffffffd) 08:15:35 executing program 3: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) 08:15:35 executing program 2: socketpair(0x10, 0x0, 0x0, &(0x7f0000001780)) 08:15:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="00006c6f775f7574696d653d3030303030303030303030302c757466383d312c666d6173703d30303030313030303030303030302000000000000000302c00060881e7e6820657f37c74cd19314b620a329e286f154d8d118d1b65929de3040ebaaf5be08c3992c9730ae211059914518c037876d8fa51ce14fc26563d6da682810f0c2037877884a66055193237000fca927485288efe2a73a2c9e173c0d9765fc08612d6230309010000008000fcb5014e16764636937835e03b39edaef2432d05f354382f989e2f9d2528d9f4005a0cf9347fa40169d72e1c2bc46aaf5e01f12f0baaeb6fc070221b2ff858ae6eac0ff2927596585871cc9ceadeda79ce87cf0d1f59a76058a9812000000000ac9934660ccc4b038a98bf6306e429c0b8b66f02160b75eeff2960040fffd630d12a0bdcd0be25ee7e82add46d15c84daac77e68dc303d8ddacfd5543b478c6be45dd68e760d654ae2000000000000009626249fc1c3b67552bd87fdcf7da5dbda942f775b429e40106d2ef6fd97786725bd7456fa36310b01000000f3bcfd6d348d7a6e675c0d9a69a2160c742205ccc88996285122356dea5537824a0dd2561ee388cb39b0facc491c8d60087a310ab2b3c459dac63c37af1c9a45d4a6170d581dd13c33eb6f4b139c09bfd7616683b8813805d9c689e4714a9fc7bab139dd41822191ed0a8272fc4eeaea17389bf8007b244d52dca9b0d9fcac667f86b8597c670bce06a3234c687723002a0eef9a416b0f5b4e28ec9ad2e363f2cbbb883242ace63ec9a2b44028e1c30687c3eacfe8e188583c0a854b5130866baefbfb23432ab76f98b5e33be4015e4faeaa8f37679499f89eb1b7e6bcd3bdce6404fe391298e4b8f0975dc989cd0b0b06808ab291b1da058493e102a9fbeec347c9d979147386b177af0c74c70000"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:38 executing program 2: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) 08:15:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000200)={0x8001}, 0x10) 08:15:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000300)={&(0x7f0000000040), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r1, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x24}}, 0x0) 08:15:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01edff000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00', @ANYBLOB="0000001100000700000000000000003d2603"], 0x44}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) [ 1530.267606][T15474] loop1: detected capacity change from 0 to 32760 [ 1530.424135][T15490] loop4: detected capacity change from 0 to 4096 08:15:38 executing program 2: unshare(0x6c060000) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="4001000024000b0f000000000000f1e041681846", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001"], 0x140}}, 0x0) [ 1530.465893][T15490] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1530.481358][T15490] EXT4-fs (loop4): mount failed 08:15:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x65, 0x0, 0x0) [ 1530.533924][ T26] kauditd_printk_skb: 4 callbacks suppressed [ 1530.533939][ T26] audit: type=1804 audit(1634372138.734:219): pid=15498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir935529271/syzkaller.kuUTD7/2626/cgroup.controllers" dev="sda1" ino=15523 res=1 errno=0 08:15:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:38 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x30, 0x0, &(0x7f0000000680)) [ 1530.677153][T15505] netlink: 272 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01edff000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00', @ANYBLOB="0000001100000700000000000000003d2603"], 0x44}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) [ 1530.808795][T15526] loop4: detected capacity change from 0 to 4096 [ 1530.844925][T15526] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 08:15:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000007c0)={@ipv4={'\x00', '\xff\xff', @dev}}, 0x14) [ 1530.859995][T15526] EXT4-fs (loop4): mount failed [ 1531.148205][ T26] audit: type=1804 audit(1634372139.344:220): pid=15545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir935529271/syzkaller.kuUTD7/2627/cgroup.controllers" dev="sda1" ino=15513 res=1 errno=0 [ 1531.500258][T15553] loop1: detected capacity change from 0 to 3792 08:15:40 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0), 0x4) 08:15:40 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x208800) select(0x40, &(0x7f0000002b40)={0x7e}, 0x0, 0x0, &(0x7f0000002c00)) 08:15:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:40 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0xc, 0x0, &(0x7f0000000680)) 08:15:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01edff000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00', @ANYBLOB="0000001100000700000000000000003d2603"], 0x44}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) 08:15:40 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, 0x0, 0x0, "bb32487de22f54a7cac732b382f9fa571c2845ac63c7caa631e7918935bfb4df90308b1f5825f103d1dae84332a0d000", "4e3291dcd90c1c40699ebd73721541900c9473457bd89bc8a9040000000000000065d163f202d6fa79041d2505978d65a8633381c3345fb938272231bced7a1b", "e6c6880f43fb50f7057fe9e32d55077cda5720aef52025920da9d237086f0156"}) 08:15:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x103, 0x0) finit_module(r0, 0x0, 0x0) [ 1532.586813][T15568] loop4: detected capacity change from 0 to 4096 [ 1532.625046][T15568] EXT4-fs error (device loop4): ext4_ext_check_inode:460: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1532.644335][T15568] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1532.656504][T15568] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1532.671386][T15568] EXT4-fs (loop4): mount failed [ 1532.690768][T15580] ------------[ cut here ]------------ [ 1532.705273][T15580] WARNING: CPU: 0 PID: 15580 at fs/read_write.c:429 __kernel_read+0x907/0xb30 [ 1532.725718][T15580] Modules linked in: 08:15:40 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x9, 0x0, &(0x7f0000000680)) 08:15:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 1532.753248][T15580] CPU: 0 PID: 15580 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 1532.774451][T15580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:15:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0xee00, 0x0) [ 1532.808056][T15580] RIP: 0010:__kernel_read+0x907/0xb30 [ 1532.827446][T15580] Code: 8b e8 4d 9a 2c 02 31 ff 89 c3 89 c6 e8 52 9e ad ff 85 db 0f 85 4a 86 2c 07 49 c7 c5 ea ff ff ff e9 bc fe ff ff e8 f9 96 ad ff <0f> 0b 49 c7 c5 ea ff ff ff e9 a9 fe ff ff e8 e6 96 ad ff 48 89 ea [ 1532.850070][ T26] audit: type=1804 audit(1634372141.044:221): pid=15581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir935529271/syzkaller.kuUTD7/2628/cgroup.controllers" dev="sda1" ino=15532 res=1 errno=0 [ 1532.881230][T15580] RSP: 0018:ffffc9000633fb40 EFLAGS: 00010216 [ 1532.897945][T15580] RAX: 0000000000008f72 RBX: 00000000001dad70 RCX: ffffc9000db14000 [ 1532.952608][T15580] RDX: 0000000000040000 RSI: ffffffff81c94117 RDI: 0000000000000003 [ 1533.013703][T15580] RBP: 000000004808801c R08: 0000000000000000 R09: 0000000000008000 [ 1533.035618][T15594] loop4: detected capacity change from 0 to 4096 08:15:41 executing program 5: semctl$SEM_STAT(0xffffffffffffffff, 0x2, 0x12, &(0x7f0000000040)=""/199) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000240)=0x10) semget(0x0, 0x2, 0x24d) [ 1533.061899][T15580] R10: ffffffff81c938f8 R11: 0000000000004000 R12: ffff888052d71180 [ 1533.086318][T15594] EXT4-fs error (device loop4): ext4_ext_check_inode:460: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1533.096308][T15580] R13: 0000000000000001 R14: ffffc9000633fd18 R15: 1ffff92000c67f6b [ 1533.115304][T15594] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1533.127127][T15594] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1533.139731][T15580] FS: 00007f7c74deb700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1533.142178][T15594] EXT4-fs (loop4): mount failed [ 1533.191878][T15580] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1533.213465][T15580] CR2: 000055732691e657 CR3: 000000007bfbb000 CR4: 0000000000350ef0 [ 1533.233691][T15580] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1533.252019][T15580] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1533.272201][T15580] Call Trace: [ 1533.280741][T15580] ? do_sendfile+0x1240/0x1240 [ 1533.309062][T15580] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1533.318971][T15580] ? __vmalloc_node_range+0x580/0x9e0 [ 1533.330612][T15580] ? fsnotify_perm.part.0+0x22d/0x620 [ 1533.338033][T15580] ? apparmor_file_permission+0x264/0x4e0 [ 1533.349310][T15580] kernel_read+0xbf/0x1d0 [ 1533.355867][T15580] kernel_read_file+0x3b8/0x790 [ 1533.360878][T15580] ? __ia32_sys_fsconfig+0x150/0x150 [ 1533.390891][T15580] kernel_read_file_from_fd+0x62/0xb0 [ 1533.420965][T15580] __do_sys_finit_module+0xed/0x1a0 [ 1533.433541][T15580] ? __do_sys_init_module+0x250/0x250 [ 1533.447543][T15580] ? syscall_enter_from_user_mode+0x21/0x70 [ 1533.462006][T15580] do_syscall_64+0x35/0xb0 [ 1533.480336][T15580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1533.517915][T15612] loop1: detected capacity change from 0 to 3792 [ 1533.526593][T15580] RIP: 0033:0x7f7c77875a39 [ 1533.550638][T15580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:15:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x100000000008d}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) read$FUSE(r0, &(0x7f0000001140)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r2, &(0x7f0000000240)='./file0\x00', 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x0, 0x7, 0x0, 0x0, 0x101, 0x3}, 0x0) sched_setattr(r1, &(0x7f0000000140)={0x38, 0x3, 0x1, 0x8, 0xd09, 0x8, 0x0, 0x719}, 0x0) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) socket$inet6(0xa, 0x2, 0x0) 08:15:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x400) 08:15:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400", 0x2e, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) setxattr$trusted_overlay_upper(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0), &(0x7f00000013c0)=ANY=[], 0xd8, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:15:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x2003}, 0x4) 08:15:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="48040000", @ANYRES16=r3, @ANYBLOB="01edff000000000004003b1c210008000300", @ANYRES32=r2, @ANYBLOB="2c0433005000de295b3acba52ee4080211000001505050505050"], 0x448}}, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00', @ANYBLOB="0000001100000700000000000000003d2603"], 0x44}}, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x28011, r0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r5, r4, 0x0, 0x10000a006) [ 1533.601646][T15580] RSP: 002b:00007f7c74deb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 1533.620412][T15580] RAX: ffffffffffffffda RBX: 00007f7c77978f60 RCX: 00007f7c77875a39 [ 1533.639170][T15580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1533.701652][T15580] RBP: 00007f7c778cfc5f R08: 0000000000000000 R09: 0000000000000000 [ 1533.738737][T15580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1533.772989][T15625] loop4: detected capacity change from 0 to 4096 [ 1533.777716][T15580] R13: 00007ffff0b9e3ff R14: 00007f7c74deb300 R15: 0000000000022000 [ 1533.811724][T15580] Kernel panic - not syncing: panic_on_warn set ... [ 1533.818518][T15580] CPU: 0 PID: 15580 Comm: syz-executor.2 Not tainted 5.15.0-rc5-syzkaller #0 [ 1533.818920][T15625] EXT4-fs error (device loop4): ext4_ext_check_inode:460: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 1533.827282][T15580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1533.827297][T15580] Call Trace: [ 1533.827305][T15580] dump_stack_lvl+0xcd/0x134 [ 1533.827333][T15580] panic+0x2b0/0x6dd [ 1533.827354][T15580] ? __warn_printk+0xf3/0xf3 [ 1533.827383][T15580] ? __warn.cold+0x1a/0x44 [ 1533.827404][T15580] ? __kernel_read+0x907/0xb30 [ 1533.827428][T15580] __warn.cold+0x35/0x44 [ 1533.846340][T15625] EXT4-fs error (device loop4): ext4_quota_enable:6315: comm syz-executor.4: Bad quota inode # 3 [ 1533.855921][T15580] ? __kernel_read+0x907/0xb30 [ 1533.855947][T15580] report_bug+0x1bd/0x210 [ 1533.855977][T15580] handle_bug+0x3c/0x60 [ 1533.856000][T15580] exc_invalid_op+0x14/0x40 [ 1533.856021][T15580] asm_exc_invalid_op+0x12/0x20 [ 1533.856045][T15580] RIP: 0010:__kernel_read+0x907/0xb30 [ 1533.856068][T15580] Code: 8b e8 4d 9a 2c 02 31 ff 89 c3 89 c6 e8 52 9e ad ff 85 db 0f 85 4a 86 2c 07 49 c7 c5 ea ff ff ff e9 bc fe ff ff e8 f9 96 ad ff <0f> 0b 49 c7 c5 ea ff ff ff e9 a9 fe ff ff e8 e6 96 ad ff 48 89 ea [ 1533.859662][T15625] EXT4-fs warning (device loop4): ext4_enable_quotas:6352: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 1533.863952][T15580] RSP: 0018:ffffc9000633fb40 EFLAGS: 00010216 [ 1533.863973][T15580] RAX: 0000000000008f72 RBX: 00000000001dad70 RCX: ffffc9000db14000 [ 1533.863991][T15580] RDX: 0000000000040000 RSI: ffffffff81c94117 RDI: 0000000000000003 [ 1533.864008][T15580] RBP: 000000004808801c R08: 0000000000000000 R09: 0000000000008000 [ 1533.864022][T15580] R10: ffffffff81c938f8 R11: 0000000000004000 R12: ffff888052d71180 [ 1533.864037][T15580] R13: 0000000000000001 R14: ffffc9000633fd18 R15: 1ffff92000c67f6b [ 1533.864056][T15580] ? __kernel_read+0xe8/0xb30 [ 1533.868568][T15625] EXT4-fs (loop4): mount failed [ 1533.872574][T15580] ? __kernel_read+0x907/0xb30 [ 1534.018391][T15580] ? do_sendfile+0x1240/0x1240 [ 1534.023154][T15580] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1534.029389][T15580] ? __vmalloc_node_range+0x580/0x9e0 [ 1534.034766][T15580] ? fsnotify_perm.part.0+0x22d/0x620 [ 1534.040133][T15580] ? apparmor_file_permission+0x264/0x4e0 [ 1534.045850][T15580] kernel_read+0xbf/0x1d0 [ 1534.050366][T15580] kernel_read_file+0x3b8/0x790 [ 1534.055299][T15580] ? __ia32_sys_fsconfig+0x150/0x150 [ 1534.060579][T15580] kernel_read_file_from_fd+0x62/0xb0 [ 1534.065962][T15580] __do_sys_finit_module+0xed/0x1a0 [ 1534.071159][T15580] ? __do_sys_init_module+0x250/0x250 [ 1534.076541][T15580] ? syscall_enter_from_user_mode+0x21/0x70 [ 1534.082428][T15580] do_syscall_64+0x35/0xb0 [ 1534.086833][T15580] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1534.092718][T15580] RIP: 0033:0x7f7c77875a39 [ 1534.097382][T15580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1534.116975][T15580] RSP: 002b:00007f7c74deb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 1534.125376][T15580] RAX: ffffffffffffffda RBX: 00007f7c77978f60 RCX: 00007f7c77875a39 [ 1534.133336][T15580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1534.141468][T15580] RBP: 00007f7c778cfc5f R08: 0000000000000000 R09: 0000000000000000 [ 1534.149425][T15580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1534.157383][T15580] R13: 00007ffff0b9e3ff R14: 00007f7c74deb300 R15: 0000000000022000 [ 1534.166415][T15580] Kernel Offset: disabled [ 1534.170728][T15580] Rebooting in 86400 seconds..