Warning: Permanently added '[localhost]:25985' (ECDSA) to the list of known hosts. 2021/10/16 17:05:37 fuzzer started 2021/10/16 17:05:40 dialing manager at localhost:39863 2021/10/16 17:05:40 checking machine... 2021/10/16 17:05:40 checking revisions... 2021/10/16 17:05:42 testing simple program... [ 228.199415][ T3709] cgroup: Unknown subsys name 'net' [ 228.544616][ T3709] cgroup: Unknown subsys name 'rlimit' executing program executing program [ 233.658284][ T3712] chnl_net:caif_netlink_parms(): no params data found [ 234.131905][ T3712] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.154565][ T3712] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.184856][ T3712] device bridge_slave_0 entered promiscuous mode [ 234.248406][ T3712] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.263662][ T3712] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.282479][ T3712] device bridge_slave_1 entered promiscuous mode [ 234.624338][ T3712] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.694436][ T3712] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.864964][ T3712] team0: Port device team_slave_0 added [ 234.950877][ T3712] team0: Port device team_slave_1 added [ 235.207012][ T85] Bluetooth: hci0: command 0x0409 tx timeout [ 235.287510][ T3712] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 235.309181][ T3712] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.410080][ T3712] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 235.453899][ T3712] batman_adv: batadv0: Adding interface: batadv_slave_1 executing program [ 235.476288][ T3712] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 235.588450][ T3712] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 235.915493][ T3712] device hsr_slave_0 entered promiscuous mode [ 235.967650][ T3712] device hsr_slave_1 entered promiscuous mode [ 236.645470][ T3712] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 236.749278][ T3712] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 236.800032][ T3712] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 236.841200][ T3712] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 237.212417][ T3712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.253114][ T3712] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.282458][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.296118][ T85] Bluetooth: hci0: command 0x041b tx timeout [ 237.321142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.374470][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.410936][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.450686][ T1387] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.465497][ T1387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.489304][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.519558][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.560105][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.619605][ T1387] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.657059][ T1387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.758365][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.784285][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.899010][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.922281][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.953095][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.985103][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.020412][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.043940][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.075587][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.116546][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.169764][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.230711][ T3712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.293675][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.314946][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.351890][ T3712] 8021q: adding VLAN 0 to HW filter on device batadv0 executing program [ 238.449643][ T85] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 238.501576][ T85] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.575440][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 238.614691][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.665081][ T3712] device veth0_vlan entered promiscuous mode [ 238.713167][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.738653][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.781723][ T3712] device veth1_vlan entered promiscuous mode [ 238.917831][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 238.966898][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 239.015241][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 239.051689][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 239.111560][ T3712] device veth0_macvtap entered promiscuous mode [ 239.185315][ T3712] device veth1_macvtap entered promiscuous mode [ 239.228843][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 239.260278][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 239.396188][ T32] Bluetooth: hci0: command 0x040f tx timeout [ 239.409010][ T3712] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 239.465587][ T3721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 239.512166][ T3721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 239.561335][ T3712] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 239.584351][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 239.616042][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 239.651697][ T3712] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.674022][ T3712] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.712868][ T3712] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.748517][ T3712] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.380605][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 240.390877][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 240.443773][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 240.596541][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 240.622196][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 240.667263][ T85] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 241.466330][ T85] Bluetooth: hci0: command 0x0419 tx timeout executing program 2021/10/16 17:05:55 building call list... [ 242.059435][ T9] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 243.805754][ T3712] syz-executor.0 (3712) used greatest stack depth: 22112 bytes left [ 243.890547][ T9] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.053894][ T9] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 244.202125][ T9] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program executing program [ 248.371376][ T9] device hsr_slave_0 left promiscuous mode [ 248.398270][ T9] device hsr_slave_1 left promiscuous mode [ 248.484252][ T9] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 248.493653][ T9] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 248.587260][ T9] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 248.598595][ T9] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 248.642536][ T9] device bridge_slave_1 left promiscuous mode [ 248.670234][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.716215][ T9] device bridge_slave_0 left promiscuous mode [ 248.728385][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.811528][ T9] device veth1_macvtap left promiscuous mode [ 248.830568][ T9] device veth0_macvtap left promiscuous mode [ 248.866067][ T9] device veth1_vlan left promiscuous mode [ 248.890723][ T9] device veth0_vlan left promiscuous mode executing program [ 250.609607][ T9] team0 (unregistering): Port device team_slave_1 removed [ 250.651887][ T9] team0 (unregistering): Port device team_slave_0 removed [ 250.799728][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 250.852010][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 251.300045][ T9] bond0 (unregistering): Released all slaves executing program [ 255.147346][ T3706] can: request_module (can-proto-0) failed. [ 255.290347][ T3706] can: request_module (can-proto-0) failed. [ 255.369505][ T3706] can: request_module (can-proto-0) failed. executing program 2021/10/16 17:06:19 syscalls: 3642 2021/10/16 17:06:19 code coverage: enabled 2021/10/16 17:06:19 comparison tracing: enabled 2021/10/16 17:06:19 extra coverage: enabled 2021/10/16 17:06:19 setuid sandbox: enabled 2021/10/16 17:06:19 namespace sandbox: enabled 2021/10/16 17:06:19 Android sandbox: /sys/fs/selinux/policy does not exist 2021/10/16 17:06:19 fault injection: enabled 2021/10/16 17:06:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/10/16 17:06:19 net packet injection: enabled 2021/10/16 17:06:19 net device setup: enabled 2021/10/16 17:06:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/10/16 17:06:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/10/16 17:06:19 USB emulation: enabled 2021/10/16 17:06:19 hci packet injection: enabled 2021/10/16 17:06:19 wifi device emulation: enabled 2021/10/16 17:06:19 802.15.4 emulation: enabled 2021/10/16 17:06:19 fetching corpus: 0, signal 0/0 (executing program) 2021/10/16 17:06:19 fetching corpus: 0, signal 0/0 (executing program) [ 280.288232][ T1482] ieee802154 phy0 wpan0: encryption failed: -22 [ 280.356542][ T1482] ieee802154 phy1 wpan1: encryption failed: -22 2021/10/16 17:06:35 starting 4 fuzzer processes 17:06:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:06:41 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) [ 289.353583][ T3935] chnl_net:caif_netlink_parms(): no params data found 17:06:43 executing program 2: bpf$MAP_CREATE(0xe0030000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x7989, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20000000}, 0x40) [ 290.078600][ T3935] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.114557][ T3935] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.150836][ T3935] device bridge_slave_0 entered promiscuous mode [ 290.191066][ T3935] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.227646][ T3935] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.274180][ T3935] device bridge_slave_1 entered promiscuous mode [ 290.504704][ T3732] Bluetooth: hci0: command 0x0409 tx timeout [ 290.583688][ T3935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.632367][ T3935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.014004][ T3935] team0: Port device team_slave_0 added [ 291.043104][ T3935] team0: Port device team_slave_1 added [ 291.382636][ T3935] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 291.414694][ T3935] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.519627][ T3935] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 291.582635][ T3935] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 291.661072][ T3935] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.778489][ T3935] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 292.216729][ T3935] device hsr_slave_0 entered promiscuous mode [ 292.277009][ T3935] device hsr_slave_1 entered promiscuous mode [ 292.583578][ T32] Bluetooth: hci0: command 0x041b tx timeout 17:06:46 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) [ 293.543143][ T3944] chnl_net:caif_netlink_parms(): no params data found [ 293.946172][ T3725] Bluetooth: hci1: command 0x0409 tx timeout [ 294.655139][ T3944] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.659154][ T3732] Bluetooth: hci0: command 0x040f tx timeout [ 294.688404][ T3944] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.690648][ T3944] device bridge_slave_0 entered promiscuous mode [ 294.714552][ T3944] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.786765][ T3944] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.822898][ T3944] device bridge_slave_1 entered promiscuous mode [ 295.231910][ T3944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 295.302561][ T3944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 295.747332][ T3944] team0: Port device team_slave_0 added [ 295.942486][ T3935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.026270][ T1387] Bluetooth: hci1: command 0x041b tx timeout [ 296.123950][ T3944] team0: Port device team_slave_1 added [ 296.283691][ T3944] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 296.310144][ T3944] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 296.420015][ T3944] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 296.478010][ T3944] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 296.505313][ T3944] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 296.573595][ T3944] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 296.702823][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.737051][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.742695][ T3732] Bluetooth: hci0: command 0x0419 tx timeout [ 296.785595][ T3935] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.191565][ T3944] device hsr_slave_0 entered promiscuous mode [ 297.238736][ T3944] device hsr_slave_1 entered promiscuous mode [ 297.266723][ T3944] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 297.278506][ T3944] Cannot create hsr debugfs directory [ 297.472275][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.501818][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.541072][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.555643][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.630461][ T3721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.644583][ T3721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.668297][ T3721] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.684403][ T3721] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.710746][ T3721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.845053][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.864538][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 298.071652][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 298.083904][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 298.113101][ T3732] Bluetooth: hci2: command 0x0409 tx timeout [ 298.139917][ T3732] Bluetooth: hci1: command 0x040f tx timeout [ 298.233136][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 298.262616][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 298.283845][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 298.636478][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.661251][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.882722][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.958843][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 299.059003][ T3935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 299.610262][ T3957] chnl_net:caif_netlink_parms(): no params data found [ 300.196692][ T3732] Bluetooth: hci2: command 0x041b tx timeout [ 300.273525][ T3732] Bluetooth: hci1: command 0x0419 tx timeout [ 300.366330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 300.399215][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 300.503896][ T3935] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 300.634398][ T3944] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 300.743436][ T3962] Bluetooth: hci3: command 0x0409 tx timeout [ 301.065212][ T3944] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 301.138932][ T3957] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.176232][ T3957] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.187193][ T3957] device bridge_slave_0 entered promiscuous mode [ 301.230992][ T3957] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.285778][ T3957] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.361944][ T3957] device bridge_slave_1 entered promiscuous mode [ 301.407253][ T3944] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 301.450482][ T3944] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 301.808162][ T3957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.831096][ T3961] chnl_net:caif_netlink_parms(): no params data found [ 301.942057][ T3957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.266542][ T3725] Bluetooth: hci2: command 0x040f tx timeout [ 302.293587][ T3957] team0: Port device team_slave_0 added [ 302.312513][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 302.431038][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 302.592337][ T3957] team0: Port device team_slave_1 added [ 302.826163][ T3962] Bluetooth: hci3: command 0x041b tx timeout [ 303.025759][ T3957] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 303.056403][ T3957] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 303.134485][ T3957] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 303.274105][ T3961] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.312257][ T3961] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.339994][ T3961] device bridge_slave_0 entered promiscuous mode [ 303.397171][ T3957] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 303.416389][ T3957] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 303.572391][ T3957] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 303.747739][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 303.758438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 303.803045][ T3961] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.825601][ T3961] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.848296][ T3961] device bridge_slave_1 entered promiscuous mode [ 304.079842][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.092097][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.232074][ T3957] device hsr_slave_0 entered promiscuous mode [ 304.284821][ T3957] device hsr_slave_1 entered promiscuous mode [ 304.341356][ T3962] Bluetooth: hci2: command 0x0419 tx timeout [ 304.351841][ T3957] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 304.383610][ T3957] Cannot create hsr debugfs directory [ 304.422213][ T3935] device veth0_vlan entered promiscuous mode [ 304.449275][ T3961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.596826][ T3961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.896178][ T3725] Bluetooth: hci3: command 0x040f tx timeout [ 304.908007][ T3935] device veth1_vlan entered promiscuous mode [ 305.016349][ T3961] team0: Port device team_slave_0 added [ 305.041617][ T3961] team0: Port device team_slave_1 added [ 305.082455][ T3944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.291314][ T3961] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 305.325359][ T3961] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.424144][ T3961] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 305.497267][ T3961] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 305.507950][ T3961] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 305.595606][ T3961] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 305.638337][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.657335][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.734355][ T3944] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.012456][ T3935] device veth0_macvtap entered promiscuous mode [ 306.178085][ T3961] device hsr_slave_0 entered promiscuous mode [ 306.236018][ T3961] device hsr_slave_1 entered promiscuous mode [ 306.262012][ T3961] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 306.271545][ T3961] Cannot create hsr debugfs directory [ 306.299458][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.314469][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.347899][ T32] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.377011][ T32] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.407076][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 306.478144][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 306.555160][ T3935] device veth1_macvtap entered promiscuous mode [ 306.654851][ T3935] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 306.677998][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.689985][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 306.726521][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.790650][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 306.834975][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 306.997330][ T3725] Bluetooth: hci3: command 0x0419 tx timeout [ 307.012795][ T3935] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 307.068246][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.123093][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.148830][ T3962] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.172653][ T3962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.209176][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.267935][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.439514][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.526847][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.557958][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 307.596857][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.640275][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.847695][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.861282][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.902455][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.947894][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.003567][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 308.020874][ T2059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.096536][ T3957] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 308.136720][ T3957] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 308.391857][ T3957] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 308.629146][ T3957] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 308.684696][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 308.716020][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 308.758149][ T3944] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.098550][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.122473][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.376810][ T3961] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 309.404054][ T3961] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 309.449066][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 309.507112][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 309.560173][ T3961] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 309.585825][ T3961] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 309.609712][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 309.640705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.682499][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.731069][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.773291][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.808930][ T3944] device veth0_vlan entered promiscuous mode [ 309.918473][ T3944] device veth1_vlan entered promiscuous mode [ 309.922878][ T3469] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 309.996710][ T3469] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.090338][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 310.142587][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 310.172247][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 310.228447][ T3944] device veth0_macvtap entered promiscuous mode [ 310.252491][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 310.269744][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.308103][ T1387] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 310.368933][ T3944] device veth1_macvtap entered promiscuous mode [ 310.534818][ T3957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.671807][ T3944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 310.751071][ T3944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.808313][ T3944] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 310.856655][ T3944] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 310.901768][ T3944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.970140][ T3944] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 311.005608][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.072560][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:07:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) [ 311.155491][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.186597][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.215820][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 311.258109][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.350920][ T3957] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.413206][ T3944] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.456898][ T3944] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.471895][ T3944] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.504882][ T3944] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 17:07:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) [ 311.709896][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.747593][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.778382][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.789691][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.802525][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.815027][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.828105][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.848643][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.891802][ T3961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.955602][ T85] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.980774][ T85] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 312.200013][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 312.333136][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.359817][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.399838][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 312.425796][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 312.491751][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 312.563357][ T3961] 8021q: adding VLAN 0 to HW filter on device team0 [ 312.611716][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 312.614296][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.672555][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 312.722514][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.774274][ T3723] bridge0: port 1(bridge_slave_0) entered blocking state 17:07:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) [ 312.804102][ T3723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.855198][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 312.888425][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 312.900564][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 312.996715][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 313.021033][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.073799][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.094903][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 313.126174][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.161294][ T3723] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.193776][ T3723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.326750][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.357101][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.386298][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 313.410400][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 313.440818][ T3957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.525805][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 313.575477][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 313.594018][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 313.674335][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.704598][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 313.749488][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.782854][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 313.820094][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.864298][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 313.879164][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.936913][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 313.993447][ T3722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.052386][ T3961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.162306][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.188687][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:07:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) [ 314.420652][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.476339][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:07:08 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) [ 314.548786][ T3957] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.587199][ T3961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.736891][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 17:07:08 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) [ 314.789610][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.862677][ T3991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.890101][ T3991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.961425][ T3961] device veth0_vlan entered promiscuous mode [ 315.000408][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 315.011689][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.043441][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.071394][ T32] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.166358][ T3961] device veth1_vlan entered promiscuous mode [ 315.233988][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 315.266917][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 315.315529][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.343123][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.372458][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.506487][ T3957] device veth0_vlan entered promiscuous mode [ 315.607433][ T3957] device veth1_vlan entered promiscuous mode [ 315.696380][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 315.711776][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 315.754141][ T3961] device veth0_macvtap entered promiscuous mode [ 315.801257][ T3961] device veth1_macvtap entered promiscuous mode [ 315.916068][ T3961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 315.942830][ T3961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 315.985264][ T3961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 316.025354][ T3961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.061095][ T3961] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 316.109821][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.149183][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 316.184794][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 316.224899][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 316.303636][ T3957] device veth0_macvtap entered promiscuous mode [ 316.415731][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 316.459390][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 316.509911][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 316.601149][ T3957] device veth1_macvtap entered promiscuous mode [ 316.672867][ T3961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.712518][ T3961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.765226][ T3961] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 316.810561][ T3961] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 316.876932][ T3961] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 316.921779][ T3961] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.988232][ T3961] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.015038][ T3961] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.038734][ T3961] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.089763][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.146692][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.229404][ T3725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.314150][ T3957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.353743][ T3957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.442506][ T3957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.496242][ T3957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.525488][ T3957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 317.560124][ T3957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.612853][ T3957] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 317.680994][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.711686][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.875092][ T3957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.924766][ T3957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 317.954035][ T3957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 317.976832][ T3957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.004506][ T3957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 318.048577][ T3957] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 318.104664][ T3957] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 318.158683][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 318.213702][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 318.325070][ T3957] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.372412][ T3957] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.389317][ T3957] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.406448][ T3957] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.546736][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 318.579405][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 318.736614][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 318.879463][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 318.893700][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 318.967835][ T3724] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 319.138685][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 319.180336][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 319.253298][ T3962] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 319.468158][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 319.515566][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 319.544811][ T3995] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:07:14 executing program 2: bpf$MAP_CREATE(0xe0030000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x7989, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20000000}, 0x40) 17:07:14 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) 17:07:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:14 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:14 executing program 2: bpf$MAP_CREATE(0xe0030000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x7989, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20000000}, 0x40) 17:07:14 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:15 executing program 2: bpf$MAP_CREATE(0xe0030000000000, &(0x7f00000000c0)={0x8, 0x4, 0x4, 0x7989, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x20000000}, 0x40) 17:07:15 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:15 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:16 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:16 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:16 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:17 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:17 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:18 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:18 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:18 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:18 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:19 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:19 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) 17:07:19 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:19 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:19 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) 17:07:19 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x4, [{}]}, 0x110) 17:07:20 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:20 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb}, {0xc, 0x2, [@TCA_DSMARK_INDICES={0x6, 0x1, 0x4000}]}}]}, 0x3c}}, 0x0) 17:07:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:23 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:24 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:24 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:24 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:24 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) 17:07:25 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:25 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:25 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:25 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:26 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:26 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:26 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:26 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:26 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:27 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:28 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:28 executing program 0: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:28 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_lsm={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:07:28 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:28 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:28 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:28 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:28 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800002, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) 17:07:29 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:29 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_lsm={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:07:31 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:31 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_lsm={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:07:32 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:32 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:32 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:32 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETTABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x1, 0xa, 0x3}, 0x14}}, 0x0) r2 = dup(r0) timerfd_gettime(r2, &(0x7f0000000080)) 17:07:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) 17:07:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 339.112329][ T4227] loop3: detected capacity change from 0 to 4096 17:07:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) [ 339.340898][ T4227] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 339.645450][ C1] hrtimer: interrupt took 33467 ns 17:07:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_lsm={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x4}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:07:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) 17:07:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) 17:07:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) 17:07:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) 17:07:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 341.297423][ T4256] loop3: detected capacity change from 0 to 4096 [ 341.403994][ T4256] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x2200c001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='reno\x00', 0x5) [ 341.607673][ T4264] loop0: detected capacity change from 0 to 4096 [ 341.707651][ T1482] ieee802154 phy0 wpan0: encryption failed: -22 [ 341.717597][ T1482] ieee802154 phy1 wpan1: encryption failed: -22 17:07:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 342.143291][ T4279] loop2: detected capacity change from 0 to 4096 [ 342.232563][ T4264] squashfs: Unknown parameter './cgroup.cpu/syz0' 17:07:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 342.808827][ T4292] loop1: detected capacity change from 0 to 4096 [ 342.824253][ T4293] loop0: detected capacity change from 0 to 4096 [ 342.869559][ T4295] loop3: detected capacity change from 0 to 4096 [ 343.043472][ T4281] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 343.186348][ T4292] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 343.205500][ T4293] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 343.431520][ T4295] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 343.794801][ T4324] loop2: detected capacity change from 0 to 4096 17:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 343.994778][ T4311] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 344.149532][ T4324] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 344.415168][ T4336] loop3: detected capacity change from 0 to 4096 [ 344.440736][ T4338] loop0: detected capacity change from 0 to 4096 17:07:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 344.708812][ T4347] loop1: detected capacity change from 0 to 4096 [ 344.727716][ T4336] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 345.007163][ T4347] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 345.279993][ T4361] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 345.508265][ T4366] loop2: detected capacity change from 0 to 4096 17:07:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 345.768497][ T4366] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 345.811400][ T4373] loop0: detected capacity change from 0 to 4096 [ 345.908100][ T4373] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 346.391726][ T4387] loop3: detected capacity change from 0 to 4096 [ 346.464029][ T4387] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 346.636242][ T4389] loop1: detected capacity change from 0 to 4096 17:07:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 347.228189][ T4402] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 347.365036][ T4408] loop2: detected capacity change from 0 to 4096 17:07:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 347.454809][ T4410] loop0: detected capacity change from 0 to 4096 17:07:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 347.649048][ T4408] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 347.755129][ T4410] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 347.932222][ T4425] loop1: detected capacity change from 0 to 4096 [ 348.009091][ T4429] loop3: detected capacity change from 0 to 4096 [ 348.395386][ T4429] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 348.732056][ T4425] squashfs: Unknown parameter './cgroup.cpu/syz0' 17:07:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 349.433184][ T4452] loop0: detected capacity change from 0 to 4096 [ 349.580590][ T4455] loop1: detected capacity change from 0 to 4096 17:07:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 349.603928][ T4452] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 349.740664][ T4461] loop2: detected capacity change from 0 to 4096 [ 349.838456][ T4464] loop3: detected capacity change from 0 to 4096 [ 349.948076][ T4455] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 350.102765][ T4461] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 350.183993][ T4464] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 351.323988][ T4493] loop1: detected capacity change from 0 to 4096 17:07:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 351.422060][ T4495] loop3: detected capacity change from 0 to 4096 [ 351.458998][ T4493] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 351.459301][ T4498] loop2: detected capacity change from 0 to 4096 [ 351.607150][ T4495] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 351.730373][ T4516] loop0: detected capacity change from 0 to 4096 [ 351.872600][ T4516] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 352.685404][ T4417] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1141: group 0, block bitmap and bg descriptor inconsistent: 32768 vs 25 free clusters 17:07:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 353.176743][ T4532] loop2: detected capacity change from 0 to 4096 [ 353.239360][ T4536] loop3: detected capacity change from 0 to 4096 [ 353.334817][ T4541] loop1: detected capacity change from 0 to 4096 [ 353.334925][ T4542] loop0: detected capacity change from 0 to 4096 [ 353.528964][ T4542] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 353.603623][ T4541] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 353.686624][ T4532] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 353.785008][ T4536] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 354.333211][ T4574] loop2: detected capacity change from 0 to 4096 17:07:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 354.544301][ T4574] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 354.801719][ T4584] loop3: detected capacity change from 0 to 4096 [ 355.041920][ T4590] loop0: detected capacity change from 0 to 4096 [ 355.046343][ T4588] loop1: detected capacity change from 0 to 4096 [ 355.456164][ T4590] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 355.741681][ T4584] squashfs: Unknown parameter './cgroup.cpu/syz0' 17:07:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 356.123371][ T4611] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 356.201554][ T4613] loop2: detected capacity change from 0 to 4096 17:07:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 356.743643][ T4622] loop3: detected capacity change from 0 to 4096 [ 356.852354][ T4613] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 356.855942][ T4628] loop0: detected capacity change from 0 to 4096 [ 356.879891][ T4622] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 356.951492][ T4632] loop1: detected capacity change from 0 to 4096 [ 357.162413][ T4632] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 357.331504][ T4628] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 358.111478][ T4654] loop2: detected capacity change from 0 to 4096 17:07:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 358.588748][ T4663] loop3: detected capacity change from 0 to 4096 [ 358.858178][ T4671] loop0: detected capacity change from 0 to 4096 17:07:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 359.326906][ T4663] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 359.392184][ T4671] squashfs: Unknown parameter './cgroup.cpu/syz0' [ 359.542401][ T4684] loop1: detected capacity change from 0 to 4096 17:07:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 359.894547][ T4688] loop2: detected capacity change from 0 to 4096 17:07:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 360.047445][ T4690] loop0: detected capacity change from 0 to 4096 [ 360.193140][ T4688] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 360.311530][ T4708] loop3: detected capacity change from 0 to 4096 [ 360.488128][ T4708] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 360.709214][ T4685] squashfs: Unknown parameter './cgroup.cpu/syz0' 17:07:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) 17:07:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 361.253044][ T4698] squashfs: Unknown parameter './cgroup.cpu/syz0' 17:07:55 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) [ 361.834886][ T4725] loop1: detected capacity change from 0 to 4096 [ 361.946130][ T4727] loop2: detected capacity change from 0 to 4096 [ 361.977383][ T4725] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 362.464954][ T4727] squashfs: Unknown parameter './cgroup.cpu/syz0' 17:07:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 363.036873][ T4747] ata1.00: non-matching transfer count (-513003755/0) 17:07:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) 17:07:57 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) 17:07:57 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) 17:07:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x94) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x14100, 0x116) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x8, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x85466e48f6b4432a}, 0x0, 0x401, 0x3, 0x0, 0x0, 0x200002, 0x0, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/217, 0xd9}, {&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000780)=""/129, 0x81}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x4, 0x8000, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@reiserfs_2={0x8, 0x2, {0x1000, 0x1}}, 0x882c2) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x1f, 0x1a11, 0x8, 0x7, 0x27e6}) r2 = fcntl$getown(r1, 0x9) r3 = open(&(0x7f00000018c0)='./file1\x00', 0x100, 0x12) openat$cgroup_subtree(r3, &(0x7f0000001900), 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/raw6\x00') perf_event_open(&(0x7f0000001840)={0x4, 0x80, 0x1, 0x0, 0x19, 0x5, 0x0, 0x7467, 0x410, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x3, 0x100000001}, 0x4000, 0x400080000000, 0x7, 0x2, 0x9, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1f}, r2, 0x8, r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000440), &(0x7f0000000480)='./bus\x00', 0x0, 0x1, &(0x7f0000000580)=[{0x0, 0x0, 0x5}], 0x0, &(0x7f0000000600)={[{'./cgroup.cpu/syz0\x00'}, {}], [{@pcr={'pcr', 0x3d, 0x3}}, {@audit}, {@hash}, {@uid_gt}, {@subj_user={'subj_user', 0x3d, '}Z'}}, {@fowner_lt={'fowner<', 0xee00}}, {@uid_gt={'uid>', 0xee01}}, {@uid_lt}]}) [ 363.469996][ T4750] ata1.00: non-matching transfer count (-513003755/0) 17:07:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 363.729374][ T4754] loop1: detected capacity change from 0 to 4096 [ 363.881659][ T4759] ata1.00: non-matching transfer count (-513003755/0) [ 363.916455][ T4754] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:07:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 364.568479][ T4767] ata1.00: non-matching transfer count (-513003755/0) 17:07:58 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) 17:07:59 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) 17:07:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 365.346305][ T4773] ata1.00: non-matching transfer count (-513003755/0) 17:07:59 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:07:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 365.768718][ T4778] ata1.00: non-matching transfer count (-513003755/0) 17:07:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x53, 0x0, 0x10, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="959a40ee7b362ca3d939e16c2f15f98e", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 366.103886][ T4780] ata1.00: non-matching transfer count (-513003755/0) 17:08:00 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:00 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) [ 367.276968][ T3944] 9pnet: Found fid 1 not clunked 17:08:09 executing program 0: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) 17:08:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:09 executing program 2: openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) gettid() ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0) unshare(0x4a020000) 17:08:10 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) [ 376.717150][ T3961] 9pnet: Found fid 1 not clunked 17:08:11 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) [ 377.375049][ T4802] FS-Cache: Duplicate cookie detected [ 377.398647][ T4802] FS-Cache: O-cookie c=0000000d [p=00000004 fl=222 nc=0 na=1] [ 377.439649][ T4802] FS-Cache: O-cookie d=ffffffff89cb0b40{9P.session} n=ffff88805fa7f400 [ 377.473830][ T4802] FS-Cache: O-key=[10] '34323934393733393334' [ 377.503112][ T4802] FS-Cache: N-cookie c=0000000e [p=00000004 fl=2 nc=0 na=1] [ 377.538480][ T4802] FS-Cache: N-cookie d=ffffffff89cb0b40{9P.session} n=ffff8880451fc000 [ 377.562122][ T4802] FS-Cache: N-key=[10] '34323934393733393334' 17:08:11 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:11 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) [ 377.976490][ T3961] 9pnet: Found fid 1 not clunked 17:08:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:12 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) [ 378.331478][ T3957] 9pnet: Found fid 1 not clunked 17:08:12 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) [ 378.788285][ T3935] 9pnet: Found fid 1 not clunked 17:08:12 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:13 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) 17:08:13 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) 17:08:13 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:14 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1500000065ffff017f000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30}, 0x30) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30}, 0x30) write$FUSE_LK(r2, &(0x7f0000000180)={0x28, 0x0, 0x0, {{0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0x28) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60}, 0x60) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000000)='./file0/file1\x00', 0x0) 17:08:14 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) [ 380.218517][ T3961] 9pnet: Found fid 1 not clunked 17:08:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000000)="4d7dbba702d089ab1d3332d8d62882b5943492", 0x13, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000140)={r1, 0x13, &(0x7f00000000c0)=""/19}) 17:08:14 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) [ 380.507698][ T3957] 9pnet: Found fid 1 not clunked 17:08:15 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0xde]}}], 0xffc8) [ 381.393567][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:15 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000000)="4d7dbba702d089ab1d3332d8d62882b5943492", 0x13, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000140)={r1, 0x13, &(0x7f00000000c0)=""/19}) [ 381.589455][ C3] vkms_vblank_simulate: vblank timer overrun [ 381.616531][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:15 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) [ 381.713960][ T3961] 9pnet: Found fid 1 not clunked 17:08:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000000)="4d7dbba702d089ab1d3332d8d62882b5943492", 0x13, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000140)={r1, 0x13, &(0x7f00000000c0)=""/19}) 17:08:16 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) 17:08:16 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0xde]}}], 0xffc8) 17:08:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000000080)={&(0x7f0000000000)="4d7dbba702d089ab1d3332d8d62882b5943492", 0x13, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, &(0x7f0000000140)={r1, 0x13, &(0x7f00000000c0)=""/19}) 17:08:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) [ 382.569109][ C3] vkms_vblank_simulate: vblank timer overrun [ 382.602945][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:16 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) 17:08:17 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) 17:08:17 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) 17:08:17 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) [ 383.457213][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.484669][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.523402][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:17 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0xde]}}], 0xffc8) [ 383.613091][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.639716][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.675191][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:17 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) 17:08:17 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) [ 383.776620][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.800877][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.836483][ C3] vkms_vblank_simulate: vblank timer overrun [ 383.927629][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.005123][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:18 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$bt_hci(r0, 0x84, 0x7f, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) [ 384.537063][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.572824][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.601993][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.633087][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.710289][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.740302][ C3] vkms_vblank_simulate: vblank timer overrun [ 384.788321][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:18 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0xc0081) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0xde]}}], 0xffc8) [ 384.916985][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:19 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) 17:08:19 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) 17:08:19 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) [ 385.553005][ C3] vkms_vblank_simulate: vblank timer overrun [ 385.829357][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:20 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) [ 386.396905][ C3] vkms_vblank_simulate: vblank timer overrun [ 386.415750][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:20 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:20 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) 17:08:20 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:21 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:21 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x4e141, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) [ 387.232807][ C3] vkms_vblank_simulate: vblank timer overrun 17:08:21 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:21 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:21 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:21 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:22 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:22 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:22 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:22 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 17:08:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:22 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:23 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 17:08:23 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9) 17:08:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:23 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:24 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:24 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 17:08:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) [ 390.784666][ T3979] Bluetooth: hci3: command 0x0405 tx timeout 17:08:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:25 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) connect$bt_sco(r0, &(0x7f0000000080), 0x8) 17:08:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:25 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:25 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_INTERVAL={0x8}]}}}]}, 0x3c}}, 0x0) 17:08:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:26 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/fd1', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 17:08:26 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:26 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:26 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) [ 392.952423][ T27] Bluetooth: hci3: command 0x0405 tx timeout 17:08:27 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:27 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:27 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:27 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x40345410, &(0x7f00000001c0)={{0x3}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 17:08:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:31 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:31 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:32 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:32 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r1) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0xe01, 0x0, 0x0, {0x30}}, 0x14}}, 0x0) 17:08:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x4, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@dev}}}]}, 0x38}}, 0x0) 17:08:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 17:08:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffff4}]}) utimensat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) [ 399.032681][ T5033] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 399.176040][ T5039] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 399.256959][ T5039] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x4, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@dev}}}]}, 0x38}}, 0x0) [ 399.359534][ T5044] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 17:08:33 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x4, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@dev}}}]}, 0x38}}, 0x0) 17:08:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) [ 399.739694][ T5052] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 399.749018][ T5048] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 399.828516][ T5050] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x4, 0x1, {0x0, 0x0, 0x0, 0x0, {@in6_addr=@dev}}}]}, 0x38}}, 0x0) [ 400.228368][ T5057] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. 17:08:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:34 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) [ 400.393521][ T5059] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 17:08:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) [ 400.652324][ T5062] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) [ 400.971559][ T5068] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 401.197095][ T5071] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 17:08:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 17:08:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 17:08:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:35 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:35 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) [ 401.770960][ T5079] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:35 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) [ 401.790648][ T5081] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. 17:08:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:36 executing program 0: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000e7ff2a00000000a4000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffecc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000140f000800000000b32099"], &(0x7f0000000280)='GPL\x00', 0x8, 0x21, &(0x7f0000000340)=""/33, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xe, 0x0, 0x9ca}, 0x10}, 0x78) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 17:08:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:36 executing program 0: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvlan1\x00', 0x0}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000010c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x87, &(0x7f0000000180)={@local, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0x51, 0x2c, 0x0, @local, @mcast2, {[@dstopts={0x3a}], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback={0x60000000}, @loopback, [{}, {0x18, 0x3, "7c63c759412b898c5f0fd692382f7f6e7ec2b93655b5ceebcb02491434"}]}}}}}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 17:08:36 executing program 3: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:36 executing program 2: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:37 executing program 0: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) [ 403.160844][ T1482] ieee802154 phy0 wpan0: encryption failed: -22 [ 403.206431][ T1482] ieee802154 phy1 wpan1: encryption failed: -22 17:08:37 executing program 2: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:37 executing program 3: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:37 executing program 0: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:37 executing program 1: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:37 executing program 1: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:37 executing program 0: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:38 executing program 3: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:38 executing program 2: r0 = openat$vimc0(0xffffff9c, &(0x7f0000000400), 0x2, 0x0) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000001340), 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc04c565d, &(0x7f0000000580)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "183f0a34"}, 0x0, 0x0, @userptr, 0x0, 0x0, r1}) 17:08:38 executing program 0: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:38 executing program 1: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:38 executing program 0: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001780)={'gre0\x00', &(0x7f0000001180)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 17:08:38 executing program 1: setuid(0xee01) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@private2}, 0x14) 17:08:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001780)={'gre0\x00', &(0x7f0000001180)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 17:08:38 executing program 0: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:38 executing program 1: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:39 executing program 1: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001780)={'gre0\x00', &(0x7f0000001180)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 17:08:39 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001780)={'gre0\x00', &(0x7f0000001180)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 17:08:39 executing program 1: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:39 executing program 0: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:39 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:39 executing program 2: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:39 executing program 1: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:39 executing program 0: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 3: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 2: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 0: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 1: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 3: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 0: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:40 executing program 3: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 2: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 1: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:40 executing program 0: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 1: r0 = syz_io_uring_setup(0xb57, &(0x7f00000001c0), &(0x7f0000ff1000/0xc000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000000240), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff]}, 0x2) 17:08:41 executing program 3: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 0: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 3: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:41 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:41 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:41 executing program 3: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:41 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 2: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000640), 0x8, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0xa0000004}) 17:08:42 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:42 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:43 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:43 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:43 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x20000051) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000882) dup2(r0, r1) 17:08:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:44 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)) 17:08:44 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x8}) 17:08:44 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) 17:08:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) [ 410.775373][ T5267] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 17:08:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:45 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) 17:08:45 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x8}) [ 411.189926][ T5267] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 17:08:45 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) 17:08:45 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x8}) 17:08:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:45 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000080)={0xd, 0x8}) 17:08:45 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) [ 411.585966][ T5288] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 17:08:46 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:46 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) [ 412.231620][ T5298] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 412.398699][ T5299] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 412.461903][ T5296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 17:08:46 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:46 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) [ 412.948979][ T5310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 413.062317][ T5313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 413.123898][ T5315] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 17:08:47 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) [ 413.408334][ T5318] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 17:08:47 executing program 3: r0 = socket(0x10, 0x803, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000080)={0x0, 0x382, &(0x7f0000000140)={0x0, 0xb7ff}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001280)=ANY=[@ANYBLOB="3400000010000104000009040000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@ipv6_newaddr={0x34, 0x13, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0x14, 0x1, @loopback={0xffffffff00000000}}]}, 0x34}}, 0x0) 17:08:48 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) [ 415.478115][ T3722] Bluetooth: hci0: command 0x0406 tx timeout 17:08:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) [ 415.526519][ T3722] Bluetooth: hci1: command 0x0406 tx timeout 17:08:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:50 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:51 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) 17:08:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:51 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) 17:08:51 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f0000002d00), 0x4) 17:08:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000003c0)=0x1b000000) 17:08:52 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000d40), 0xc, 0x0}, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000005580)=[{{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000003e40)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000003d00)=""/46, 0x2e}], 0x2}}], 0x1, 0x0, &(0x7f0000005640)={0x0, 0x989680}) recvmsg$unix(r1, &(0x7f0000005980)={0x0, 0x0, 0x0}, 0x2024) recvmmsg$unix(r0, &(0x7f0000007bc0)=[{{0x0, 0x0, &(0x7f0000005b40)}}], 0x1, 0x0, 0x0) fork() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f000000b700)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="22dc6524e0f7140b04be1a85208ee912389fc8be14e37b", 0x17}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0) 17:08:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000003c0)=0x1b000000) 17:08:52 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000003c0)=0x1b000000) 17:08:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x601, 0x0, 0x0, {}, [@L2TP_ATTR_CONN_ID={0x8}]}, 0x1c}}, 0x0) 17:08:53 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x50, 0x0, &(0x7f00000003c0)=0x1b000000) 17:08:53 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:53 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 17:08:53 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) [ 420.172610][ T5461] loop0: detected capacity change from 0 to 264192 17:08:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:54 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc2c85513, &(0x7f0000000040)={{0x5}}) 17:08:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) [ 420.477094][ T5473] loop0: detected capacity change from 0 to 264192 17:08:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) [ 420.621763][ T3979] Bluetooth: hci2: command 0x0406 tx timeout 17:08:54 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0}]}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x58}}, 0x0) 17:08:54 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) 17:08:55 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 421.067238][ T5483] loop0: detected capacity change from 0 to 264192 17:08:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) [ 421.288356][ T5486] loop3: detected capacity change from 0 to 264192 17:08:55 executing program 1: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:55 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) [ 421.504461][ T5492] loop1: detected capacity change from 0 to 264192 [ 421.590164][ T5495] loop0: detected capacity change from 0 to 264192 17:08:55 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:55 executing program 2: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:55 executing program 1: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 421.860315][ T5500] loop3: detected capacity change from 0 to 264192 [ 422.036765][ T5502] loop2: detected capacity change from 0 to 264192 17:08:56 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:56 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 422.344635][ T5505] loop1: detected capacity change from 0 to 264192 17:08:56 executing program 2: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 422.688066][ T5513] loop2: detected capacity change from 0 to 264192 17:08:56 executing program 1: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 422.785051][ T5512] loop0: detected capacity change from 0 to 264192 17:08:57 executing program 2: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 423.211782][ T5517] loop1: detected capacity change from 0 to 264192 17:08:57 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:57 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 423.518700][ T5522] loop3: detected capacity change from 0 to 264192 [ 423.519479][ T5521] loop2: detected capacity change from 0 to 264192 17:08:57 executing program 1: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 423.819699][ T5527] loop1: detected capacity change from 0 to 264192 17:08:57 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 423.877342][ T5525] loop0: detected capacity change from 0 to 264192 [ 424.071252][ T5530] loop3: detected capacity change from 0 to 264192 17:08:58 executing program 2: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 424.240464][ T5533] loop2: detected capacity change from 0 to 264192 17:08:58 executing program 1: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:58 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:58 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:58 executing program 2: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 424.614343][ T5538] loop1: detected capacity change from 0 to 264192 [ 424.637519][ T5540] loop3: detected capacity change from 0 to 264192 [ 424.666524][ T5537] loop0: detected capacity change from 0 to 264192 [ 424.862606][ T5543] loop2: detected capacity change from 0 to 264192 17:08:59 executing program 1: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:59 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:59 executing program 2: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:59 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 425.329968][ T5548] loop1: detected capacity change from 0 to 264192 [ 425.369346][ T5554] loop2: detected capacity change from 0 to 264192 [ 425.375663][ T5553] loop0: detected capacity change from 0 to 264192 [ 425.414546][ T5550] loop3: detected capacity change from 0 to 264192 17:08:59 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 425.711230][ T3722] Bluetooth: hci3: command 0x0406 tx timeout 17:08:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) 17:08:59 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:08:59 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000006c0)='./bus\x00') r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000001440)='syzkaller\x00', 0x5, 0xffa, &(0x7f0000000100)=""/4090, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') [ 426.031479][ T5558] loop0: detected capacity change from 0 to 264192 17:09:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) [ 426.279121][ T5565] loop3: detected capacity change from 0 to 264192 17:09:00 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') 17:09:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) [ 426.509132][ T5561] overlayfs: './file0' not a directory 17:09:00 executing program 3: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 426.707831][ T5571] loop0: detected capacity change from 0 to 264192 [ 426.820493][ T5574] loop3: detected capacity change from 0 to 264192 17:09:01 executing program 1: io_setup(0x4, &(0x7f0000000340)=0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f0000000580)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 17:09:01 executing program 0: ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, 0x0) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x440, 0x6b) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000080)={0x18}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) connect$802154_dgram(r1, &(0x7f00000000c0)={0x24, @none={0x0, 0xffff}}, 0x14) geteuid() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000140)) prctl$PR_MCE_KILL_GET(0x22) getsockopt$WPAN_SECURITY(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000200)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000280)) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$xfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f00000003c0)="7785ae8f17cffed3fbce13a2a76f65986efca543966c9fec3f639f866ea663eac5ca159a4838ca10a2e6e0ab6f66d69aee5f557d1093794e6850d20f818f6272f7913c7a6ee40ffe5348464af4dfabe7cd46f09898df32ef99d94074d6078e18749fc0bb648e460ef5b9bf7aeb5ff1409736c6488d5053b77f75580ea5b0a33741b87fcb55785dd6e329eb95507aac0177ec837d88ab9f88", 0x98, 0xffffffffffffffa1}, {&(0x7f0000000480)="f4cfefc3a9ac722681cf6a6a2e1ca4f9ac8a1e98f0", 0x15}, {&(0x7f00000004c0)="f93acc005741cc75d3f8a523efa2d791792ee9afacba993d63a4d9149aa9038c0a128ea2c4bb84174b2b260fa7f006e8ad2af81cbdc1920ec9953746ef800f0df56824d82b5b6e7dabd41a62a1442e8324c27082f3ce7ecda97eeb756754cfc38190", 0x62}], 0x800000, &(0x7f0000000640)={[{@allocsize={'allocsize', 0x3d, [0x34, 0x55, 0x78, 0x31, 0x39, 0x32, 0x32]}}, {@quota}, {@gqnoenforce}, {@noalign}, {@quota}], [{@smackfshat={'smackfshat', 0x3d, '.log\x00'}}, {@audit}]}) renameat(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001180)='./file0\x00') [ 427.263512][ T5561] overlayfs: 'file0' not a directory [ 427.341831][ T5582] overlayfs: './file0' not a directory [ 427.423254][ T5580] loop0: detected capacity change from 0 to 264192 17:09:01 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000640), r0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}}, 0x0) [ 428.752059][ T27] ------------[ cut here ]------------ [ 428.788108][ T27] refcount_t: addition on 0; use-after-free. [ 428.827299][ T27] WARNING: CPU: 2 PID: 27 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0 [ 428.881653][ T27] Modules linked in: [ 428.905942][ T27] CPU: 2 PID: 27 Comm: kworker/2:0 Not tainted 5.15.0-rc5-syzkaller #0 [ 428.938516][ T27] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 428.998416][ T27] Workqueue: events sco_sock_timeout [ 429.014937][ T27] RIP: 0010:refcount_warn_saturate+0x169/0x1e0 [ 429.055333][ T27] Code: 09 31 ff 89 de e8 b7 66 9c fd 84 db 0f 85 36 ff ff ff e8 6a 60 9c fd 48 c7 c7 40 ec e3 89 c6 05 31 85 7f 09 01 e8 f3 19 19 05 <0f> 0b e9 17 ff ff ff e8 4b 60 9c fd 0f b6 1d 16 85 7f 09 31 ff 89 [ 429.145343][ T27] RSP: 0018:ffffc90000547ce0 EFLAGS: 00010286 [ 429.162872][ T27] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 429.184455][ T27] RDX: ffff8880116e5580 RSI: ffffffff815e88a8 RDI: fffff520000a8f8e [ 429.206307][ T27] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000001 [ 429.225738][ T27] R10: ffffffff815e264e R11: 0000000000000000 R12: ffff888052911c08 [ 429.248401][ T27] R13: ffff888019147080 R14: ffff888011601300 R15: ffff88802cc31240 [ 429.272060][ T27] FS: 0000000000000000(0000) GS:ffff88802cc00000(0000) knlGS:0000000000000000 [ 429.294973][ T27] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 429.311622][ T27] CR2: 00007f387fdad418 CR3: 000000005e265000 CR4: 0000000000150ee0 [ 429.333166][ T27] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 429.355951][ T27] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 429.376361][ T27] Call Trace: [ 429.384872][ T27] sco_sock_timeout+0x216/0x290 [ 429.413153][ T27] process_one_work+0x9bf/0x16b0 [ 429.429356][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 429.458656][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 429.472411][ T27] ? _raw_spin_lock_irq+0x41/0x50 [ 429.486114][ T27] worker_thread+0x658/0x11f0 [ 429.498518][ T27] ? process_one_work+0x16b0/0x16b0 [ 429.511691][ T27] kthread+0x3e5/0x4d0 [ 429.522689][ T27] ? set_kthread_struct+0x130/0x130 [ 429.537036][ T27] ret_from_fork+0x1f/0x30 [ 429.557938][ T27] Kernel panic - not syncing: panic_on_warn set ... [ 429.576261][ T27] CPU: 2 PID: 27 Comm: kworker/2:0 Not tainted 5.15.0-rc5-syzkaller #0 [ 429.598690][ T27] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014 [ 429.623037][ T27] Workqueue: events sco_sock_timeout [ 429.636821][ T27] Call Trace: [ 429.644771][ T27] dump_stack_lvl+0xcd/0x134 [ 429.656129][ T27] panic+0x2b0/0x6dd [ 429.667210][ T27] ? __warn_printk+0xf3/0xf3 [ 429.678158][ T27] ? __warn.cold+0x1a/0x44 [ 429.689469][ T27] ? refcount_warn_saturate+0x169/0x1e0 [ 429.703029][ T27] __warn.cold+0x35/0x44 [ 429.713523][ T27] ? wake_up_klogd.part.0+0x8e/0xd0 [ 429.726072][ T27] ? refcount_warn_saturate+0x169/0x1e0 [ 429.738827][ T27] report_bug+0x1bd/0x210 [ 429.747270][ T27] handle_bug+0x3c/0x60 [ 429.766444][ T27] exc_invalid_op+0x14/0x40 [ 429.776925][ T27] asm_exc_invalid_op+0x12/0x20 [ 429.788844][ T27] RIP: 0010:refcount_warn_saturate+0x169/0x1e0 [ 429.803466][ T27] Code: 09 31 ff 89 de e8 b7 66 9c fd 84 db 0f 85 36 ff ff ff e8 6a 60 9c fd 48 c7 c7 40 ec e3 89 c6 05 31 85 7f 09 01 e8 f3 19 19 05 <0f> 0b e9 17 ff ff ff e8 4b 60 9c fd 0f b6 1d 16 85 7f 09 31 ff 89 [ 429.839500][ T27] RSP: 0018:ffffc90000547ce0 EFLAGS: 00010286 [ 429.853870][ T27] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 429.900705][ T27] RDX: ffff8880116e5580 RSI: ffffffff815e88a8 RDI: fffff520000a8f8e [ 429.925342][ T27] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000001 [ 429.944424][ T27] R10: ffffffff815e264e R11: 0000000000000000 R12: ffff888052911c08 [ 429.964755][ T27] R13: ffff888019147080 R14: ffff888011601300 R15: ffff88802cc31240 [ 429.984316][ T27] ? wake_up_klogd.part.0+0x8e/0xd0 [ 429.996767][ T27] ? vprintk+0x88/0x90 [ 430.006986][ T27] sco_sock_timeout+0x216/0x290 [ 430.019422][ T27] process_one_work+0x9bf/0x16b0 [ 430.033459][ T27] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 430.048443][ T27] ? rwlock_bug.part.0+0x90/0x90 [ 430.054711][ T27] ? _raw_spin_lock_irq+0x41/0x50 [ 430.066980][ T27] worker_thread+0x658/0x11f0 [ 430.078705][ T27] ? process_one_work+0x16b0/0x16b0 [ 430.092367][ T27] kthread+0x3e5/0x4d0 [ 430.109828][ T27] ? set_kthread_struct+0x130/0x130 [ 430.117317][ T27] ret_from_fork+0x1f/0x30 [ 430.151480][ T27] Kernel Offset: disabled [ 430.158356][ T27] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:09:05 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=0000000000000000 RCX=1ffffffff1add5a1 RDX=1ffff11005943e91 RSI=0000000000000000 RDI=ffffffff8b339880 RBP=ffff88802ca1f480 RSP=ffffc900012a7e50 R8 =ffffffff8eef8018 R9 =ffffffff8eef800f R10=ffffffff8eef8017 R11=0000000000000001 R12=ffff88801c0a0710 R13=0000000000000000 R14=0000000000031a40 R15=ffff88802ca1f488 RIP=ffffffff81330ca2 RFL=00000802 [-O-----] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 00007f16ea350840 ffffffff 00c00000 GS =0000 ffff88802ca00000 ffffffff 00c00000 LDT=0000 0000000000000000 ffffffff 00c00000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000056d81efc CR3=000000001c01e000 CR4=00150ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00ff000000000000ff00000000000000 XMM02=00000000000000000000000000000000 XMM03=0000000000ff0000000000ff00000000 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=ffff000000000000ffff000000000000 XMM06=ffffffffffff0000ffffff00000000ff XMM07=00000000000000000000000000000000 XMM08=65726168732f6372732f2e2e2f2e2e00 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffc90024b03000 RDX=0000000000000000 RSI=ffffffff83f47879 RDI=ffffffff8b339880 RBP=0000000000000000 RSP=ffffc90029427490 R8 =0000000000000000 R9 =ffffffff8d6e78f3 R10=ffffffff83f47854 R11=0000000000000000 R12=ffff88802cb32b50 R13=fffffbfff1adcf5c R14=dffffc0000000000 R15=ffffffff8b7f6038 RIP=ffffffff813315f6 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] FS =0000 0000000000000000 000fffff 00000000 GS =0063 ffff88802cb00000 ffffffff 00d0f300 DPL=3 DS [-WA] LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000000c0093c1860 CR3=000000005e265000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000bfe62e42fefa39ef XMM03=32322035312e322e302e303120303230 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 2 RAX=0000000000000069 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff84377871 RDI=ffffffff90516c40 RBP=ffffffff90516c00 RSP=ffffc900005476f8 R8 =0000000000000000 R9 =0000000000000000 R10=ffffffff84377862 R11=000000000000001f R12=0000000000000000 R13=0000000000000069 R14=ffffffff90516c00 R15=dffffc0000000000 RIP=ffffffff8437789a RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cc00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe0000079000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000077000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f387fdad418 CR3=000000005e265000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000c000c32660000000c000c32630 XMM02=000000c001033200000000c0010331c0 XMM03=000000c001033380000000c001033280 XMM04=000000c001033880000000c001033480 XMM05=000000c001033980000000c001033900 XMM06=000000c001033c80000000c001033c00 XMM07=000000c001033e00000000c001033d40 XMM08=000000c000116de0000000c000116c70 XMM09=000000c000116190000000c0000450e0 XMM10=000000c000116290000000c0001161a0 XMM11=000000c000116250000000c000116b20 XMM12=000000c000382360000000c000116260 XMM13=000000c000116000000000c000382370 XMM14=000000c0001164a0000000c000116010 XMM15=000000c000116710000000c000116490 info registers vcpu 3 RAX=fffffbfff1adcf22 RBX=fffffbfff1adcf23 RCX=ffffffff815c31a8 RDX=fffffbfff1adcf23 RSI=0000000000000008 RDI=ffffffff8d6e7910 RBP=fffffbfff1adcf22 RSP=ffffc90003cd7b58 R8 =0000000000000000 R9 =ffffffff8d6e7917 R10=fffffbfff1adcf22 R11=0000000000000000 R12=0000000000000002 R13=0000000000000000 R14=ffffffff8b981ae0 R15=0000000000000000 RIP=ffffffff89400bf0 RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 ffffffff 00c00000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 ffffffff 00c00000 FS =0000 0000000000000000 ffffffff 00c00000 GS =0000 ffff88802cd00000 ffffffff 00c00000 LDT=0000 0000000000000000 00000000 00000000 TR =0040 fffffe00000b4000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe00000b2000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3880041100 CR3=000000005bed6000 CR4=00150ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000fffe0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000020000 XMM01=00007f374805fde000005642e74048e0 XMM02=00000000febc00000000000000000000 XMM03=00007f37f5a06d6b0000000000000000 XMM04=0f02000a0202000a0000000000000000 XMM05=00000000000000000000000000000600 XMM06=14000000000000000000000000000000 XMM07=0000005000000000000000001600cc88 XMM08=82fd0bf8f502c4e0cd379671d97ed372 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000