317] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:29 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 16:17:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b046471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x388, 0x1f8, 0x0, 0xffffffff, 0x0, 0x150, 0x2f0, 0x2f0, 0xffffffff, 0x2f0, 0x2f0, 0x5, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'wlan0\x00', 'geneve1\x00'}, 0x0, 0x70, 0xa8}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @loopback, @dev, @port, @icmp_id}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}, {{@ip={@dev, @multicast2, 0x0, 0x0, 'veth1_vlan\x00', 'gre0\x00'}, 0x0, 0x70, 0xa8}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @multicast1, @remote, @port, @gre_key}}}}, {{@ip={@local, @local, 0x0, 0x0, 'vxcan1\x00', 'sit0\x00', {}, {}, 0x4}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@osf={{0x50}, {'syz0\x00'}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @remote, @empty, @gre_key, @gre_key}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e8) 16:17:29 executing program 5: syz_io_uring_setup(0x290e, &(0x7f0000000800), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) 16:17:29 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/bus/nd', 0x20002, 0x0) 16:17:29 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x20000023896) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, "640e61fd7b86b946686af918b88fd066ff24f6", 0x0, 0x8001}) 16:17:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000380)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:29 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@private2, 0x0}, &(0x7f0000000040)=0x14) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@remote, @in6=@mcast1, 0x4e21, 0x9, 0x4e24, 0xfff, 0xa, 0x70, 0xa0, 0x2c, r0, r1}, {0x8, 0x4, 0x7f, 0x0, 0x7fffffff, 0x8, 0x4, 0x3}, {0xfffffffffffffffa, 0xab65, 0x0, 0x1ff}, 0x8, 0x0, 0x0, 0x1, 0x2, 0x3}, {{@in=@private=0xa010100, 0x4d6, 0x6c}, 0xa, @in=@rand_addr=0x64010102, 0x0, 0x4, 0x2, 0xff, 0x5, 0x5ab, 0x4}}, 0xe8) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) setreuid(r2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) syz_clone(0x1200000, &(0x7f0000000500)="dc7f9475324f7c2f5b1355cd9fd068250b42bb745e999af9f06e20365e66ef", 0x1f, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)="2b6e7f4bd8b34b6347d569152e79124c4d638f9c97247aa367e32aa564ddee34c4793f2147513da4c1") sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001a40)={&(0x7f0000001340)={0x6f0, 0x0, 0x4, 0x70bd29, 0x25dfdbfb, {}, [{{0x8}, {0x4}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r0}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb68}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r0}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1ec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb4b}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8, 0x1, r0}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x160, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x2def}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x40000000}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}]}}]}, 0x6f0}, 0x1, 0x0, 0x0, 0x400c001}, 0x4040000) 16:17:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) [ 1280.631492][T22345] loop1: detected capacity change from 0 to 131072 [ 1280.669446][T22345] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b066471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:29 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/block/loop0', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, 0x0, 0x0) 16:17:29 executing program 2: write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000440), 0xffffffffffffffff) syz_io_uring_setup(0x290e, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000880), &(0x7f00000008c0)) 16:17:29 executing program 5: seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x1) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000080)=0x401, 0x4) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x200}, 0x14}}, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) [ 1280.715066][T22354] x_tables: duplicate underflow at hook 1 16:17:29 executing program 2: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@private2, 0x0}, &(0x7f0000000040)=0x14) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@remote, @in6=@mcast1, 0x0, 0x9, 0x4e24, 0xfff, 0xa, 0x70, 0xa0, 0x0, r0}, {0x8, 0x4, 0x7f, 0x0, 0x7fffffff, 0x0, 0x0, 0x3}, {0xfffffffffffffffa, 0xab65, 0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x1, 0x2, 0x3}, {{@in=@private, 0x4d6}, 0xa, @in, 0x0, 0x4, 0x2, 0xff, 0x5, 0x5ab}}, 0xe8) setreuid(0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) getresuid(0x0, &(0x7f0000000480), &(0x7f00000004c0)) syz_clone(0x1200000, &(0x7f0000000500), 0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) setreuid(0xee00, 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 16:17:29 executing program 4: syz_clone(0x0, 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0) syz_clone(0x44000000, &(0x7f00000001c0)="95", 0x1, 0x0, 0x0, 0x0) 16:17:29 executing program 0: open_by_handle_at(0xffffffffffffffff, &(0x7f0000000540)=@xfs_parent={0x1c}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/current\x00') preadv(r0, &(0x7f00000003c0), 0x5b, 0x0, 0x0) 16:17:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000380)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1280.802453][T22366] loop1: detected capacity change from 0 to 131072 16:17:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000040)={&(0x7f0000000000), 0x1159b0dc9243bbec, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYRES64, @ANYRESOCT, @ANYRES32, @ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX], 0x38}}, 0x0) 16:17:29 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/bus/container', 0x0, 0x0) 16:17:29 executing program 0: socket$inet(0x2, 0x0, 0x1000) [ 1280.891713][T22366] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:29 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x204282, 0x0) 16:17:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b076471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:29 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000010c0)) 16:17:29 executing program 2: syz_clone(0x63e0000, 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) r1 = syz_clone(0x44000000, &(0x7f00000001c0)="9520101ceeca36fa5f441e3528e1a7c58047b45747a0ce1b2ce3ae627e2bdf76b09d56e027174b09974f0e593a39b9bed04663105a7e4fd0a0b96ad74f6aacbc79f2c83218aab7d53bb2b5b739129cbf8975be296cb96b681f1d505f992bd127240c", 0x62, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="dbf177d394bdbf08e429a6ed4b029ee39eb84db944568ff8d0bb258f1b77d27213e7c1b77a084224ce6f67fb51296ea885902696c26e1a6c4e35a389c60fbe288d7d091916191617c5d868d061a69facf4210d050d644af1822c6d0ffa7ca70e50ca74fcb482dae0c2ce5c3dca5ab3f329451e32085377ad3ab667a5378b7e010059e288efe19dc5fdf6210b8ae4cc47a67873bf996e211597bf53fbde8f8639ff024a39397aa0d7c975060bc9d7100e0c9eca68c481722ad2cbef3ad69354070596e66108084958a12bf9851a04c3e437ccfcd53577bab58820090e2d") sched_rr_get_interval(r1, &(0x7f0000000180)) get_robust_list(r0, &(0x7f0000000080)=&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)}, &(0x7f00000000c0)=0x18) 16:17:29 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={0x0, 0x1010}}, 0x0) 16:17:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5452, &(0x7f0000000040)={0x0, 0x3ff}) [ 1281.063340][T22394] loop1: detected capacity change from 0 to 131072 [ 1281.155033][T22394] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:30 executing program 4: syz_clone(0x0, 0x0, 0xffffffffffffffeb, 0x0, 0x0, 0x0) syz_clone(0x44000000, &(0x7f00000001c0)="95", 0x1, 0x0, 0x0, 0x0) 16:17:30 executing program 0: syz_clone(0x64000200, 0x0, 0x1e, 0x0, 0x0, 0x0) 16:17:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000380)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:30 executing program 5: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000800), 0x220200, 0x0) 16:17:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b086471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:30 executing program 0: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffd78}, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 16:17:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8911, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) socketpair(0x0, 0x0, 0x0, &(0x7f000000c8c0)) [ 1281.856109][T22413] loop1: detected capacity change from 0 to 131072 [ 1281.890204][T22413] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b096471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:30 executing program 2: futex(&(0x7f0000000000), 0x80, 0x0, 0x0, 0x0, 0x0) [ 1282.038400][T22429] loop1: detected capacity change from 0 to 131072 16:17:30 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@rr={0x7, 0x1f, 0xd3, [@remote, @local, @multicast2, @broadcast, @broadcast, @multicast2, @dev]}, @timestamp_prespec={0x44, 0xc, 0x0, 0x3, 0x0, [{@dev}]}]}}}], 0x40}}], 0x1, 0x0) [ 1282.086935][T22429] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:30 executing program 5: rt_sigaction(0x2a, &(0x7f00000001c0)={&(0x7f0000000140)="42d2f2c401bf580ac441fc296d0065c14df68fc40299b8b304000000c4e27d596e80410f1855f2670f28cb45ecc441cd71f4f8", 0x0, 0x0}, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000300)) 16:17:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8924, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b0a6471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1282.495239][T22439] loop1: detected capacity change from 0 to 131072 [ 1282.543001][T22439] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:31 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="d9") 16:17:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b0b6471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:31 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001fc0)=@bpf_ext={0x1c, 0x4, 0x0, &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1282.829782][T22447] loop1: detected capacity change from 0 to 131072 16:17:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x4020940d, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:31 executing program 5: add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="81", 0x1, 0xfffffffffffffffd) 16:17:31 executing program 4: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) [ 1282.951721][T22447] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8970, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:31 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000780)={'syztnl0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x5, 0x3f, 0x1, 0x25, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, 0x8000, 0x10, 0xfffffffe, 0x5}}) 16:17:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b0c6471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:31 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg$inet(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="ce", 0x1}], 0x1}}], 0x1, 0x0) [ 1283.165148][T22469] loop1: detected capacity change from 0 to 131072 [ 1283.204153][T22469] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8937, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000600)={'tunl0\x00', &(0x7f0000000e00)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4}]}}}}}) 16:17:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b0d6471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:32 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0xc2a00, 0x0) 16:17:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x401c5820, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:32 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 16:17:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x6, &(0x7f0000000540)=@framed={{}, [@btf_id, @func]}, &(0x7f0000000600)='GPL\x00', 0x3, 0xd9, &(0x7f0000000640)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) [ 1283.827719][T22485] loop1: detected capacity change from 0 to 131072 [ 1283.859165][T22485] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_tos_u8={{0x11}}], 0x18}}], 0x1, 0x0) 16:17:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b0e6471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89a3, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1284.032039][T22504] loop1: detected capacity change from 0 to 131072 16:17:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, 0x0}, 0x0) 16:17:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettaction={0x14}, 0x14}}, 0x0) 16:17:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1284.100568][T22504] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:32 executing program 5: clock_nanosleep(0x0, 0x1, &(0x7f0000000000)={0x77359400}, 0x0) 16:17:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b106471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:33 executing program 0: socketpair(0xa, 0x3, 0x3, &(0x7f00000002c0)) 16:17:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8927, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:33 executing program 0: add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="b3", 0x1, 0xfffffffffffffffd) socket$inet6_udp(0xa, 0x2, 0x0) [ 1284.343731][T22530] loop1: detected capacity change from 0 to 131072 16:17:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x541b, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1284.383016][T22530] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b116471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1284.482196][T22537] loop1: detected capacity change from 0 to 131072 [ 1284.524845][T22537] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4}]}}}], 0x18}}], 0x1, 0x0) 16:17:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b126471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:33 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) bind(r0, 0xffffffffffffffff, 0x0) 16:17:33 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x10, 0x140c, 0x1}, 0x10}}, 0x0) 16:17:33 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640), 0x8, 0x10, 0x0}, 0x80) 16:17:33 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 16:17:33 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x2}, {0x48}, {0x6}]}) [ 1285.092799][T22550] loop1: detected capacity change from 0 to 131072 16:17:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@rthdrdstopts={{0x18}}, @hoplimit_2292={{0x14}}, @rthdrdstopts={{0x18}}], 0x48}, 0x0) 16:17:33 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8943, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:33 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x6}, 0x0) [ 1285.200317][T22550] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b186471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @dev}}) [ 1285.339930][T22571] loop1: detected capacity change from 0 to 131072 16:17:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1104}, 0x48) [ 1285.398695][T22571] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:34 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0xa0002, 0x0) 16:17:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x2}]}) 16:17:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@rthdrdstopts={{0x18}}, @hoplimit_2292={{0x14}}, @flowinfo={{0x14}}, @rthdrdstopts={{0x18}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x200}}], 0x78}, 0x0) 16:17:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b050a71488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 16:17:34 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @private2, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=[@rthdr={{0x18}}], 0x18}}], 0x1, 0x0) [ 1285.561813][T22588] loop1: detected capacity change from 0 to 131072 16:17:34 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)={0x0, r0+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 16:17:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1285.605097][T22588] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:34 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) connect(r0, 0x0, 0x0) 16:17:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b052571488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8920, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000043c0)={'ip6gre0\x00', &(0x7f0000004340)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @remote}}) [ 1285.746126][T22606] loop1: detected capacity change from 0 to 131072 [ 1285.762083][T22606] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:34 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x38}}, 0x0) 16:17:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b052e71488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:34 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000006c0)={0x0, @can, @rc, @l2={0x1f, 0x0, @any, 0x0, 0x2}}) [ 1285.890001][T22618] loop1: detected capacity change from 0 to 131072 16:17:34 executing program 2: keyctl$reject(0x13, 0x0, 0x0, 0x2, 0x0) [ 1285.990763][T22618] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0xc0045878, 0x0) 16:17:34 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg$inet(r0, &(0x7f0000003f80)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)="ce", 0x1}], 0x1, &(0x7f0000000480)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @private}}}], 0x38}}], 0x1, 0x0) 16:17:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000c00)={'ip6gre0\x00', &(0x7f0000000b80)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @private2, 0x0, 0x7}}) 16:17:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b052f71488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:34 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000440)) 16:17:34 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) sendmmsg$sock(r0, &(0x7f0000002600)=[{{&(0x7f0000000000)=@phonet, 0x80, 0x0}}], 0x1, 0x0) 16:17:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 16:17:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3}]}}}], 0x18}}], 0x1, 0x0) 16:17:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8929, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:35 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, r0+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 16:17:35 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x680002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) [ 1286.199055][T22639] loop1: detected capacity change from 0 to 131072 [ 1286.228085][T22639] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8947, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:35 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 16:17:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 16:17:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b055c71488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x3}]}) [ 1286.508232][T22669] loop1: detected capacity change from 0 to 131072 16:17:35 executing program 5: add_key(&(0x7f0000000000)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:17:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8971, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:35 executing program 5: capset(&(0x7f0000000100)={0x20071026}, 0x0) [ 1286.621086][T22669] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@rr={0x7, 0x3, 0xd3}, @timestamp_prespec={0x44, 0x4}]}}}], 0x18}}], 0x1, 0x0) [ 1286.709694][T22686] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 16:17:35 executing program 2: futex(&(0x7f0000000400)=0x2, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 16:17:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x8, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}}) 16:17:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000280)="83", 0x1}], 0x2}, 0x0) 16:17:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b0564715e8b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@hoplimit={{0x14}}], 0x18}, 0x0) 16:17:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002dc0)=[{{&(0x7f0000000140)={0x2, 0x4e22, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 16:17:35 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680), 0x10}, 0x80) [ 1286.968898][T22695] loop1: detected capacity change from 0 to 131072 [ 1287.004493][T22695] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}) 16:17:35 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) 16:17:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', 0x0}) 16:17:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'erspan0\x00', 0x0}) 16:17:35 executing program 5: r0 = socket$inet(0x2, 0x3, 0xd) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'lo\x00', @ifru_flags}}) 16:17:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b259191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000500)='\"', 0x1}], 0x1}}], 0x1, 0x0) 16:17:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:36 executing program 5: syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='^') 16:17:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @remote}}) [ 1287.164688][T22717] loop1: detected capacity change from 0 to 131072 [ 1287.177720][T22717] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b5e9191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x9}, {}, {0x6}]}) 16:17:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) sendmmsg$sock(r0, &(0x7f0000002600)=[{{0x0, 0x0, &(0x7f0000002540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 16:17:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x2, &(0x7f0000000180)=[{}, {0x8}]}) [ 1287.362866][T22735] loop1: detected capacity change from 0 to 131072 [ 1287.380148][ T27] audit: type=1326 audit(1667233056.178:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=22736 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fafee68b5a9 code=0x0 16:17:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8990, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x2800000) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$xdp(r0, 0x0, 0x0) [ 1287.426439][T22735] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:36 executing program 0: socketpair(0x26, 0x0, 0x0, &(0x7f0000004b00)) 16:17:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote}}) 16:17:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b639191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x48}, {0x6}]}) 16:17:36 executing program 2: syz_genetlink_get_family_id$gtp(&(0x7f0000000180), 0xffffffffffffffff) 16:17:36 executing program 0: syz_clone(0x4800, 0x0, 0x0, 0x0, 0x0, 0x0) 16:17:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1287.649576][T22760] loop1: detected capacity change from 0 to 131072 16:17:36 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x1d48, 0x59, &(0x7f00000000c0)=""/89, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1287.694347][T22760] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5460, 0x0) 16:17:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000500)='\"', 0x1}], 0x1, &(0x7f0000000440)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 16:17:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) 16:17:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@empty}) 16:17:36 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000540)=ANY=[]}) 16:17:36 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[], 0x38}}, 0x0) 16:17:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b649191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@local, @private0, @mcast1, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x41100100}) 16:17:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 16:17:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1288.084343][T22789] loop1: detected capacity change from 0 to 131072 [ 1288.128531][T22789] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:37 executing program 0: r0 = socket$igmp6(0xa, 0x3, 0x2) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:17:37 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg$inet(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="ced71d83e4c8f174ff61523a1803501b", 0x10}], 0x1, &(0x7f0000000480)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @private}}}], 0x38}}], 0x1, 0x0) 16:17:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b699191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5450, 0x0) 16:17:37 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f00000028c0), 0x301, 0x0) [ 1288.643717][T22802] loop1: detected capacity change from 0 to 131072 16:17:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x1}, 0x14}}, 0x20000040) [ 1288.704282][T22802] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:37 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg$inet(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="ced71d83e4c8f174ff61523a1803501b686a7a89bb74a125b26556bd29eea8157179cf38a6ea79ef93e0ddd531e112ba092b6ab14b5502ba864068c4d14ce720ee2b1a7c9b06cb800d9fc63f423dd04d39b1a7a9e0c473998837e17d3e591825eec16813459a34eacaedd8ec66399073bd43d218550f95cfe7edb463bd4f9bc64adb6de1b59e7d7b1e72aaeb8139478bb33daf8a5e", 0x95}, {&(0x7f00000007c0)="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", 0xc6c}], 0x2}}], 0x1, 0x0) 16:17:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:17:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b6c9191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:37 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) [ 1288.859427][T22824] loop1: detected capacity change from 0 to 131072 16:17:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) 16:17:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x29, 0x20, 0x80, 0x9, 0x0, @private0, @private2, 0x80, 0x10, 0x0, 0x6}}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x4, 0x40, 0xfd, 0x1, 0x4, @dev={0xfe, 0x80, '\x00', 0x3b}, @private0, 0x1, 0x40, 0x1, 0x38}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', r3, 0x29, 0xc1, 0xe6, 0x5, 0x30, @loopback, @remote, 0x1, 0x700, 0x6, 0x2}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x5450, 0x0) [ 1288.924410][T22824] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:38 executing program 0: sysfs$2(0x2, 0xa7, 0x0) 16:17:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8994, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b6f9191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='westwood\x00', 0x9) 16:17:38 executing program 5: fanotify_init(0x6ece49483d84917d, 0x0) [ 1289.503651][T22842] loop1: detected capacity change from 0 to 131072 [ 1289.535117][T22842] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:38 executing program 0: add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="b3", 0x1, 0xfffffffffffffffd) 16:17:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:17:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b709191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000240)=@raw=[@call, @exit], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500), 0x8, 0x10, &(0x7f0000000540), 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0xfffffffffffffeee) 16:17:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 16:17:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private0}}) 16:17:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891f, 0x0) 16:17:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000040)="b0849b13", 0x4) 16:17:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000072c0), r0) 16:17:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8921, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@empty, @multicast1}, 0xc) [ 1289.772055][T22861] loop1: detected capacity change from 0 to 131072 16:17:38 executing program 5: r0 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 16:17:38 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}}}}) [ 1289.833953][T22861] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:17:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b739191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:38 executing program 0: rt_sigaction(0x2a, &(0x7f00000001c0)={&(0x7f0000000140)="42d2f2c401bf580ac441fc296d0065c14df68fc40299b8b304000000c4e27d596e80410f1855f2670f28cb45ecc441cd71f4f8", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000300)) 16:17:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@rthdrdstopts={{0x18}}, @flowinfo={{0x14}}], 0x30}, 0x0) 16:17:38 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2e181, 0x0) 16:17:38 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f000000cac0), 0x0, 0x0) 16:17:38 executing program 5: r0 = getpgrp(0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 16:17:38 executing program 4: request_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0xfffffffffffffffb) 16:17:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@hoplimit_2292={{0x14}}, @flowinfo={{0x14, 0x29, 0xb, 0xffffffff}}], 0x30}, 0x0) 16:17:38 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x680002, 0x0) [ 1290.030177][T22899] loop1: detected capacity change from 0 to 131072 16:17:38 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x10}, 0x10}}, 0x0) 16:17:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x24, 0x0, 0x7, {[@rr={0x7, 0x13, 0xd3, [@remote, @local, @multicast2, @broadcast]}]}}}], 0x28}}], 0x1, 0x4008090) 16:17:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003], 0x10000}) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66ba4000b0c2ee66bad104b829280000efea0e0000000a00b8050000000f23d80f21f835c00000a00f23f8653e65f30f21c62e0fae2b0f01c2b8060000000f23d00f21f835200000000f23f8c4c3a1cf830000000002d9f7", 0x58}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x2800000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:17:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b759191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:38 executing program 4: r0 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r0, 0x0, 0x0) [ 1290.132049][T22899] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10, 0x0}, 0x0) 16:17:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@rthdrdstopts={{0x18}}], 0x18}, 0x0) 16:17:39 executing program 0: futex(0x0, 0xc, 0x0, &(0x7f0000000580)={0x0, 0x989680}, 0x0, 0x0) 16:17:39 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @vsock={0x28, 0x0, 0x0, @host}, @xdp, @vsock={0x28, 0x0, 0x0, @my=0x0}}) [ 1290.217640][T22917] loop1: detected capacity change from 0 to 131072 [ 1290.256026][T22917] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:39 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg$inet(r0, &(0x7f0000003f80)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000040)="ce", 0x1}], 0x1}}], 0x1, 0x0) 16:17:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x2, 0x1, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 16:17:39 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000001380), 0xc081, 0x0) 16:17:39 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0}}], 0x1, 0x0) 16:17:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b789191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @empty}}) 16:17:39 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x214281, 0x0) 16:17:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000078c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{0xfffffffffffffffe}], 0x1}}], 0x1, 0x0) 16:17:39 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xb, &(0x7f0000000500)=@framed={{}, [@map_idx_val, @generic, @kfunc, @func, @alu, @cb_func]}, &(0x7f0000000480)='syzkaller\x00', 0x401, 0xb0, &(0x7f0000000580)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1290.338568][T22936] loop1: detected capacity change from 0 to 131072 16:17:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom(r0, 0x0, 0x0, 0x102, 0x0, 0x0) 16:17:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1104, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, 0x48) 16:17:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x16) 16:17:39 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8946, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1290.382880][T22936] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x4008090) 16:17:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b5891910a2ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:39 executing program 4: futex(&(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0) 16:17:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10, 0x0}, 0x24000000) 16:17:39 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000380)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}}}}) 16:17:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x40000142, 0x0, 0x0) [ 1290.482987][T22959] loop1: detected capacity change from 0 to 131072 [ 1290.511025][T22959] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000041c0), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0], 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0x0, r1, {0x7}}, 0x18) openat(0xffffffffffffff9c, &(0x7f00000020c0)='./file0/file0\x00', 0x0, 0x0) 16:17:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @local}}}}) 16:17:40 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) 16:17:40 executing program 5: syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 16:17:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b5891919c2ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:40 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x59, &(0x7f00000000c0)=""/89, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10, 0x0}}], 0x1, 0x0) 16:17:40 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0xb0, &(0x7f0000000580)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1291.289147][T22982] loop1: detected capacity change from 0 to 131072 [ 1291.330733][T22982] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:40 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6e3}, 0x10}, 0x80) 16:17:40 executing program 2: socket$inet(0xa, 0x3, 0x0) 16:17:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @rand_addr=' \x01\x00'}}) 16:17:40 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001b40)={0x6, 0x2, &(0x7f0000000900)=@raw=[@func, @call], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:40 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 16:17:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba50aea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x894a, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:40 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @private2, 0x4}, 0x1c, 0x0}}], 0x1, 0x0) 16:17:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000240)="05", 0x1}, {&(0x7f0000000280)="83", 0x1}, {0x0}], 0x3, &(0x7f00000003c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x7}}], 0x18}, 0x0) 16:17:40 executing program 4: ioperm(0x0, 0x9, 0x9db4) 16:17:40 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:40 executing program 5: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$inet6(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x1) 16:17:40 executing program 0: write$vhost_msg(0xffffffffffffffff, 0x0, 0x0) [ 1291.443677][T23002] loop1: detected capacity change from 0 to 131072 [ 1291.481507][T23002] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:40 executing program 2: sysfs$2(0x2, 0x0, &(0x7f0000000200)=""/134) 16:17:40 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) 16:17:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000006c0)=@buf) 16:17:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba525ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f0000000100)={0xa, 0x4e21, 0x0, @private1, 0x5}, 0x1c, 0x0}}], 0x1, 0x0) 16:17:40 executing program 3: socketpair(0x1a, 0x6, 0x0, &(0x7f000000c8c0)) 16:17:40 executing program 4: sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x9) 16:17:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @local, {[@timestamp_addr={0x44, 0x4}]}}}}}) 16:17:40 executing program 2: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000180), 0x0, &(0x7f0000000200)="1a", 0x1, r0) 16:17:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x20008881) 16:17:40 executing program 3: add_key(&(0x7f0000000000)='keyring\x00', 0x0, &(0x7f0000000080)="dc", 0x1, 0xfffffffffffffffd) [ 1291.661639][T23027] loop1: detected capacity change from 0 to 131072 16:17:40 executing program 5: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmmsg$inet(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="ce", 0x1}], 0x1, &(0x7f0000000480)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @private}}}], 0x38}}], 0x1, 0x0) 16:17:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @dev}}}}) 16:17:40 executing program 4: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="1a", 0x1, r0) add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) 16:17:40 executing program 0: clock_gettime(0x0, &(0x7f0000000440)) [ 1291.725537][T23027] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba5a2ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@rthdrdstopts={{0x18}}, @hoplimit_2292={{0x14}}, @flowinfo={{0x14, 0x29, 0xb, 0xffffffff}}, @rthdrdstopts={{0x18}}], 0x60}, 0x0) 16:17:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10, 0x0}}], 0x1, 0x0) 16:17:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000004780)={'ip6tnl0\x00', &(0x7f0000004700)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @private2}}) 16:17:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) 16:17:40 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="95000000000000008520"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000080)=""/197, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:40 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) bind$packet(r0, 0x0, 0x0) 16:17:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x4020940d, 0x0) 16:17:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) socketpair(0x1a, 0x0, 0x0, &(0x7f000000c8c0)) 16:17:40 executing program 3: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xfc00000000000000}, &(0x7f0000000100)={0x0, r0+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 16:17:40 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0xc, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x40049409, 0x0) [ 1291.850532][T23057] loop1: detected capacity change from 0 to 131072 [ 1291.883282][T23057] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000780)={'ip6gre0\x00', 0x0}) 16:17:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'gre0\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="7f756e6c3000000000000000000000009f"]}) 16:17:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x7}}], 0x18}, 0x0) 16:17:40 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) bind$xdp(r0, &(0x7f0000000240), 0x10) 16:17:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba5ecea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:40 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x140, 0x0, 0x0) 16:17:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080), 0xc) 16:17:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x48) 16:17:40 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x18, 0x140c, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x18}}, 0x0) 16:17:40 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x2, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:40 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}], 0x1, 0x0) 16:17:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0xc0189436, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8922, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1292.038137][T23091] loop1: detected capacity change from 0 to 131072 [ 1292.113256][T23091] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba5220a1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:41 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0xfc00000000000000}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 16:17:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8991, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:41 executing program 2: syz_genetlink_get_family_id$fou(&(0x7f00000072c0), 0xffffffffffffffff) 16:17:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8992, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, 0x0, 0x0) [ 1292.211682][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) 16:17:41 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="95"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000080)=""/197, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:41 executing program 5: request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='!\x00', 0x0) 16:17:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c, 0x0}, 0x0) [ 1292.297106][T23120] loop1: detected capacity change from 0 to 131072 16:17:41 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$mptcp(&(0x7f0000000440), 0xffffffffffffffff) 16:17:41 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89b0, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1292.341147][T23120] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea64ebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000280)="83", 0x1}, {0x0}], 0x3}, 0x0) 16:17:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@isdn, 0x80) 16:17:41 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local}}}}) 16:17:41 executing program 5: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) 16:17:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x8, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:41 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f000000c8c0)) 16:17:41 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000180)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0}}], 0x1, 0x0) 16:17:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5421, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x108}}], 0x1, 0x0) [ 1292.541170][T23148] loop1: detected capacity change from 0 to 131072 [ 1292.567638][T23148] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 16:17:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x8, &(0x7f0000000540)=@framed={{}, [@btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @kfunc]}, &(0x7f0000000600)='GPL\x00', 0x3, 0xd9, &(0x7f0000000640)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5104e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:41 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 16:17:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x40086602, 0x0) 16:17:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8995, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:41 executing program 4: fanotify_mark(0xffffffffffffffff, 0x200, 0x0, 0xffffffffffffff9c, 0x0) 16:17:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4020000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x1}, 0x14}}, 0x20000040) 16:17:41 executing program 5: request_key(&(0x7f00000000c0)='id_legacy\x00', 0x0, 0x0, 0xfffffffffffffff8) 16:17:41 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x6}]}) 16:17:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f000000ccc0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 16:17:41 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$inet(r0, &(0x7f0000001740)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) 16:17:41 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[], 0x50}}, 0x0) [ 1292.797756][T23178] loop1: detected capacity change from 0 to 131072 [ 1292.818894][ T27] audit: type=1326 audit(1667233061.618:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23179 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f249ce8b5a9 code=0x0 [ 1292.869656][T23178] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe51a4e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000072c0), 0xffffffffffffffff) 16:17:41 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001980)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}}], 0x1, 0x1) 16:17:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) 16:17:41 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000540)=@framed={{}, [@btf_id, @func, @call, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @kfunc]}, &(0x7f0000000600)='GPL\x00', 0x3, 0xd9, &(0x7f0000000640)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:41 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000100)={0x0, r0+10000000}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) 16:17:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x2}, {0x0, 0x0, 0x0, 0x6}, {0x6}]}) 16:17:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@flowinfo={{0x14}}], 0x18}, 0x0) 16:17:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000006c0)=@buf={0x50, &(0x7f0000004080)="ee75be1d9fd9e2e621bda2b942b9a90657fbf60602e855ab77f208b5f33c76ff2e55b79615ffe091ad1ec5ffe76ec7ba83f16ff9fcfa39dfef7f6a765f514b3eed35ac429a1ad77351c8e8f733417d4c"}) 16:17:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) 16:17:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891f, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1293.000355][ T27] audit: type=1326 audit(1667233061.798:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23204 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fce5ec8b5a9 code=0x0 [ 1293.001988][T23207] loop1: detected capacity change from 0 to 131072 16:17:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e05c4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:41 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="d9050d3783c65d440f730527bea92245f7dc1d3825d09db823624f6bde38f4d8c8ab535c3db95352337cd7f8cc0b4d76531ebffae0e061ac6c7226846f73910023fd0422cb541468736203d5c45827350d12abc9c3e95a91219cbb2eeec638de705e516385c9f378c6bc2a0bb844b8849a8081d0b6b8f5b053e0067d4fc550e36429317e4e42dbd5605d5c3d31f77decc2cb6efe11ea5585946892d762ee0528ca9d34e59d684ed8c6b161ec93b4b7ec8654cfc15b6766a5530c") 16:17:41 executing program 0: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000006200), 0x10) 16:17:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 16:17:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001b40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x108}}], 0x1, 0x0) 16:17:41 executing program 0: capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)={0x5}) [ 1293.090760][T23207] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1293.170132][T23227] loop1: detected capacity change from 0 to 131072 [ 1293.190253][T23227] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000000c0)={@private, @loopback}, 0xc) 16:17:42 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x1ff}]}) 16:17:42 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000500)=@framed, &(0x7f0000000480)='syzkaller\x00', 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000240)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr=0x64010102}}}}) 16:17:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000240)="05", 0x1}, {&(0x7f0000000280)="83", 0x1}, {0x0}], 0x3, &(0x7f00000003c0)=[@hoplimit={{0x14, 0x29, 0x34, 0x7}}], 0x18}, 0x0) 16:17:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e05e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1}}) 16:17:42 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001ac0)={@private, @local}, 0xc) 16:17:42 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5421, 0x0) 16:17:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8948, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1293.879733][T23236] loop1: detected capacity change from 0 to 131072 16:17:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x80086601, 0x0) 16:17:42 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 16:17:42 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$inet(r0, &(0x7f0000001640)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) 16:17:42 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1293.940301][T23236] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e5efd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:42 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xb, &(0x7f0000000500)=@framed={{}, [@map_idx_val, @generic={0xf8}, @kfunc, @func, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, @cb_func]}, &(0x7f0000000480)='syzkaller\x00', 0x401, 0xb0, &(0x7f0000000580)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:42 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000004900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 16:17:42 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xfc00000000000000}, 0x0, 0x0) 16:17:42 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:17:42 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x8]}, 0x8}) [ 1294.059468][T23264] loop1: detected capacity change from 0 to 131072 16:17:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:42 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x3}]}) 16:17:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000001880)=@bridge_delneigh={0x28, 0x1c, 0x3f54041d15004545, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2}, [@NDA_LLADDR={0xa, 0x2, @local}]}, 0x28}}, 0x0) 16:17:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x5451, 0x0) 16:17:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000072c0), 0xffffffffffffffff) [ 1294.101487][T23264] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:42 executing program 3: request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='$!/\x00', 0xfffffffffffffffe) 16:17:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd02d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000240)="05", 0x1}, {&(0x7f0000000280)="83", 0x1}], 0x2}, 0x0) 16:17:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$inet(r0, &(0x7f0000001740)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001700)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 16:17:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@x25, 0x80) 16:17:43 executing program 4: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14}}}}) 16:17:43 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 16:17:43 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x200000, 0x0) 16:17:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@hoplimit_2292={{0x14}}, @rthdrdstopts={{0x18}}], 0x30}, 0x0) 16:17:43 executing program 2: request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='vcan0\x00', 0xfffffffffffffff8) 16:17:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80) 16:17:43 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000500), 0x8103, 0x0) 16:17:43 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) [ 1294.354172][T23301] loop1: detected capacity change from 0 to 131072 16:17:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd09d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:43 executing program 5: rt_sigaction(0x2a, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000300)) 16:17:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) bind(r0, &(0x7f0000000200)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "264dfa28f7eca544517d4ee3654aa626fd762a055d80aa0657b5c6e1c63f3e420e8e456501d36b05105c2581a660089f41a833e5fc6fef9e97847fa1a8b155"}, 0x80) 16:17:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8949, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:43 executing program 3: rt_sigaction(0x12, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000340)) 16:17:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x18, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) [ 1294.403012][T23301] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:43 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 16:17:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x8, 0xe11, 0x80000000, 0xfffffffb, {{0x13, 0x4, 0x0, 0x10, 0x4c, 0x64, 0x0, 0x81, 0x2f, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x14, 0xb7, 0x1, 0xd, [{@rand_addr=0x64010102, 0x1f77f993}, {@remote, 0x7}]}, @generic={0x7, 0xc, "692185de4248a6a17469"}, @rr={0x7, 0x17, 0xe6, [@rand_addr=0x64010101, @multicast2, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty]}]}}}}}) socketpair(0x3, 0xa, 0x800, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x8d1}, 0x8000) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', r2, 0x2f, 0x6, 0x10, 0x0, 0x22, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7800, 0x20, 0x81, 0x8001}}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000380)={'syztnl1\x00', &(0x7f0000000300)={'syztnl0\x00', r2, 0x2f, 0x81, 0x40, 0x2, 0x64, @private1, @dev={0xfe, 0x80, '\x00', 0x1f}, 0x10, 0x8000, 0xaf0, 0x1ff}}) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6gre0\x00', r4, 0x4, 0xf8, 0x0, 0x7, 0x2c, @private0, @mcast1, 0x20, 0x5ec62301f42cfc, 0x260, 0x80000000}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000580)={'ip6tnl0\x00', &(0x7f0000000500)={'syztnl2\x00', r4, 0x2f, 0xfe, 0xc9, 0xffffffff, 0x50, @ipv4={'\x00', '\xff\xff', @remote}, @mcast1, 0x10, 0x20, 0xe2, 0xff}}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000680)={'ip6_vti0\x00', &(0x7f0000000600)={'syztnl0\x00', r4, 0x2f, 0x0, 0x8, 0x3, 0x6, @local, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40, 0x80, 0x1, 0x3}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r5, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10401}, 0xc, &(0x7f00000006c0)={&(0x7f00000007c0)={0x17c, 0x0, 0x224, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x400}, 0x40000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x2}, {}, {0x3ff}]}) 16:17:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89b1, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8914, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1294.492074][T23326] loop1: detected capacity change from 0 to 131072 16:17:43 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000180), 0x0, 0x0, 0x0, r0) [ 1294.536301][T23326] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd10d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:43 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) sendmmsg$sock(r0, &(0x7f0000002600)=[{{&(0x7f0000000000)=@phonet, 0x80, &(0x7f0000002540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 16:17:43 executing program 0: futex(&(0x7f0000000400), 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) 16:17:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="a4"], 0x108}}], 0x1, 0x0) 16:17:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x891d, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:43 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xd955d7c7093d2cd3, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@local, @private0, @mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100100}) 16:17:43 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={0x0, @l2={0x1f, 0x0, @none}, @qipcrtr, @tipc=@id}) 16:17:43 executing program 5: syz_open_dev$evdev(&(0x7f00000001c0), 0x6, 0x0) 16:17:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8932, &(0x7f0000000780)={'syztnl0\x00', 0x0}) [ 1294.672274][T23354] loop1: detected capacity change from 0 to 131072 [ 1294.706795][T23354] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000440)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0xfff8}]}}}, @ip_tos_u8={{0x11}}], 0x30}}], 0x1, 0x0) 16:17:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x401c5820, 0x0) 16:17:43 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, 0xfffffffffffffff8) 16:17:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, @dev, @remote}}) 16:17:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd5ed6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000540)={&(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_ttl={{0x14}}], 0x18}, 0x0) 16:17:43 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) statx(r0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) 16:17:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000d40), 0x2, 0x0) write$vhost_msg(r0, &(0x7f0000000ec0)={0x1, {0x0, 0x0, 0x0}}, 0x48) 16:17:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) 16:17:43 executing program 5: r0 = socket$igmp(0x2, 0x3, 0x2) connect(r0, 0x0, 0x0) 16:17:43 executing program 2: rt_sigaction(0x2a, 0x0, 0x0, 0x8, &(0x7f0000000300)) 16:17:43 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x101, 0x0, 0x0) 16:17:43 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) 16:17:43 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x6, &(0x7f0000000540)=@framed={{}, [@btf_id, @func={0x85, 0x0, 0x1, 0x0, 0x5}]}, &(0x7f0000000600)='GPL\x00', 0x3, 0xd9, &(0x7f0000000640)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1294.823617][T23373] loop1: detected capacity change from 0 to 131072 [ 1294.837761][T23373] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:43 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{0x2}, {}]}) [ 1294.895867][ T27] audit: type=1326 audit(1667233063.698:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23378 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fafee68b5a9 code=0x0 16:17:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, 0x0, 0x0) 16:17:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd4002cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:43 executing program 4: syz_clone(0x1000, 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)='^') 16:17:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) 16:17:43 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x8993, &(0x7f0000000780)={'syztnl0\x00', 0x0}) 16:17:43 executing program 0: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) [ 1294.936970][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:43 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc]}, &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:43 executing program 3: bpf$PROG_LOAD_XDP(0xd, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:43 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x0, 0x0, &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:43 executing program 4: bpf$PROG_LOAD_XDP(0x3, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @mcast1}}) [ 1295.033955][T23408] loop1: detected capacity change from 0 to 131072 16:17:43 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000000000)='asymmetric\x00', 0x0, 0xfffffffffffffff8) 16:17:43 executing program 5: open(&(0x7f0000001a40)='./file0\x00', 0x111240, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 1295.088031][T23408] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38d08a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:44 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x0, 0x12, r0, 0x0) 16:17:44 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:17:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x19, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:44 executing program 3: r0 = socket$igmp(0x2, 0x3, 0x2) sendmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001240)=[{0x28, 0x0, 0x0, "fefcecb4ab28ae187b124094afabcde0ab"}], 0x28}, 0x0) 16:17:44 executing program 5: renameat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x0) 16:17:44 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x200, 0x0) 16:17:44 executing program 4: add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc4}, &(0x7f00000000c0)={0x0, "ddbce9c1631167fb2221fd3b88f333e9098c2c045409f81cfb32e609380335a9e8cbc1d2fd32720c5f423529a7b0aca2d7d1bb017f6fe653fdf3ec0abafe283b"}, 0x48, 0xfffffffffffffffb) 16:17:44 executing program 0: keyctl$search(0x13, 0x0, 0x0, 0x0, 0x0) 16:17:44 executing program 3: bpf$PROG_LOAD_XDP(0x8, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:44 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) 16:17:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) writev(r0, &(0x7f0000003980)=[{&(0x7f00000001c0)='3', 0x1}], 0x1) [ 1295.267921][T23437] loop1: detected capacity change from 0 to 131072 [ 1295.297954][T23437] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a19964c45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:44 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$set_timeout(0xf, r1, 0x1) keyctl$search(0x3, r1, 0x0, 0x0, 0x0) 16:17:44 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) 16:17:44 executing program 2: openat$vcsu(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 16:17:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="0000002c0b1ff000c5b7e106b890ea384faa726c79aeb6f21f12631c3c0d4e21389012a663b6440da3301080dd18bcc2b81cb3c9c8002b0ecbe98d21ba610e8abfaec3018bbedc6caf085af118cf814bb1dfa5799239a2c99e55d99fb36e952eaf87cf95537a2eb6c7448cf59bd607556361235df243017b19ae435072f2ae3fc12032172a654da778422383fe5e5682f33611cc00768ff7029d7bfca8def982a26bd907bf7c192df82b99b17b2a512c501022c87f6a4682e870460a6f6c92835fb93f79c87822b7ce811bf3e17e51d76beb9fa9c875e32c3484ba05b22478bc9400521ba6c09800"/243], 0x160c}], 0x1}, 0x0) 16:17:44 executing program 5: bpf$LINK_GET_NEXT_ID(0x23, 0x0, 0x0) 16:17:44 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x10}}], 0x10}}], 0x1, 0x0) 16:17:44 executing program 3: bpf$LINK_GET_NEXT_ID(0x10, 0x0, 0x0) 16:17:44 executing program 4: bpf$PROG_LOAD_XDP(0x22, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:44 executing program 0: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x8}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 16:17:44 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x300, 0x0) mq_getsetattr(r0, 0x0, 0x0) [ 1295.419900][T23464] loop1: detected capacity change from 0 to 131072 [ 1295.452807][T23464] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc40a46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x894b, 0x0) 16:17:44 executing program 0: bpf$LINK_GET_NEXT_ID(0x1d, 0x0, 0x0) 16:17:44 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$fb(r0, &(0x7f00000002c0)=""/102, 0x66) 16:17:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x400454ca, 0x0) 16:17:44 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "16cd84d2ce4e4e6da3c4ac47271ed058e79fc2e765e64ac669444fa43a72b3eb3bfd494c33ba07ed014845b1bf925144278f207efbc76e3f08e864273aa4212a"}, 0x48, 0xffffffffffffffff) 16:17:44 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 16:17:44 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) 16:17:44 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x6, r0, 0x0, 0x0, 0x0) 16:17:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) writev(r0, &(0x7f0000003980), 0x1000000000000025) 16:17:44 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x111240, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 16:17:44 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "a45160273aa8b3ad0fff36be4e346763595e2100c40c9e716d010422556721622ede8cb5c80c7604adc5f0ba53de67d4f3dab995ae0183b9922c68190f86c70d"}, 0x48, r1) [ 1295.554661][T23487] loop1: detected capacity change from 0 to 131072 [ 1295.616038][T23487] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc42546a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:44 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x8, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000040)={0x18, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0x4, 0x33}]}, 0x18}], 0x1}, 0x0) 16:17:44 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001280)={'wlan0\x00'}) 16:17:44 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "bc281a92b6cdb9112aaaea5078cef10beaa139d1402ce6380e16db78be4d84446e7b69e7f87446e88abdfab167ef1f633144d6a42becc76ce6a92c9fa7f38faa"}, 0x48, r0) add_key(&(0x7f0000000100)='pkcs7_test\x00', 0x0, 0x0, 0x0, r1) 16:17:44 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "a45160273aa8b3ad0fff36be4e346763595e2100c40c9e716d010422556721622ede8cb5c80c7604adc5f0ba53de67d4f3dab995ae0183b9922c68190f86c70d"}, 0x48, r1) 16:17:44 executing program 4: bpf$PROG_LOAD_XDP(0xe, 0x0, 0x0) 16:17:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x2, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:44 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x11, 0x22, 0x0, 0x0) [ 1295.688238][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001640)=ANY=[], 0x5c}}, 0x0) 16:17:44 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "a45160273aa8b3ad0fff36be4e346763595e2100c40c9e716d010422556721622ede8cb5c80c7604adc5f0ba53de67d4f3dab995ae0183b9922c68190f86c70d"}, 0x48, r1) 16:17:44 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0xf4240, &(0x7f00000024c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}], &(0x7f0000002540)='syzkaller\x00', 0x9, 0x12, &(0x7f0000002580)=""/18, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0), 0x8, 0x10, &(0x7f0000002600), 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 1295.764827][T23515] loop1: detected capacity change from 0 to 131072 16:17:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d0aa3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x104, 0x1}, 0x48) 16:17:44 executing program 2: add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 16:17:44 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) 16:17:44 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "a45160273aa8b3ad0fff36be4e346763595e2100c40c9e716d010422556721622ede8cb5c80c7604adc5f0ba53de67d4f3dab995ae0183b9922c68190f86c70d"}, 0x48, r1) [ 1295.824242][T23515] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:44 executing program 0: bpf$PROG_LOAD_XDP(0xb, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000f80)='GPL\x00', 0x5c87, 0xfd, &(0x7f0000000080)=""/253, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x8, 0x8}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x9, 0x9, 0xea665a4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0x1, 0xffffffffffffffff]}, 0x80) 16:17:44 executing program 5: bpf$LINK_GET_NEXT_ID(0xf, 0x0, 0x0) 16:17:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)=ANY=[@ANYBLOB="240000001a000100000000000000000001"], 0x24}], 0x1}, 0x0) 16:17:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x1c, 0x5, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1295.938733][T23538] loop1: detected capacity change from 0 to 131072 16:17:44 executing program 2: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffc) [ 1296.009405][T23538] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "e6679993c7932a907d166a02978bc1200f21b39a29f497e6cfca197c2a6b3a219a83333872dcd21c12c9333c12f98977542b5fed2643e4ec7f7daf5d3546a1a0"}, 0x48, r0) add_key(&(0x7f0000000040)='encrypted\x00', 0x0, 0x0, 0x0, r1) 16:17:45 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 3: bpf$LINK_GET_NEXT_ID(0x22, 0x0, 0x0) 16:17:45 executing program 5: mmap$KVM_VCPU(&(0x7f0000ffd000/0x2000)=nil, 0x930, 0x1, 0x30, 0xffffffffffffffff, 0x0) 16:17:45 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xb, r0, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d25a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:45 executing program 0: bpf$LINK_GET_NEXT_ID(0x1a, 0x0, 0x0) 16:17:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x2, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x1}, 0x0) 16:17:45 executing program 3: bpf$PROG_LOAD_XDP(0x1e, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x5}, 0x48) [ 1296.324107][T23557] loop1: detected capacity change from 0 to 131072 16:17:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000240)='@@/*\x00', r1) 16:17:45 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x4, r0, &(0x7f0000000200)='logon\x00', 0x0, 0x0) 16:17:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0), r0) 16:17:45 executing program 2: bpf$PROG_LOAD_XDP(0x1a, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1296.366636][T23557] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:45 executing program 5: bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0xa3) 16:17:45 executing program 3: request_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0) 16:17:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:45 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) 16:17:45 executing program 2: r0 = socket(0x2, 0x3, 0xdb) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 16:17:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x3, 0x0, 0x0, 0x0, @ipv6=@loopback={0x400000000000000}}]}, 0x24}], 0x1}, 0x0) 16:17:45 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002600)={0x0, 0x7, 0x4, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:17:45 executing program 3: open(&(0x7f0000001a40)='./file0\x00', 0x111240, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 16:17:45 executing program 5: request_key(&(0x7f0000002800)='asymmetric\x00', &(0x7f0000002840)={'syz', 0x1}, &(0x7f0000002880)='/dev/cuse\x00', 0xfffffffffffffffc) 16:17:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}, 0x7}, 0x0) [ 1296.489873][T23582] loop1: detected capacity change from 0 to 131072 16:17:45 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x300, 0x0) 16:17:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000340)='\x003', 0x2, r0) 16:17:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000340)='\x00', 0x1, r0) 16:17:45 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)="af") [ 1296.539162][T23582] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="08e591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:45 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) 16:17:45 executing program 5: keyctl$search(0x7, 0x0, 0x0, 0x0, 0x0) 16:17:45 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000002200), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000002340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32]) 16:17:45 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x12, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 16:17:45 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x278a, 0x0) read$FUSE(r0, 0x0, 0x55) [ 1296.644559][T23610] loop1: detected capacity change from 0 to 131072 16:17:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x2}, 0x48) 16:17:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0, 0x9effffff00000000}, 0x7}, 0x0) 16:17:45 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xee01, 0xffffffffffffffff) 16:17:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x14, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x14}], 0x1}, 0x0) [ 1296.691375][T23610] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:45 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x3e8, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="0ae591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:45 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000f80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x15, 0x8, 0xfff, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 16:17:45 executing program 2: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000cc0)='logon\x00', &(0x7f0000000d00)={'syz', 0x0}, &(0x7f0000000d40)='fscrypt:', 0x0) 16:17:45 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x1e, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x0, r0) read$watch_queue(r1, &(0x7f0000000000)=""/33, 0x21) 16:17:45 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x12, &(0x7f0000002580)=""/18, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x18, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @binary="0d238cf9"}]}, 0x18}], 0x1}, 0x0) 16:17:45 executing program 2: add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f00000002c0)={'fscrypt:', @desc1}, &(0x7f0000000240)={0x0, "ff0ecbc61665412549b2804df5d59e912250a806e315c7cb5d538f931cbd0cc491db40552495695cd010b3cbea5974b43d84fc029b7f9134ef0dc6bcff750e6b"}, 0xfffffffffffffdf4, 0x0) 16:17:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x11d4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1296.838510][T23644] loop1: detected capacity change from 0 to 131072 [ 1296.864402][T23644] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f000000d840)={{0x14}, [@NFT_MSG_NEWTABLE={0x34, 0x0, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_TABLE_HANDLE={0xc}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_HANDLE={0xc}]}, @NFT_MSG_NEWSETELEM={0xca8, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_ELEMENTS={0xc94, 0x3, 0x0, 0x1, [{0xe4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_USERDATA={0xc1, 0x6, 0x1, 0x0, "945a514475cecba47d844f42be7b22c7609f1048831c653c905c9d8bac80f643a73dc91e9fa382315366827cb2ed68c157ad0bc9cbefa8d92deda44ae95968f4c27a5befdee6ac002e38c71ca8b35df91e1a15777bf2ca4c6725bde9978caaeebfcf43ab3129e04fdbd8ad00b17f92a18ecaeddae4db14639d80b44861411fa885d071259c21c71d5a0f8bc43b04463da3680296c57b6ffbe9cffa28dc670a2e780d6e64b7d2cc01dcf96577a1963389531d369ac12a5f2b57ec269f29"}]}, {0x21c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x8d, 0x6, 0x1, 0x0, "0dee2978611800ac20f3abcedd5d388e3560fda741dcddd2824c6ee0624e4a2793e7303cf2ed6e210cc6ee4e78ce6396aa48be0e787064bb38777a81f1ae4a0895a15a224456106084bfe5d8bb5b06f04c3516df1bd3a3ae3463c91f4ffa8a7cd4012ac6b14630a7153ce360ff32f7a2cd636df2e61b1dcbb891b234a58643ca82ea44e6972c702a6e"}, @NFTA_SET_ELEM_KEY={0xd8, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x21, 0x1, "3816087532669d06f32a67eb58bdb924cddeb6e738d028defddfabd3b6"}, @NFTA_DATA_VALUE={0x79, 0x1, "e2f7232578f149e04710291f96d45de96eced1737967d4f781a8f346ad43bf09e695208fc71c81783e502e5f3ca212791a75237b84324cbc10de9a52d39ff33595a6c01cd74a53ab850a0ddd1b935f56537cd780da2cbe827a0309c57be81805ba95b0cf5e037054319e2def095217a5ca5461e703"}, @NFTA_DATA_VALUE={0x31, 0x1, "7bb01c8278936acd445615526f2c3564007d7fd1249571592b4fc226bee90ba3894843451f5ebdbaee9ef5d7ea"}]}, @NFTA_SET_ELEM_USERDATA={0x31, 0x6, 0x1, 0x0, "dc4f23fee3913cc3028bd44094b97fc4f4eec3a69c5d2b0e92a03603658672d6219e9766b3ec888e320fb5652d"}, @NFTA_SET_ELEM_DATA={0x44, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x14, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}]}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_EXPIRATION={0xc}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_FLAGS={0x8}]}, {0x990, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0x65, 0x6, 0x1, 0x0, "f4a175fb02a7f100c9df49985d185140241d4cf83918d2f4c8ecc32c88fdea312f7faff9cd6f5667a88fcfb418e35581d012e3a6d596ca048e6fb640aa5c53d48e0db00f1c06425b67fbd8d015e8626cbb89f56438cb2c9b17272d2b38e8f1cc86"}, @NFTA_SET_ELEM_DATA={0x310, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VALUE={0xdd, 0x1, "01f3c8d0e8a0fc5447aad3891f15eaeca4a21dfeeef9511dcd83a32c6aa08991c8c5536e758492fb74471cb093104450b37cc62f421a06ef80edb6e371e999350105d6c800040b0c82fe5b0d2ee1c073efbe08a288f4c3baed3483fd52106dd3dea29097552d6658950a045d0bc70206149e92e6be3532ad0415314b336bec5cad7c5392763ee9083e62ef4d636f466e7c0ec5f74a883dde0b5c114a0ab26c880035536c073cf28bc49ffdaa49f4d37551a1a223b86d6a07ec8249b765b8a4c2ace11db0147ac31dc5efb22ae189888ff73300dee2fee19590"}, @NFTA_DATA_VALUE={0xd1, 0x1, "9def48c65b1b413b0872503a4521aca2d096ded63582d5f0f4660c7b6fe0c5751194d7a4c97d1a80390482d716d14d5b1f17930f5ee55fea341ccd643448aa5f90bcf4c6e49ba9768bb4e3c7e3bcc1a415776c5815cfbe76d2f1f027cac315a76a8ad6df7731fe138dece7d7700b0c23a36d2eb3f1939ab50d10735ba08ad692a712a770ab664246fb7452800f14d7528d98554e77e8c4ff6d6c8c1e971dcd11e90a1e4a482d7ccc694f2cd8b9bc8cef398d1b977d01cc1f1fa69ec500923ce554809bcb5f6aebd54883b1e966"}, @NFTA_DATA_VERDICT={0x30, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x55, 0x1, "06aac904814a174e25d0ef0f46b591f31d13a9c21af063244747cca6be11319d00754577b8ea1ffecc8c76fc72981c7095cf54d0aec2ff23d7487566cce83d8271905269bde426c4936b841693de23b371"}, @NFTA_DATA_VALUE={0x2d, 0x1, "08383e6e3e2c255d48452cf491960bf98d78eae5726614db11d7d92bc0031de849ec2fe0af017dd16e"}, @NFTA_DATA_VALUE={0x3d, 0x1, "c91b33afdb39c50ebbc162b73a9226a3ffff272c4d885f39f0514588dc745e864c9f6fd29a941fbc444abed722f515eb8a51ac48e564d1583d"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_KEY_END={0x1b0, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xf5, 0x1, "868a5a0561b39e7648c4e64b083e47ef466866596756f71bfe4a2af759f45af89ec7a50013f8021db47df4bf5955193802cecf9adb9c210e26bfef75fee7c77918fb0d351415831af0d03e21eb501388a519d1f9b517c23e1cddb76534ce1335c07e453b3f0795e84dacdd3d1d37a0ebaf85f781f8c83cdc7348581d47e7a2e64061aea4df14a489996af5f401cc1dec879b6d116723728a0b905aa6f2a4bdb1855cef9436ef7599562df898d37beea22d5b32b7086302d19f28479483f1041e170b9c5638dca91f97b2a9d01bde65d0e6ee83ba3eb40c38a0a928e91082f8572f4c1fc5c8939ae3241ba3339497d8562d"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}]}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x50, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_SET_ELEM_KEY={0x1b8, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x5d, 0x1, "4f89432626995ec711eb233058b0d374ce23eb3f2b5d1307aa8f38ddebc0b45934c9309c3c2e5a1c381b759ba55abc20adebe832729e8e67284c9d642c7f0aff7dc9cfbaddabb925d65bc1033ed02fc1bcf33cfeba661bcff0"}, @NFTA_DATA_VALUE={0xfd, 0x1, "adf3385dfdf16d1604138e6329da98afad0600f8002c7a0cbf58db7315ba592e9038c096a6724688b9907af5ac47603c75a838c1fcef9deae843204033c1065af9ae20cd7547b5c9ce766f3ce998146fb40e3910eca4f51ce271e317bd1c453e5546b703bd5ee420ba441e80ebe022a0dba67807fabb49ca624e7d9d441a7f1183b4429ba11966ace9d1935b1679dd22d8a20ba52682906ac6b804658e36e19643d0279bfe550ee7ce6a84ce20dd4fad7b5eaf03169c98458f8b031e3e8dc4e9f7e914bc7d4c49641a323551aee575cc1c72e60e53a262292f6ddbf4e1e099c3b69538940fb0bbc50713fb225cae78d33c593d1712faf2a0c8"}, @NFTA_DATA_VERDICT={0x44, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN_ID={0x8}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}]}, @NFTA_SET_ELEM_USERDATA={0x29d, 0x6, 0x1, 0x0, "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"}]}]}]}], {0x14}}, 0xd04}}, 0x0) 16:17:45 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x6000, 0x0) 16:17:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="25e591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:45 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5411, 0x0) 16:17:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000002600)={0x0}}, 0x0) 16:17:45 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r0) [ 1296.887304][T23655] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 16:17:45 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x6, r0, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) [ 1296.967675][T23665] loop1: detected capacity change from 0 to 131072 [ 1296.989774][T23665] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000002680)={0x0, 0x2, &(0x7f0000002300)=@raw=[@map_fd], &(0x7f0000002340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2fe591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:46 executing program 5: bpf$LINK_GET_NEXT_ID(0x17, 0x0, 0x0) 16:17:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x894c, 0x0) 16:17:46 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$FUSE_ENTRY(r0, 0x0, 0x0) 16:17:46 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:17:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}], &(0x7f0000002540)='syzkaller\x00', 0x9, 0x12, &(0x7f0000002580)=""/18, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002600)={0x0, 0x7, 0x4, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:17:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/icmp6\x00') r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) fcntl$dupfd(r0, 0x0, r1) 16:17:46 executing program 2: bpf$LINK_GET_NEXT_ID(0x4, 0x0, 0x0) 16:17:46 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x4000)=nil, 0x930, 0x4, 0x10, r0, 0x0) [ 1297.710770][T23678] loop1: detected capacity change from 0 to 131072 16:17:46 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x11, 0x22, 0x0, 0x0) 16:17:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000025c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 16:17:46 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)={0x0, "3e344c7de0b3ec9dad15317942ce016c7f5c5a44ee340230bba02dab937d903d80a2d87928fc250f28174f76a0c1158104ea9564a951c002e1e78a75684ac04c"}, 0x48, 0xfffffffffffffffc) keyctl$search(0x2, r0, 0x0, 0x0, 0x0) [ 1297.753609][T23678] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:46 executing program 3: bpf$LINK_GET_NEXT_ID(0x6, 0x0, 0x0) 16:17:46 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x14, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="d6", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, r1) 16:17:46 executing program 4: pselect6(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={[0x6]}, 0x8}) 16:17:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="5ce591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x5, 0x80000000, 0xfffffff8, 0xfffffffb}, 0x48) 16:17:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x4, r0, 0x0, 0x0) 16:17:46 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x300, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x0, 0x10, r0, 0x0) [ 1297.892455][T23707] loop1: detected capacity change from 0 to 131072 16:17:46 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 16:17:46 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)={0x0, "3e344c7de0b3ec9dad15317942ce016c7f5c5a44ee340230bba02dab937d903d80a2d87928fc250f28174f76a0c1158104ea9564a951c002e1e78a75684ac04c"}, 0x48, 0xfffffffffffffffc) 16:17:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 16:17:46 executing program 0: mmap$KVM_VCPU(&(0x7f0000ffd000/0x2000)=nil, 0x930, 0x0, 0x30, 0xffffffffffffffff, 0x0) 16:17:46 executing program 5: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x100) 16:17:46 executing program 4: write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) socketpair(0x0, 0x0, 0x0, &(0x7f0000002200)) [ 1297.936054][T23707] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="64e591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:46 executing program 3: bpf$PROG_LOAD_XDP(0x1d, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:46 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000040)='logon\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000380)='`', 0x1, r0) 16:17:46 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0xf4240, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:46 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) [ 1298.031275][T23726] process 'syz-executor.5' launched '/dev/fd/-1/./file0' with NULL argv: empty string added 16:17:46 executing program 0: bpf$PROG_LOAD_XDP(0x14, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x17, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0x5, 0x0, 0x0, 0x0, @binary='\r'}]}, 0x18}], 0x1, 0x0, 0x0, 0x51}, 0x0) 16:17:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20000041) [ 1298.090000][T23734] loop1: detected capacity change from 0 to 131072 16:17:46 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='+\x00', 0x0) 16:17:46 executing program 0: bpf$PROG_LOAD_XDP(0x11, 0x0, 0x0) [ 1298.135136][T23734] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1298.170846][T23742] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 16:17:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee59104f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:47 executing program 5: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_clone3(0x0, 0x0) getpgid(0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001800)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = getpgid(0x0) pidfd_open(r0, 0x0) 16:17:47 executing program 0: syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0xa0000) 16:17:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'ip6gre0\x00', 0x0}) [ 1298.187978][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:47 executing program 3: socket(0x2, 0x3, 0xdb) [ 1298.232850][T23753] loop1: detected capacity change from 0 to 131072 [ 1298.314857][T23753] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:47 executing program 2: bpf$PROG_LOAD_XDP(0xc, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:47 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f0000000380)={0x0, "e6679993c7932a907d166a02978bc1200f21b39a29f497e6cfca197c2a6b3a219a83333872dcd21c12c9333c12f98977542b5fed2643e4ec7f7daf5d3546a1a0"}, 0x48, r0) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r1) 16:17:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) 16:17:47 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x0, 0x8}, 0xc) 16:17:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000140)=0x6, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 16:17:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee59138f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:47 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 16:17:47 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0xf4240, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x12, &(0x7f0000002580)=""/18, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0), 0x8, 0x10, &(0x7f0000002600)={0x0, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:17:47 executing program 5: utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)) 16:17:47 executing program 4: bpf$LINK_GET_NEXT_ID(0x15, 0x0, 0x0) [ 1298.664274][T23774] loop1: detected capacity change from 0 to 131072 [ 1298.670915][ T27] audit: type=1326 audit(1667233067.458:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23767 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc83ae8b5a9 code=0x0 16:17:47 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, 0x0) 16:17:47 executing program 2: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000780)=[{&(0x7f0000000280)="bd2786911aa2ea65088137f90610e254bf40a9d45d8b96db5952df23c1593327540dce6e2bd11dde85de00"/53, 0x30}, {&(0x7f0000000240)="23b0dd57db95707c65a46f88bed6f04f0cc3864779fe3680a81c29ce8a919caa1b3e4915c5795cbd22fe81c6e87c4c00ad80a0609aa2e6dc62c3d790dcf005e8", 0x40}, {&(0x7f0000000380)="9107ce1b52cfbacf46ee0bb0c4b4de92878da4955826adb16f1545499eabd499e145a3fc31833faf8596a5ffcf2648e26c36cf11b177868fc0e3f1809ca9c13bbb65844e0b6b43a01ac684a07a78fe146309d6876184aab567b13357cf5c59a618f50bdfa686db822c82116830f9d7d6d88fd6822c646c049e1d7ef1467933aff2b052cc42790539b35ade9ac55fb2fc7054b800b74286e680107cba0b846411ee93744588165d01a609299abaf045de3462612b014dac22f27efe0fac11fa815fd44330c5617fa107a5f9b2ef7f59e9d48c87afc713d9", 0xe1}, {&(0x7f0000000480)="97db8d9d86c7cf48bd616ade25dc2b8c27b2aef727eed16cff31fe165cf72efc76ea920888e0fb5bf54120f931b95d02d54bd6e3e8664789cc1311b71df1e29feafebd36bdd4c2ceb4ee8f3f5699b677b44fb1ce7c4d1beca7160b0a70ec11c9d2f1421bd3714cd328f374978678c5f247e24dd0f242f5986a09fc4b37af34d67c4f9451f43df2ef344c71641f66dfc295edddd2ed78c2ee02f766a1cebe266158e622e7b06223ac052c49079608209371ba8dc04cc4d0d606a73cda3646f972058cfb30dad99a66", 0xc8}, {&(0x7f0000000580)="d7a11a5a789f120540985567d50c348ddddea2b755892c4dc0ae2c4b15fb69ffaf97e93024493228eb7b364f7951a92aa015c56d7e4e264d5daf16115a1ea251b278e1e396c22a97bb70a9a94a001aed00b97e2e633bee7af1e6a90879c6621021d8b62a565102c918e6ebd13c7ea61f77d5c62ad9687abb5ea2bf5796968f9959301b28634806278cc14e706ceaf237a505cff6739ab2d078b7f9991c9a28b66ba413d3ee2b96c8d3f7c476355c5bd4059e559317c202b294bffdf2b94d499b84d9dc458cfd290103673986909a09e652a9c3631045d49d6268926891154ad9d3d89ed0d8d8de75e2cba1e3bf55c768046d", 0xffffffae}], 0x5, 0x0) 16:17:47 executing program 5: add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="8b23149db77c4390d66e097958011c0c619acb33760c86cf1ec61f5390d8d7aa2d8351da190eae516128113e6b2c0a", 0x2f, 0xfffffffffffffffd) 16:17:47 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/diskstats\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) [ 1298.720640][T23774] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80009d3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:47 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="0b8ff4d1d0cf1b6a0415820ac237c56c7e0a2c91114941ccdab2723682fbe402d78b7c821cc519d568e84670cd65a54336f758bfd8d993d7d543755231560c1a740352d821eb2cb7c300176d48851f5666", 0x51}], 0x1) 16:17:47 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000002640)={&(0x7f0000002580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002600)={&(0x7f00000025c0)={0x14}, 0x14}}, 0x0) 16:17:47 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001f000000000000008c0000003b4240000800000095"], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:47 executing program 4: bpf$LINK_GET_NEXT_ID(0x19, 0x0, 0x0) [ 1298.811463][T23792] trusted_key: encrypted_key: master key parameter 'yX ašË3v †ÏÆSØת-ƒQÚ®Qa(>k, [ 1298.811463][T23792] ' is invalid [ 1298.822943][T23796] loop1: detected capacity change from 0 to 131072 [ 1298.873593][T23796] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:47 executing program 3: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0xc000, 0x0) 16:17:47 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0xfffffffffffffff5, 0x0, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x5}}}, 0x60) 16:17:47 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x2000)=nil, 0x930, 0x0, 0x2010, r0, 0x0) 16:17:47 executing program 0: keyctl$search(0x2, 0x0, 0x0, 0x0, 0x0) 16:17:47 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000001c0)) 16:17:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8023cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:47 executing program 5: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@ng, 0x2, 0x3) 16:17:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={0x0}}, 0x0) 16:17:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') write$P9_RUNLINKAT(r0, 0x0, 0x0) 16:17:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002880)={'erspan0\x00', 0x0}) [ 1299.156560][T23812] loop1: detected capacity change from 0 to 131072 16:17:48 executing program 3: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, r0) 16:17:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x14, 0x14, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x14}], 0x1}, 0x0) [ 1299.215014][T23812] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={0x0}}, 0x0) 16:17:48 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) 16:17:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x100000000000000}, 0x0) 16:17:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8033cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x7}, 0x0) 16:17:48 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000002580)={0x2020}, 0x2020) [ 1299.340982][T23836] loop1: detected capacity change from 0 to 131072 [ 1299.397262][T23836] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:48 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000440)={0x20}, 0x20) 16:17:48 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x3a3, 0x3f}}}, 0x60) 16:17:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000f40)) 16:17:48 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8918, 0x0) 16:17:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8043cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:48 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1299.448974][ T27] audit: type=1800 audit(1667233068.248:1257): pid=23825 uid=0 auid=4294967295 ses=4294967295 subj=_ op=set_data cause=unavailable-hash-algorithm comm="syz-executor.5" name="/root/syzkaller-testdir944098775/syzkaller.1myU0e/2921/file0" dev="sda1" ino=1186 res=0 errno=0 [ 1299.488627][T23851] loop1: detected capacity change from 0 to 131072 16:17:48 executing program 2: keyctl$search(0x2, 0x0, 0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:48 executing program 0: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x200242) 16:17:48 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8053cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1299.525437][T23851] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001280)={'wlan0\x00'}) 16:17:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000fc0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 1299.596678][T23864] loop1: detected capacity change from 0 to 131072 [ 1299.643525][T23864] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1299.966398][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 16:17:49 executing program 2: bpf$LINK_GET_NEXT_ID(0x2, 0x0, 0x0) 16:17:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8063cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:49 executing program 0: bpf$LINK_GET_NEXT_ID(0x1b, 0x0, 0x0) 16:17:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1400}, 0x0) 16:17:49 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$get_keyring_id(0x0, r1, 0x0) 16:17:49 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000}], &(0x7f0000002540)='syzkaller\x00', 0x9, 0x12, &(0x7f0000002580)=""/18, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002600)={0x0, 0x0, 0x4, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000003700)={0x10}, 0x10}, {&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x3, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x2}, 0x0) 16:17:49 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 16:17:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x88, 0x22, 0x0, 0x0) 16:17:49 executing program 0: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) [ 1300.230918][T23879] loop1: detected capacity change from 0 to 131072 16:17:49 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000240)) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='!:+&^/\x00', 0x0) 16:17:49 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="0b8ff4d1d0cf1b6a0415820ac237c56c7e0a2c91114941ccdab2723682fbe402d78b7c821cc519d568e84670cd65a54336f758bfd8d993d7d543755231560c1a740352d821eb2cb7c300176d48851f5666", 0x51}], 0xffffff1f) 16:17:49 executing program 2: get_robust_list(0x0, &(0x7f0000000c00)=0x0, &(0x7f0000000c40)) 16:17:49 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x4}, 0x10) 16:17:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8073cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x6}, {0x6}]}) 16:17:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x3e9, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1300.284555][T23879] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:49 executing program 4: newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 16:17:49 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$FUSE_OPEN(r0, 0x0, 0x0) [ 1300.361509][T23898] loop1: detected capacity change from 0 to 131072 [ 1300.373175][ T27] audit: type=1326 audit(1667233069.168:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23895 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fafee68b5a9 code=0x0 16:17:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r0) 16:17:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x14, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x3, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x1}, 0x0) 16:17:49 executing program 0: add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 16:17:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x54}}, 0x0) [ 1300.404383][T23898] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8905, 0x0) 16:17:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x10, 0x1a, 0x1}, 0x10}], 0x1}, 0x0) 16:17:49 executing program 0: openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) 16:17:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8083cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x15}, 0x48) 16:17:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x890b, 0x0) 16:17:49 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) 16:17:49 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="0b8ff4d1d0cf1b6a0415820ac237c56c7e0a2c91114941ccdab2723682fbe402d78b7c821cc519d568e84670cd65a54336f758bfd8d993d7d543755231560c1a740352d821eb2cb7c300176d48851f5666", 0x20000091}], 0x1) 16:17:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f000000d840)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 16:17:49 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)) 16:17:49 executing program 0: bpf$PROG_LOAD_XDP(0xf, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x20000494}}, 0x0) 16:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x14, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0x2, 0x0, 0x0, 0x0, @binary}]}, 0x14}], 0x1}, 0x0) 16:17:49 executing program 5: umount2(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) 16:17:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8093cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:49 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x3, 0x0, 0x0, 0x0, @ipv6=@loopback={0x3000000000000}}]}, 0x24}], 0x1}, 0x0) [ 1300.545726][T23929] loop1: detected capacity change from 0 to 131072 [ 1300.572991][T23929] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:49 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 16:17:49 executing program 3: add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='i', 0x1, 0xffffffffffffffff) 16:17:49 executing program 5: bpf$LINK_GET_NEXT_ID(0x18, 0x0, 0x0) [ 1300.600225][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1300.649773][T23952] loop1: detected capacity change from 0 to 131072 [ 1300.676224][T23957] trusted_key: encrypted_key: insufficient parameters specified [ 1300.679150][T23952] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:49 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0xfffffffd}, 0x8) 16:17:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x10, 0x1e, 0x1}, 0x10}], 0x1}, 0x0) 16:17:49 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_elf32(r0, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) 16:17:49 executing program 3: bpf$PROG_LOAD_XDP(0x8, 0x0, 0x0) 16:17:49 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x6, 0x72, 0x3, 0x1f}, {0x6, 0x0, 0x1f}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) 16:17:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80a3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1300.729707][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:49 executing program 3: bpf$PROG_LOAD_XDP(0x11, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:49 executing program 0: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) [ 1300.774092][T23967] loop1: detected capacity change from 0 to 131072 [ 1300.787818][ T27] audit: type=1326 audit(1667233069.588:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=23964 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fce5ec8b5a9 code=0x0 16:17:49 executing program 4: bpf$LINK_GET_NEXT_ID(0x16, 0x0, 0x0) 16:17:49 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x16, r0, &(0x7f0000000200)='logon\x00', 0x0, 0x0) [ 1300.827983][T23967] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:49 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 16:17:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x7f, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 16:17:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x1000000}, 0x0) 16:17:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000500)={0x0}, 0x7}, 0x0) 16:17:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80b3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:49 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x5, 0x6, 0x801}, 0x14}}, 0x0) [ 1301.006851][T23988] loop1: detected capacity change from 0 to 131072 [ 1301.035238][T23988] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:50 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x14, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:50 executing program 4: socket$inet(0x2, 0xa, 0x68d4) 16:17:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, 0x0) 16:17:50 executing program 3: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x84342) 16:17:50 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 16:17:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80c3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:50 executing program 2: bpf$LINK_GET_NEXT_ID(0x11, 0x0, 0x0) 16:17:50 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, r0) 16:17:50 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="0b8ff4d1d0cf1b6a0415820ac237c56c7e0a2c91114941ccdab2723682fbe402d78b7c821cc519d568e84670cd65a54336f758bfd8d993d7d543755231560c1a740352d821eb2cb7c300176d48851f5666", 0x7ffff000}], 0x1) 16:17:50 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001800)='./cgroup.net/syz1\x00', 0x200002, 0x0) 16:17:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x3, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x1}, 0x0) 16:17:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000003700)={0x10}, 0x10}, {&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x2, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x2}, 0x0) [ 1301.642150][T24003] loop1: detected capacity change from 0 to 131072 [ 1301.656699][T24003] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80d3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:50 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x1d, r0, 0x0, &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:50 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$search(0x7, r0, 0x0, 0x0, 0x0) 16:17:50 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xb, r0, 0x0, 0x0, 0x0) 16:17:50 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, r0) add_key$fscrypt_v1(&(0x7f0000000280), 0x0, 0x0, 0x0, r0) 16:17:50 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, r1, &(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x2}, r2) 16:17:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x18, 0x140c, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 16:17:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x18, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0x5, 0x0, 0x0, 0x0, @binary='\r'}]}, 0x18}], 0x1}, 0x0) 16:17:50 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x4, r0, &(0x7f0000000200)='logon\x00', 0x0, 0x0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="14", 0x1, r0) [ 1301.780492][T24025] loop1: detected capacity change from 0 to 131072 16:17:50 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r0, 0x0, 0x0) 16:17:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000a2c05b"], 0x14}}, 0x0) 16:17:50 executing program 4: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@ng, 0x2, 0x0) [ 1301.857348][T24025] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1301.869468][T24037] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 16:17:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80e3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:50 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:50 executing program 0: bpf$LINK_GET_NEXT_ID(0xd, 0x0, 0x0) 16:17:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 16:17:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x104, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 16:17:50 executing program 0: ptrace(0xffffffffffffffff, 0xffffffffffffffff) socket(0x3, 0xa, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) syz_clone3(&(0x7f0000000ac0)={0x0, &(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0), {}, &(0x7f0000000900)=""/142, 0x8e, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff], 0x1}, 0x58) syz_clone3(0x0, 0x0) syz_clone(0x100000, &(0x7f0000001640)="4b6c4acc1afc1e4928516c83320ace7a2934413d4547266e584eac9ea8076849338e5fe5c408519d54a1ae67d3ed8fc89c6963a4b402f13fdfb3a6e8bc03937714e8af945e677699f865562953429a1e7d33e3", 0x53, &(0x7f0000001700), &(0x7f0000001740), 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001800)='./cgroup.net/syz1\x00', 0x200002, 0x0) getpgid(0x0) 16:17:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x5, 0x0, 0x0, 0xfffffffb}, 0x48) 16:17:50 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x2000, 0x1) 16:17:50 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x6, &(0x7f00000024c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x50}], &(0x7f0000002540)='syzkaller\x00', 0x9, 0x12, &(0x7f0000002580)=""/18, 0x41000, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000002600)={0x0, 0x7, 0x4, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:17:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x80) 16:17:50 executing program 2: open(&(0x7f0000001a40)='./file0\x00', 0x111240, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) [ 1301.980710][T24053] loop1: detected capacity change from 0 to 131072 [ 1302.014065][T24053] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x15, 0x8, 0xfff}, 0x48) 16:17:50 executing program 0: unshare(0x1c068c00) 16:17:50 executing program 5: bpf$PROG_LOAD_XDP(0x13, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:50 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8103cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0xa, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:50 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0xffffffffffffffff, 0x0) 16:17:50 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000001580)='asymmetric\x00', &(0x7f00000015c0)={'syz', 0x0}, 0x0) 16:17:51 executing program 5: r0 = socket(0x2, 0x3, 0xdb) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={0x0}}, 0x0) 16:17:51 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x9, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1302.133446][ T27] audit: type=1800 audit(1667233070.928:1260): pid=24044 uid=0 auid=4294967295 ses=4294967295 subj=_ op=set_data cause=unavailable-hash-algorithm comm="syz-executor.4" name="/root/syzkaller-testdir442240506/syzkaller.GyyQ3L/2357/file0" dev="sda1" ino=1185 res=0 errno=0 [ 1302.176390][T24080] loop1: detected capacity change from 0 to 131072 16:17:51 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg$unix(r0, 0x0, 0x0) 16:17:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x800454cf, 0x0) 16:17:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f00000002c0)='./file0/file0\x00', 0x241, 0x0) 16:17:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname(r0, 0x0, 0x0) 16:17:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x1}, 0x0) 16:17:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname(r0, 0x0, &(0x7f0000000080)) [ 1302.208412][T24080] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8113cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0xc01047d0, 0x0) 16:17:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={0x0, 0x5c}}, 0x0) 16:17:51 executing program 5: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x8}, &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={[0x6]}, 0x8}) 16:17:51 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x1d, r0, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:51 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 16:17:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x15, 0x8, 0xfff, 0x0, 0x120}, 0x48) [ 1302.313387][T24103] loop1: detected capacity change from 0 to 131072 16:17:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 16:17:51 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x400454d9, 0x0) 16:17:51 executing program 0: sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, 0x0, 0x940928d69b9945f4) [ 1302.357023][T24103] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:51 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, 0x0) 16:17:51 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x6, r0, 0x0, 0x0, 0x0) 16:17:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8123cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) 16:17:51 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x4000)=nil, 0x930, 0x0, 0x10, r0, 0x0) 16:17:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000002640)={0x0, 0x0, 0x0}, 0x0) 16:17:51 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) read$FUSE(r0, 0x0, 0x0) [ 1302.453126][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 16:17:51 executing program 0: bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x10) 16:17:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x10}, 0x10}], 0x2400}, 0x0) 16:17:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x0, 0x3, &(0x7f0000000100)=@framed={{}, [@btf_id, @initr0, @exit, @map_fd]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb6) [ 1302.504853][T24134] loop1: detected capacity change from 0 to 131072 16:17:51 executing program 3: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) syz_clone3(0x0, 0x0) r0 = getpgid(0x0) syz_clone3(0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001800)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = getpgid(r0) pidfd_open(r1, 0x0) 16:17:51 executing program 0: bpf$PROG_LOAD_XDP(0x1b, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:51 executing program 5: syz_open_dev$vcsu(&(0x7f00000000c0), 0x278a, 0x105040) 16:17:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8183cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x10, 0x1c, 0x1}, 0x10}], 0x1}, 0x0) 16:17:51 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0xf6ffffff, 0x0) [ 1302.557304][T24134] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:51 executing program 2: add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0) 16:17:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)="a4", 0x1}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') read$FUSE(r1, &(0x7f0000000540)={0x2020}, 0x2020) 16:17:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x1}, 0x48) 16:17:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0), r0) 16:17:51 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) pipe(0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "a76794ef6eae9e6a4b850b5d76117f2ec55b1a262728dcae5eb4527ee4b7f06b122ccc0c6c62062dc657a7204538926d75c1cbcbab6a17b60f24fb19a7026726", 0x30}, 0x48, r0) keyctl$search(0x3, r1, 0x0, 0x0, r0) [ 1302.650323][T24155] loop1: detected capacity change from 0 to 131072 16:17:51 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/cpuinfo\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 16:17:51 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000540)='/sys/block/loop0', 0x4000, 0x0) 16:17:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0xf00}, 0x0) 16:17:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="d41100000d0a01"], 0x11d4}}, 0x0) [ 1302.706255][T24155] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8213cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:51 executing program 4: request_key(&(0x7f0000000640)='logon\x00', &(0x7f0000000680)={'syz', 0x1}, &(0x7f00000006c0)=',*%+):!%-(!),@\x00', 0x0) 16:17:51 executing program 2: r0 = creat(&(0x7f00000044c0)='./file0\x00', 0x0) execveat(r0, &(0x7f0000004500)='./file0\x00', 0x0, 0x0, 0x1000) 16:17:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x18, 0x14, 0x1, 0x0, 0x0, "", [@typed={0x5, 0x0, 0x0, 0x0, @binary='\r'}]}, 0x18}], 0x1}, 0x0) 16:17:51 executing program 5: add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) 16:17:51 executing program 4: bpf$PROG_LOAD_XDP(0x18, 0x0, 0x0) 16:17:51 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0, &(0x7f0000000080)) 16:17:51 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x242) write$FUSE_ATTR(r0, &(0x7f0000002100)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x3, 0x100000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0x0, 0x5, 0x1}}}, 0x78) [ 1302.794683][T24180] netlink: 4544 bytes leftover after parsing attributes in process `syz-executor.0'. 16:17:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 16:17:51 executing program 4: bpf$LINK_GET_NEXT_ID(0xe, 0x0, 0x0) 16:17:51 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 16:17:51 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000002700), 0x10) [ 1302.861776][T24192] loop1: detected capacity change from 0 to 131072 [ 1302.890794][T24192] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8253cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, 0x0) 16:17:51 executing program 2: keyctl$search(0x1d, 0x0, 0x0, 0x0, 0x0) 16:17:51 executing program 4: sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, 0x0, 0x0) 16:17:51 executing program 5: bpf$PROG_LOAD_XDP(0x10, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[], 0x14}}, 0x0) 16:17:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 16:17:51 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) 16:17:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000002640)={&(0x7f0000002580)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002600)={0x0}}, 0x0) 16:17:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0xd00}, 0x14}}, 0x0) 16:17:51 executing program 0: syz_genetlink_get_family_id$batadv(&(0x7f0000000600), 0xffffffffffffffff) 16:17:51 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xe, r0, 0x0, 0x0, 0x0) [ 1303.025346][T24219] loop1: detected capacity change from 0 to 131072 [ 1303.068327][T24219] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:51 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8263cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:51 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:51 executing program 2: get_robust_list(0x0, 0x0, &(0x7f0000000c40)) 16:17:51 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x800000}, 0xc) getpeername$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 16:17:51 executing program 3: bpf$LINK_GET_NEXT_ID(0xb, 0x0, 0x0) 16:17:51 executing program 0: bpf$PROG_LOAD_XDP(0x17, 0x0, 0x0) 16:17:51 executing program 2: add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000001500)='logon\x00', r0) 16:17:51 executing program 5: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000000)={'syz', 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) 16:17:52 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB="fe"], 0x14}}, 0x0) 16:17:52 executing program 0: bpf$PROG_LOAD_XDP(0x15, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:52 executing program 4: mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x0, 0x30, 0xffffffffffffffff, 0x0) [ 1303.180383][T29226] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:52 executing program 5: bpf$PROG_LOAD_XDP(0x9, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1303.260605][T24250] loop1: detected capacity change from 0 to 131072 [ 1303.292133][T24250] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8343cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='wchan\x00') read$FUSE(r0, 0x0, 0x0) 16:17:52 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) 16:17:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 16:17:52 executing program 4: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x1d, r0, &(0x7f0000000200)='logon\x00', 0x0, 0x0) 16:17:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f000000d840)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 16:17:52 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 16:17:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x8be0c8e2873023ed, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, 0x0) 16:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) [ 1303.358557][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:52 executing program 5: unshare(0x24070400) 16:17:52 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getpeername$netlink(r0, 0x0, 0x0) 16:17:52 executing program 2: bpf$LINK_GET_NEXT_ID(0xc, 0x0, 0x0) [ 1303.469228][T24275] loop1: detected capacity change from 0 to 131072 [ 1303.544219][T24275] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f83d3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:52 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x44102, 0x0) 16:17:52 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f00000020c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) 16:17:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002d00)={0x0, &(0x7f0000002c00)=""/225, 0x0, 0xe1}, 0x20) 16:17:52 executing program 0: newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f00000024c0), 0x0) 16:17:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 16:17:52 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0xc}, 0x10) 16:17:52 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 16:17:52 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x300, 0x0) mmap$KVM_VCPU(&(0x7f0000ffb000/0x3000)=nil, 0x930, 0x0, 0x40010, r0, 0x0) 16:17:52 executing program 0: sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) [ 1303.610525][T28675] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5d) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 16:17:52 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x278a, 0x0) read$FUSE(r0, &(0x7f00000004c0)={0x2020}, 0x2020) [ 1303.701854][T24296] loop1: detected capacity change from 0 to 131072 [ 1303.750434][T24296] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f83e3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:52 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r2, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 16:17:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005280)=ANY=[@ANYBLOB="0c1600001a0001"], 0x160c}], 0x1}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) 16:17:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x3, 0x8, 0x200}, 0x48) 16:17:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000180)) 16:17:52 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x278a, 0x0) read$FUSE(r0, 0x0, 0x0) 16:17:52 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x3ff, 0x3a3, 0x3f, 0x5}}}, 0x60) 16:17:52 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x242) write$FUSE_ATTR(r0, 0x0, 0x0) 16:17:52 executing program 3: bpf$LINK_GET_NEXT_ID(0x13, 0x0, 0x0) 16:17:52 executing program 0: bpf$LINK_GET_NEXT_ID(0x12, 0x0, 0x0) 16:17:52 executing program 5: bpf$PROG_LOAD_XDP(0xa, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) [ 1303.917330][T24328] loop1: detected capacity change from 0 to 131072 [ 1303.955282][T24328] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:52 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8413cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:52 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="0b8ff4d1d0cf1b6a0415820ac237c56c7e0a2c91114941ccdab2723682fbe402d78b7c821cc519d568e84670cd65a54336f758bfd8d993d7d543755231560c1a740352d821eb2cb7c300176d48851f5666", 0x51}], 0xc) 16:17:52 executing program 5: syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000600), 0xffffffffffffffff) 16:17:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x30c921f58c906813, 0x0) 16:17:52 executing program 3: keyctl$search(0x16, 0x0, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) 16:17:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0xe}, 0x0) 16:17:52 executing program 3: open(&(0x7f0000000080)='./file0\x00', 0x10440, 0x0) 16:17:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) 16:17:52 executing program 5: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000180)='encrypted\x00', &(0x7f0000000240)={'syz', 0x2}, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r1, &(0x7f0000000200)='logon\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0) 16:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 16:17:52 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x2, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1304.067484][T24342] loop1: detected capacity change from 0 to 131072 [ 1304.140628][T24342] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:53 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x242) write$FUSE_ATTR(r0, &(0x7f0000002100)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}}, 0x78) 16:17:53 executing program 3: getitimer(0x3, &(0x7f0000000080)) 16:17:53 executing program 4: bpf$PROG_LOAD_XDP(0x19, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:53 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0xf}, 0x14}}, 0x0) 16:17:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8483cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0xe}, 0x0) 16:17:53 executing program 3: bpf$PROG_LOAD_XDP(0x21, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:53 executing program 5: open(0x0, 0x20000, 0x0) 16:17:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}, 0x1, 0x0, 0x2}, 0x0) 16:17:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)="a4", 0x1}], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp\x00') read$FUSE(r1, 0x0, 0x0) 16:17:53 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x10, r0, 0x0, 0x0, 0x0) 16:17:53 executing program 5: syz_clone(0x6c018100, 0x0, 0x0, 0x0, 0x0, 0x0) 16:17:53 executing program 2: bpf$PROG_LOAD_XDP(0x23, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:53 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getpeername$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 16:17:53 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/ipip', 0x472481, 0x0) 16:17:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000003700)={0x10, 0x42, 0x1}, 0x10}, {&(0x7f0000005040)={0x24, 0x1a, 0x1, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x2}, 0x0) [ 1304.300462][T24374] loop1: detected capacity change from 0 to 131072 [ 1304.336770][T24374] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f84c3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:53 executing program 5: bpf$PROG_LOAD_XDP(0x15, 0x0, 0x0) 16:17:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x35, 0x4, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x40, 0x0, 0x0, @local, @private, {[@generic={0x0, 0x5, '0#<'}, @cipso={0x86, 0x6}, @generic={0x0, 0xd, "fe62549e5e02e2f797811d"}, @ra={0x94, 0x4}, @cipso={0x86, 0x48, 0x0, [{0x0, 0x4, "0f4b"}, {0x0, 0xd, "ef765a9a0ec895ca79cf88"}, {0x0, 0x9, "98ebc910e772a9"}, {0x0, 0xa, "37c6c468364e689c"}, {0x0, 0x3, "f1"}, {0x0, 0xb, "9234af742298d7f2a8"}, {0x0, 0x2}, {0x0, 0xe, "5bbf9f67294360c61169324c"}]}, @noop, @timestamp_prespec={0x44, 0x2c, 0x0, 0x3, 0x0, [{}, {@loopback}, {}, {@dev}, {@multicast2}]}, @timestamp={0x44, 0xc, 0x0, 0x0, 0x0, [0x0, 0x0]}, @rr={0x7, 0x7, 0x0, [@rand_addr]}, @cipso={0x86, 0x19, 0x0, [{0x0, 0xa, "28c8072919145734"}, {0x0, 0x9, "edacafb09d4832"}]}]}}}}}) 16:17:53 executing program 2: bpf$LINK_GET_NEXT_ID(0x14, 0x0, 0x0) 16:17:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001640)=ANY=[@ANYBLOB="0220"], 0x5c}}, 0x0) 16:17:53 executing program 4: add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 16:17:53 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x15, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:53 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper', 0x0, 0x0) 16:17:53 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) 16:17:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000000000)={0x18, 0x1c, 0x1, 0x0, 0x0, "", [@typed={0xa801, 0x0, 0x0, 0x0, @binary='\r'}]}, 0x18}], 0x1}, 0x0) 16:17:53 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x25) 16:17:53 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60}, 0x60) [ 1304.490817][T24405] loop1: detected capacity change from 0 to 131072 [ 1304.513642][T24409] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1304.530348][T24405] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f85c3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:53 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x6, 0xf4240, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x12, &(0x7f0000002580)=""/18, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000025c0), 0x8, 0x10, &(0x7f0000002600), 0x10, 0x0, 0x0, 0x0, &(0x7f0000002640)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 16:17:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x2) 16:17:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x28, 0x5, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 16:17:53 executing program 4: bpf$PROG_LOAD_XDP(0x4, &(0x7f0000002680)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:53 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002680)={0x1c, 0x2, &(0x7f00000024c0)=@raw=[@initr0], &(0x7f0000002540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1304.571262][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0, 0xf0ff7f00000000}, 0x1, 0x0, 0x1000000}, 0x0) 16:17:53 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x40002, 0x0) write$nbd(r0, 0x0, 0x0) 16:17:53 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) connect$netlink(r0, &(0x7f0000000080)=@proc={0x10, 0x0, 0x0, 0x800000}, 0xc) getpeername$netlink(r0, 0x0, &(0x7f0000000100)) 16:17:53 executing program 5: r0 = socket(0x18, 0x3, 0x0) fcntl$getown(r0, 0x5) 16:17:53 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') 16:17:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0x0) [ 1304.661157][T24425] loop1: detected capacity change from 0 to 131072 [ 1304.719253][T24425] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8603cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1304.847238][T24441] loop1: detected capacity change from 0 to 131072 [ 1304.860577][T24441] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:53 executing program 0: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 16:17:53 executing program 2: setitimer(0x0, &(0x7f0000000240), &(0x7f0000000280)) 16:17:53 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 16:17:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 16:17:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) getdents(r0, 0x0, 0x0) 16:17:53 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8633cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:53 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f00000002c0)=[@rights], 0x10}, 0x0) 16:17:53 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x1}, 0x8) 16:17:53 executing program 3: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x70, 0x800) msgrcv(r0, &(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES64=r0, @ANYRES64=r0, @ANYRESOCT=r0], 0x1a, 0x1, 0x3000) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 16:17:53 executing program 5: msync(&(0x7f0000ffc000/0x4000)=nil, 0x40c6, 0x6) [ 1305.058861][T24450] loop1: detected capacity change from 0 to 131072 16:17:53 executing program 4: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffe}, {0x0, 0xfffffffffffffffe}}, 0x0) 16:17:53 executing program 2: syz_emit_ethernet(0x1fbf, &(0x7f00000000c0)={@remote, @random="fa816ea2293f", @val, {@ipv6}}, 0x0) 16:17:53 executing program 0: syz_emit_ethernet(0x52, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60f954e6001c2b00fe8000000000000000000000000000aafe80"], 0x0) 16:17:53 executing program 5: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x5) 16:17:53 executing program 2: socket(0x18, 0x3, 0x2) 16:17:53 executing program 4: socketpair(0x0, 0x0, 0x81, 0x0) [ 1305.140633][T24450] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:54 executing program 5: getgroups(0x1, &(0x7f0000000940)=[0x0]) 16:17:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8663cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:54 executing program 4: open$dir(&(0x7f0000000040)='\x00', 0x0, 0x0) 16:17:54 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(r0, 0x40087468, &(0x7f0000000040)) [ 1305.296539][T24483] loop1: detected capacity change from 0 to 131072 [ 1305.305950][T24483] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:54 executing program 3: open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) geteuid() mkdir(&(0x7f0000000c00)='./file1\x00', 0x0) 16:17:54 executing program 2: setitimer(0x0, &(0x7f00000001c0)={{0x0, 0xffffffff}}, 0x0) 16:17:54 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, 0x0) 16:17:54 executing program 4: symlink(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)='./file0\x00') 16:17:54 executing program 0: setitimer(0x0, 0x0, &(0x7f0000000280)) 16:17:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8673cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:54 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff}) connect(r0, 0x0, 0x0) 16:17:54 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000000), 0x4) 16:17:54 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) getdents(r0, 0x0, 0x0) 16:17:54 executing program 4: setitimer(0x0, &(0x7f0000000240)={{}, {0xfffffffffffffffa}}, 0x0) [ 1305.988694][T24491] loop1: detected capacity change from 0 to 131072 16:17:54 executing program 5: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:17:54 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={{}, {0x0, 0xfffffffffffffffe}}, 0x0) [ 1306.027426][T24491] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:54 executing program 5: setitimer(0x0, &(0x7f0000000240), 0x0) 16:17:54 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff}) bind(r0, 0x0, 0x0) 16:17:54 executing program 0: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 16:17:54 executing program 3: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 16:17:54 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8683cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:54 executing program 2: socket$inet(0x2, 0x3, 0x3f) 16:17:54 executing program 5: mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6) 16:17:54 executing program 0: symlink(&(0x7f0000000180)='\x00', &(0x7f0000000080)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x20181, 0x0) 16:17:54 executing program 4: open$dir(&(0x7f0000000300)='./file0\x00', 0x200, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 16:17:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000180)="4a6805de308092030e8c2d739a41663c79609352c1276293732fd27a460dc03b1f5245de87451ef31f723196e832ebddd1bccd9e3a8a96a159108f537824ea", 0x3f}, {&(0x7f00000001c0)="426e6f95ab2c44ebfb116436969a363e1f5e7dc30e6eec44f9f245b18e43e9391811d63286f1345c5b7a31fec3b4363c3f9ddd17bfa8ba79c219b15c8ff9b41955a9edc97573a3a870", 0x49}, {0x0}, {0x0}, {&(0x7f0000000340)="442a4b8ec4051f9197dd6d53c800696631a8ed71000a4b6dd77136f218b81a269ed7c9ea186e1f2a1f07839d604b6bcf0c02c8e05249436d4a2245e3174e2248670cbe6fa432b4e67a1dd1257867289489abedca628b7be5ef51316ab2632a5c47dfb666467e9befd1d439d4d087663e7a9e5a94f7d83b637a61d5c6e1f479b2e1cc2f902431428a401a449a68af7d9a5d9fb46b5d53ffdb06cd62c0b2253229ab128b3a751b665ce5f532440125349d36c66e001fe31bb2c8a231d5ec886f16eb59b68cd4557d11a62032a960ef14b2673d14bffcbbf53abd08f80c4df3dca638d3f4857fa6c5592c", 0xe9}], 0x5}, 0x1) 16:17:55 executing program 5: open$dir(&(0x7f0000000240)='.\x00', 0x2, 0x0) 16:17:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x34, 0x5, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x34}}, 0x0) [ 1306.163266][T24521] loop1: detected capacity change from 0 to 131072 16:17:55 executing program 0: setrlimit(0x0, &(0x7f0000000080)={0x0, 0xfffffffffffeffff}) 16:17:55 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x2, 0x8) syz_extract_tcp_res(&(0x7f0000000040), 0x7f, 0x2) syz_emit_ethernet(0xca, &(0x7f0000000280)={@random="acb8a73d733d", @empty, @val, {@ipv4}}, 0x0) syz_emit_ethernet(0x78, &(0x7f0000001380)={@broadcast, @empty, @val, {@ipv6}}, 0x0) [ 1306.208296][T24521] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:55 executing program 2: setitimer(0x1, &(0x7f0000000040), &(0x7f0000000080)) 16:17:55 executing program 5: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 16:17:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f86a3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:55 executing program 3: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 16:17:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x41946465, 0x0) 16:17:55 executing program 4: pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 16:17:55 executing program 2: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') 16:17:55 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000700), &(0x7f0000000740)=0xc) 16:17:55 executing program 3: r0 = semget(0x2, 0x0, 0x0) semctl$GETALL(r0, 0x0, 0x6, &(0x7f0000000140)=""/127) 16:17:55 executing program 4: symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') open$dir(&(0x7f0000000240)='./file0\x00', 0xa08, 0x0) 16:17:55 executing program 2: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 16:17:55 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x0, 0xffffffff}}, 0x0) 16:17:55 executing program 5: socket(0x0, 0x265f6b3a48103c20, 0x0) 16:17:55 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) [ 1306.389866][T24555] loop1: detected capacity change from 0 to 131072 [ 1306.426183][T24555] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f86c3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, 0x0, 0x0) 16:17:55 executing program 0: open$dir(&(0x7f0000000240)='./file0\x00', 0xa08, 0x0) 16:17:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, &(0x7f0000000f80)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000000cc0), 0x10, 0x0) 16:17:55 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt(r0, 0x0, 0x0, &(0x7f0000000040)="037b781134e6d7196a0811b78b2c321de228ca5ae78be8506e7c3d5563a8f7d78cdc324047225a77ed23b164cc5a7420ff4b1439bf4abec87e4214004e3c01deeb9a11cc1ae7807259f630e20e577f95eb5083e298315297c930028dd216aea2632a73385630200a92e7cfa65e815c8bdf0ed876bf91580e7d5b37f1ea5d97b9b8c7abae96715850e78aae04c7b9daa58607f86c1e7918d28942bf87ff1300ae6e88d34e8992205e7191dc80ebc87378b32b5f1cd622a981e439b3ecb6c9ac0de73aa421ee119d3e2e2e8a620faf58edefa307cd0b35330759810ffbcc366c1be6", 0xe1) 16:17:55 executing program 5: open$dir(0x0, 0x50, 0x0) 16:17:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000140)="e800f876223f800001000000", 0xc) 16:17:55 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @random="bff2e7739b6b", @val, {@ipv6}}, 0x0) [ 1306.507823][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:55 executing program 3: pipe(&(0x7f0000000b00)) 16:17:55 executing program 5: accept$unix(0xffffffffffffff9c, &(0x7f0000000780)=@abs, 0x0) 16:17:55 executing program 0: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) [ 1306.594211][T24584] loop1: detected capacity change from 0 to 131072 16:17:55 executing program 2: getgroups(0x7, &(0x7f0000000980)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setregid(r0, 0x0) [ 1306.637374][T24584] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f86e3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'ip_vti0\x00', &(0x7f00000000c0)={'erspan0\x00', 0x0, 0x0, 0xf808, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @local}}}}) 16:17:55 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt(r0, 0x0, 0x0, &(0x7f0000000040)="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", 0x801) 16:17:55 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs, 0x8) 16:17:55 executing program 2: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0xf4240}}, 0x0) 16:17:55 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000040)=@in6={0x18, 0x2}, 0xc) 16:17:55 executing program 5: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}], 0x1, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) process_vm_writev(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)=""/23, 0x17}], 0x1, &(0x7f0000000740)=[{&(0x7f0000000500)=""/3, 0x3}], 0x1, 0x0) [ 1306.751533][T24599] loop1: detected capacity change from 0 to 131072 [ 1306.760343][T24599] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:55 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8901, &(0x7f0000000180)={'wg2\x00'}) 16:17:55 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 16:17:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8723cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:55 executing program 4: socket$unix(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f00000000c0)) 16:17:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x2, 0x11, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x17, 0x0, 0x80, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 16:17:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 16:17:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 1306.872607][T24622] loop1: detected capacity change from 0 to 131072 16:17:55 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:55 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1379, 0x1}, 0x48) 16:17:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback}}}}) 16:17:55 executing program 2: r0 = semget(0x2, 0x0, 0x0) semctl$GETNCNT(r0, 0x0, 0x3, 0x0) [ 1306.919960][T24622] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:55 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@generic={0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8743cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:55 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "bdc884af31b98be1b08d56dd3d55d07c9dfdb278817bbc31f46ade4b81a21409027d6bb246a2816502138b5300a2c84e7d83df1625c6d26b255db7b20dbf0fd2"}, 0x48, 0xffffffffffffffff) 16:17:55 executing program 2: syz_usb_connect$uac1(0x0, 0x7b, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x69, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @selector_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 16:17:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5421, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:17:55 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 16:17:55 executing program 3: syz_usb_connect$uac1(0x0, 0x96, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x84, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5, 0x24, 0x5, 0x0, 0xda}, @selector_unit={0xb, 0x24, 0x5, 0x2, 0x0, "196fcb3a061b"}, @input_terminal={0xc}, @output_terminal={0x9, 0x24, 0x3, 0x1}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x8, 0x5, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x80}}}}}}}]}}, 0x0) 16:17:55 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:55 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl=@proc, 0x80) 16:17:55 executing program 4: syz_open_dev$usbmon(&(0x7f0000000480), 0x0, 0xa8640) 16:17:55 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89b0, &(0x7f0000000180)={'wg2\x00'}) [ 1307.063001][T24644] loop1: detected capacity change from 0 to 131072 [ 1307.100170][T24644] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:55 executing program 0: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f00000009c0)='mand\x00', 0x0, 0x0) 16:17:55 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8753cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:55 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8990, &(0x7f0000000180)={'wg2\x00'}) 16:17:55 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8971, &(0x7f0000000180)={'wg2\x00'}) [ 1307.196879][T24669] loop1: detected capacity change from 0 to 131072 [ 1307.243159][T24669] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1307.288930][T28675] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1307.335070][ T4341] usb 3-1: new high-speed USB device number 45 using dummy_hcd [ 1307.395053][T12838] usb 4-1: new high-speed USB device number 50 using dummy_hcd [ 1307.575056][ T4341] usb 3-1: Using ep0 maxpacket: 32 [ 1307.635199][T12838] usb 4-1: Using ep0 maxpacket: 32 [ 1307.715871][ T4341] usb 3-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 1307.724991][ T4341] usb 3-1: config 1 has no interface number 1 [ 1307.731506][ T4341] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1307.742089][ T4341] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1307.755197][ T4341] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1307.755244][T12838] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1307.766206][ T4341] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1307.777125][T12838] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1307.799253][T12838] usb 4-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1307.810160][T12838] usb 4-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1307.955141][ T4341] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1307.964308][ T4341] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1307.972765][ T4341] usb 3-1: Product: syz [ 1307.977219][ T4341] usb 3-1: Manufacturer: syz [ 1307.981953][ T4341] usb 3-1: SerialNumber: syz [ 1307.995373][T12838] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1308.004491][T12838] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1308.012583][T12838] usb 4-1: Product: syz [ 1308.016880][T12838] usb 4-1: Manufacturer: syz [ 1308.021530][T12838] usb 4-1: SerialNumber: syz [ 1308.045350][T24658] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 1308.330955][ T4341] usb 3-1: USB disconnect, device number 45 [ 1308.431949][T12838] usb 4-1: USB disconnect, device number 50 [ 1308.459261][T29226] udevd[29226]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card4/controlC4/../uevent} for writing: No such file or directory 16:17:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 16:17:57 executing program 5: r0 = fsopen(&(0x7f00000000c0)='9p\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0x0, 0x0, 0x0) 16:17:57 executing program 3: syz_usb_connect(0x0, 0x2d, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x59, 0x9e, 0xee, 0x10, 0x582, 0x47, 0x1b86, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x36, 0x86, 0xab, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x10}}]}}]}}]}}, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) 16:17:57 executing program 0: pselect6(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x6}, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 16:17:57 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8763cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:57 executing program 5: r0 = epoll_create(0x81) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 16:17:57 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:57 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'wg2\x00', 0x80000000}) 16:17:57 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', 0x0, 0xfffffffffffffffa) 16:17:57 executing program 4: prctl$PR_MCE_KILL(0x3, 0x0, 0x0) 16:17:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)) 16:17:57 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8773cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1308.786261][T24684] loop1: detected capacity change from 0 to 131072 [ 1308.807621][T24684] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1308.823282][T24689] wg2: mtu less than device minimum 16:17:57 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x62}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:57 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000001740)={0x20071026}, &(0x7f0000001780)) process_vm_readv(r0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}], 0x1, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) [ 1308.902344][T24700] loop1: detected capacity change from 0 to 131072 [ 1308.924871][T24700] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1308.996067][T29226] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1309.135061][T12838] usb 4-1: new high-speed USB device number 51 using dummy_hcd [ 1309.376489][T12838] usb 4-1: Using ep0 maxpacket: 16 [ 1309.515666][T12838] usb 4-1: config 0 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1309.725331][T12838] usb 4-1: New USB device found, idVendor=0582, idProduct=0047, bcdDevice=1b.86 [ 1309.734500][T12838] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1309.742917][T12838] usb 4-1: Product: syz [ 1309.747523][T12838] usb 4-1: Manufacturer: syz [ 1309.752143][T12838] usb 4-1: SerialNumber: syz [ 1309.758944][T12838] usb 4-1: config 0 descriptor?? [ 1310.090979][T12838] usb 4-1: USB disconnect, device number 51 [ 1310.124354][T28675] udevd[28675]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/sound/card3/controlC3/../uevent} for writing: No such file or directory 16:17:59 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@tcp={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x2b0) 16:17:59 executing program 0: syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x600400) 16:17:59 executing program 2: request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0) 16:17:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f87a3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:59 executing program 4: socketpair(0x1d, 0x0, 0x400, &(0x7f0000000000)) 16:17:59 executing program 5: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, 0x0, 0x0, 0xffffffffffffffff) 16:17:59 executing program 0: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000540)='b\xfff\xe8yt\x02K\xec2\xea|O\t\xd0`\xc8\xa7\xaf8u\x7fb\xf3\x86\x15\xdbex\xf9P\x11ItV\xe5\xa7yLi2\xaa\xa5\xd2\x1d\xcd\xcfuy\x9e\x9a\x14P)ae\xa9\xe3b\xac\xd5\xb4#\x9f\xec`=\x82\xa2N\x11.+V\xfd\xef\xf2xc\x02\xb6\x04V\xbf\x81\xa8\xe4}\x01\x01\x11Q_ \x99\xc8\xdc\xabn\xfc+\x0f\xf6\xb2\x1f7\xc6\xc6K\xe1\xc9\xa9>\x7f\xda\xf7M\x01\xfc\xed\xa8\b|\xf6\"\x12B \x16@\xe3\x95KK\xc67;\xb89\xc9<\xc7\x16p@k6I\xfd\xcdDdeh&\xfd\xdd~r6 \x0f\x9cT\"\x12\x90z\xa34?G7\x13\xfa:A\x10\t\xd3\xd0\x19\xd7ay\xa0\xec\xcb\xf2\x1b\xcb\x04\x81\xa5\xbe?\xe8VWv\x14\xc7A\\\xa7\xad\x8f\xc3\xe1x\xf7E\xfb\xb2\xd5fO?\xe8\x87f[\x83i\xed\xb5\x0e+\x8c\xee\xe0\x98\x01w\x82\x881\xcblaf(\xfc*\xe7\\3\x1c\xc5\x96)\x96^\xf2\xfd\xa3\xe8\x9d\x058 \xe9T\x9e\xd6Pw\x16e\x96\xce\xb0\x18\xc8\xacA+\xe6\xa9u/\xb9\x83\xb4\xc1\x9c\xcc\xea\x85C\xfaA\x1f\xe8\x00d\xe3\x06\x94\x8eO\x14\xae\xe6\x0f&\xe9\\\xc9l\xd4we\xde\x82\xbd\x13NA\x7f\x9au\x87(\xe5[\x98\x92\xd1$\xdf\xae>~\xa6Yx\xe6yj\xaaw\a\x87\x83\x94\xc3<\x87h\x17\xe3o(\xc8\xf8V\xf2\x9d\x04\x13N6\x11p\x8e\xf9V\xbf\x90\xa1`j\n\xbc\xe1i\xe0![F\x0eW\xe5\xc0E\xef3\x9b\xe0\x14o\xe8#\x06\x00\x00\x00ge\xf8^\x90e\x19\xdd\x1aClL\xa0\xfb\xdd\xc8\xf1Dp\xd8\x8f],:42\xdf\xdf\x18\x00b!q\x9c8\xf2\x05\xd4\x81pQw\xf1j\xa5\xfa\x1c\x974\xad@\t\'S\xd1\x1e\xf6\x87B\xe3\a\xa1\x164\xae \xda\xda*H\x16\x1aG\xb0l\xcef\x8a^\x06\xa15\x18h\xff\xf8\xbf5\xc5\xb9\x16\xcf\xa0\x89_\xd9\xec\xb3X\x91\x14\x16s\xd6\x8b|\x92\xfd\x89\xf8-`6\xe0;\xae\xa4`\xeb\x03K\xac:\x98*3z\xb0Q1\x88^8\x17\x88 j\xc3i\xdeA\x84t\x17\xa4\x00\x01CZ\x04\xc9\xe1l\xe9\xf1\xf2\xbe\xa8\xf48\xe4\xabi\x8e\x9d\v\x98\x1d?1\xf5Y\xd00\xc1\x13\x9e3\xd5i\x14\xd0\x17\x1eE\xeex\x05\xe0$)\x8f\x19\xa7\xbb\xda\xc0\x8d\xfbI\xdb*\xa6\xd1\xd3Q\xaaLW\xa5C\xdb\x9cJ&\xad\x161x^\x87\xa6\t2\x95j\xed\x82\xb4\x83\xb4\xf6\x18\n\x02MC\xa9\xa94\x8d\x9e\xcct;\x87\x1d6\xe2\xaf\n\xa2c\xbd\xb3h\f6u\x02\xb8\v O\xc7\xca\x8f\xde\x19\t\x9d2^\xd9\xe4y\xd7@q\x1f\xde\xe52l\xf4\x93\xac;\xe8\xf2\xca\xa4\xd8=\xd4D\x9e\xd6T\xe8@\xc8Oo~Og\xfb\xcd\xd4\x98P \xed\xabx\xf0\xbfW\x94/Uf*\xc7\xae%\xe8\xe8\xa7]\xd0\xa2#a\xb0\xdf\x91\xc0\xe4\xf8\x1e\xbfs>6\xef\x9c\xce,O\xd7\x0f\xc8I<\xdb\xbbz\x85\xefS\xb1\xc9$\x95I\xda1N\xcc\x9bL$\xbd [\xff\xe7\x11\xb7Y\x85\x88\x1ft\xbc=/Z\x93t\xa0vq\xbb\x8d\x9d\x06|z\xee\x1d\x7fB:i\b#>\xc2\xe9\xfct\x16\xcf\xc8\xf2B\x92o\xebx\r\x92\xcd\x8e\xfe$w\xcf\xab\x1cs\xdc=\xffh\xc5/\x15f\x7f\xf8h\x87\x17\x03\vP\xb0\xba\xa2t\xad\xfci\x00', &(0x7f00000008c0)='./file0\x00', 0xffffffffffffff9c) 16:17:59 executing program 4: pselect6(0x65, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 16:17:59 executing program 5: syz_open_dev$usbmon(&(0x7f0000000400), 0x0, 0x84003) 16:17:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8937, &(0x7f0000000180)={'wg2\x00'}) 16:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000200), 0x4) [ 1310.520562][T24712] loop1: detected capacity change from 0 to 131072 [ 1310.555406][T24712] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8913cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/schedstat\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000200)={@private2={0xfc, 0x2, '\x00', 0x1}, @local, 0xf, 0xe}}) sched_getattr(0xffffffffffffffff, &(0x7f0000000380)={0x38}, 0x38, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@bridge_getvlan={0x38, 0x72, 0x20, 0x70bd27, 0x25dfdbff, {}, [@BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8}, @BRIDGE_VLANDB_DUMP_FLAGS={0x8, 0x1, 0x1}]}, 0x38}}, 0x48040) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="65726c83616e30110000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000004500001400000000000090787f000001ac1e0001da3300714e4cf471619872e38b4f40d07b3bfd474646551d3a692aea18f8b927038f970dc0929e689a7738f2ce1936f913ac5ce0ba432264190b1239e8f8b8ed215c6ff416a0ba6d4430949b871bb5f21329835d8bd54b4c01989670bf8429d7503502f5e07f0a2f23b5d557e40754add4578dc4fe01e43e2b627a6b81366fd3bed6c4754b4521b34480cfe2ae9d150a62fae9d2e0aa98"]}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000000)={@local, @dev}, &(0x7f0000000040)=0xc) 16:17:59 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 3: socketpair(0xa, 0x2, 0xffffffff, &(0x7f0000000000)) 16:17:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5452, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1310.636442][T24733] loop1: detected capacity change from 0 to 131072 16:17:59 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f00000003c0)='t', 0x1, 0x0, &(0x7f0000000440)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80) 16:17:59 executing program 0: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0xd, 0x0, 0x0, 0x0) 16:17:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:17:59 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89a3, &(0x7f0000000180)={'wg2\x00'}) [ 1310.680305][T24733] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8943cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:59 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl, 0x80) 16:17:59 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x63}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_DUPLEX={0x5}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x34}}, 0x0) [ 1310.726586][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:17:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000d40)) 16:17:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 3: syz_open_dev$usbmon(&(0x7f0000000400), 0x5, 0x84003) 16:17:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:17:59 executing program 0: pselect6(0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740), &(0x7f00000007c0)={&(0x7f0000000780), 0x8}) [ 1310.801776][T24761] loop1: detected capacity change from 0 to 131072 16:17:59 executing program 4: capset(&(0x7f0000001740)={0x20071026}, &(0x7f0000001780)) 16:17:59 executing program 0: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='\'{{%]-$$@*!^&#]%\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c) 16:17:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xf4240, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1310.841846][T24761] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:59 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8c03cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:17:59 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x400842) 16:17:59 executing program 5: syz_usb_connect$uac1(0x0, 0x9d, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x8b, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x9, 0x24, 0x5, 0x0, 0x0, "0e52d427"}, @selector_unit={0x5}, @input_terminal={0xc}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x303}, @output_terminal={0x9}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000740)={0x0, 0x0, 0x8, &(0x7f0000000340)={0x5, 0xf, 0x8, 0x1, [@generic={0x3}]}, 0x3, [{0x2, &(0x7f0000000440)=@string={0x2}}, {0x2, &(0x7f0000000580)=@string={0x2}}, {0x4, &(0x7f0000000700)=@lang_id={0x4}}]}) 16:17:59 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x1e}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:17:59 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9205, 0x0) 16:17:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:17:59 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x600400) read$usbmon(r0, 0x0, 0x0) [ 1310.940263][T24786] loop1: detected capacity change from 0 to 131072 16:17:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:17:59 executing program 0: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0, r0+60000000}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 16:17:59 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8993, &(0x7f0000000180)={'wg2\x00'}) [ 1310.985040][T24786] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:17:59 executing program 4: syz_clone(0x28842200, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:00 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8946, &(0x7f0000000180)={'wg2\x00'}) 16:18:00 executing program 3: syz_open_dev$usbmon(&(0x7f00000002c0), 0xfffffffffffffffc, 0x200000) 16:18:00 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8c13cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:00 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x4) 16:18:00 executing program 4: r0 = socket(0x2, 0x3, 0x5) connect$802154_dgram(r0, &(0x7f0000002240)={0x24, @short}, 0x14) 16:18:00 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, 0x0, &(0x7f0000000200)={0x77359400}, 0x0) 16:18:00 executing program 2: syz_usb_connect$uac1(0x0, 0xa1, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x8f, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x9, 0x24, 0x5, 0x0, 0x0, "0e52d427"}, @selector_unit={0xb, 0x24, 0x5, 0x0, 0x0, "196fcb3a061b"}, @input_terminal={0xc}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x303}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 16:18:00 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) [ 1311.404569][T24807] loop1: detected capacity change from 0 to 131072 [ 1311.433305][T24807] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:00 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x20000, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1311.734985][T15805] usb 3-1: new high-speed USB device number 46 using dummy_hcd 16:18:00 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/partitions\x00', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000880)=""/41, 0x29) read$char_usb(r0, &(0x7f00000001c0)=""/29, 0x1d) 16:18:00 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8c63cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:00 executing program 4: pselect6(0x37, &(0x7f0000000000), &(0x7f0000000040)={0x3ff}, &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, &(0x7f0000000300)={&(0x7f0000000240), 0x8}) 16:18:00 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000000)='%\x00', &(0x7f0000000080)='\"', 0x1) 16:18:00 executing program 3: keyctl$reject(0x13, 0x0, 0x0, 0x8001, 0x0) 16:18:00 executing program 3: process_vm_readv(0x0, &(0x7f0000000540)=[{0x0}, {0x0}, {0xfffffffffffffffd}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 16:18:00 executing program 4: ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) 16:18:00 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8990, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1311.885457][T24827] loop1: detected capacity change from 0 to 131072 [ 1311.921190][T24827] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1311.985993][T15805] usb 3-1: Using ep0 maxpacket: 32 [ 1312.115072][T15805] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1312.125292][T15805] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1312.134387][T15805] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1312.145015][T15805] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1312.315209][T15805] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1312.324282][T15805] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1312.332376][T15805] usb 3-1: Product: syz [ 1312.336924][T15805] usb 3-1: Manufacturer: syz [ 1312.341543][T15805] usb 3-1: SerialNumber: syz [ 1312.675216][T15805] usb 3-1: 0:2 : does not exist [ 1312.688278][T15805] usb 3-1: USB disconnect, device number 46 [ 1312.700593][T28675] udevd[28675]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory 16:18:01 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x840082) 16:18:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}}}}) 16:18:01 executing program 4: r0 = epoll_create(0x101) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x2) 16:18:01 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8913, &(0x7f0000000180)={'wg2\x00'}) 16:18:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x5c, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}]}, 0x5c}}, 0x0) 16:18:01 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8ce3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:01 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x20000, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 16:18:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 16:18:01 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 16:18:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}) [ 1313.104823][T24850] loop1: detected capacity change from 0 to 131072 16:18:02 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x891e, &(0x7f0000000180)={'wg2\x00'}) 16:18:02 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8949, &(0x7f0000000180)={'wg2\x00'}) 16:18:02 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8940, &(0x7f0000000180)={'wg2\x00'}) [ 1313.151354][T24850] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:02 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000740)='ns/net\x00') syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 16:18:02 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8dc3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x53800000, 0xffc6) 16:18:02 executing program 5: socketpair(0xa, 0x1, 0x2, &(0x7f0000000200)) 16:18:02 executing program 3: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, &(0x7f0000000300)={&(0x7f00000002c0)={[0x1000]}, 0x8}) 16:18:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x20008091, 0x0, 0x0) 16:18:02 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89a1, &(0x7f0000000180)={'wg2\x00'}) 16:18:02 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x1000000, 0x0) 16:18:02 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) [ 1313.288655][T24880] loop1: detected capacity change from 0 to 131072 [ 1313.322522][T24880] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:02 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000280), 0x0) 16:18:02 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x1f8, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 16:18:02 executing program 4: socketpair(0x33, 0x0, 0x0, &(0x7f0000000100)) 16:18:02 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffb) 16:18:02 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8e03cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x0, 0x0, 0xb2, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 16:18:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x0) [ 1313.400789][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:02 executing program 0: syz_open_dev$usbmon(&(0x7f0000000200), 0x0, 0x90006) 16:18:02 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000180)={0x0}) clock_nanosleep(0x8, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {r0}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 16:18:02 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0xf}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:02 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8e83cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:02 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1313.445422][T24904] loop1: detected capacity change from 0 to 131072 [ 1313.458557][T24904] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:02 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8948, &(0x7f0000000180)={'wg2\x00'}) 16:18:02 executing program 2: add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 16:18:02 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89a2, &(0x7f0000000180)={'wg2\x00'}) 16:18:02 executing program 0: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, r0+60000000}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 16:18:02 executing program 2: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000040)=""/116, 0x74}, {0x0}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7bbd99e60a82d679b2f", 0x12, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="c8d4d0bcec27082330ec687c7cafbe8e501475b39ba82ce90c5340c76f0629930606e7fb520733d1961246d18b9708587a80a12fa7de336dbfaf46e31b037fa2242a437ac30755cee8a8d885f20d3384802be2e67a069ddfaff31638ff0a41b74895152bf2822d2e22512f52c660106400c0b73700923097c081684ceab986d2c0fbf443") ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) getpgid(r0) 16:18:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @dev, {[@cipso={0x86, 0x6}]}}}}}) [ 1313.535970][T24919] loop1: detected capacity change from 0 to 131072 [ 1313.571587][T24919] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:03 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:03 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:03 executing program 3: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, r0+60000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0xff]}, 0x8}) 16:18:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8ec3cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x16, 0x1, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) 16:18:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', 0x0}) 16:18:03 executing program 4: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}, 0xc}) 16:18:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891c, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:03 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x840082) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8937, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:03 executing program 5: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="c8d4d0bcec27082330ec687c7cafbe8e501475b39ba82ce90c5340c76f0629930606e7fb520733d1961246d18b9708587a80a12fa7de336dbfaf46e31b037fa2242a437ac30755cee8a8d885f20d3384802be2e67a069ddfaff31638ff0a41b74895152b") [ 1314.312414][T24942] loop1: detected capacity change from 0 to 131072 [ 1314.348582][T24942] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:03 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, 0x0, 0x0) 16:18:03 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x86) 16:18:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f80009d3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20000142}, [@generic={0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x5}, 0x48) 16:18:03 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xb, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1314.451064][T24964] loop1: detected capacity change from 0 to 131072 16:18:03 executing program 3: r0 = fsopen(&(0x7f0000000080)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='mand\x00', 0x0, 0x0) 16:18:03 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x5}], {0x95, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x0) 16:18:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd30cc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1314.504711][T24964] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x25dfdc01}, 0x80) [ 1314.598561][T24980] loop1: detected capacity change from 0 to 131072 [ 1314.645640][T24980] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={0x0}}, 0x0) 16:18:03 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8924, &(0x7f0000000180)={'wg2\x00'}) 16:18:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8918, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1314.696642][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:03 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14, 0x0, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:03 executing program 3: r0 = fsopen(&(0x7f0000000080)='incremental-fs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 16:18:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb09dfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:03 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@generic={0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:03 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x5451, 0x0) 16:18:03 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/schedstat\x00', 0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000380), 0x100000000000026f, 0x0, 0x0, 0x0) [ 1314.774379][T24998] loop1: detected capacity change from 0 to 131072 16:18:03 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'macvtap0\x00'}) 16:18:03 executing program 5: socketpair(0xa, 0x1, 0x0, &(0x7f0000000200)) 16:18:03 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x80108907, 0x0) [ 1314.859125][T24998] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:03 executing program 3: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000740)={0xa, &(0x7f0000000300)={0xa}, 0x0, 0x0, 0x3, [{0x2, &(0x7f0000000440)=@string={0x2}}, {0x4, &(0x7f0000000480)=@string={0x4, 0x3, "8360"}}, {0x0, 0x0}]}) 16:18:03 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x100000001) 16:18:03 executing program 5: syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x600400) syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) 16:18:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback, {[@lsrr={0x83, 0x3}]}}}}}) 16:18:03 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdf069aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1314.953798][T25011] macvtap0: mtu less than device minimum 16:18:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:03 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x891d, &(0x7f0000000180)={'wg2\x00'}) 16:18:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8924, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:03 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='bpf\x00', &(0x7f0000000080)='bpf\x00', 0x0) 16:18:03 executing program 4: syz_usb_connect$uac1(0x0, 0xa1, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x8f, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x7, 0x24, 0x5, 0x0, 0x0, "0e52"}, @selector_unit={0xb, 0x24, 0x5, 0x0, 0x0, "196fcb3a061b"}, @input_terminal={0xc}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x0, 0x0, 0x4}, @output_terminal={0x9, 0x24, 0x3, 0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 16:18:03 executing program 0: syz_clone(0x25022100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1315.066444][T25026] loop1: detected capacity change from 0 to 131072 16:18:03 executing program 2: clock_getres(0x7, &(0x7f0000000080)) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000040)) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001200000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900000000000000000006002001"], 0x44}}, 0x0) [ 1315.116509][T25026] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1315.160642][T25042] netlink: 'syz-executor.2': attribute type 288 has an invalid length. [ 1315.250837][ T4619] usb 4-1: new high-speed USB device number 52 using dummy_hcd [ 1315.415001][ T4351] usb 5-1: new high-speed USB device number 67 using dummy_hcd [ 1315.525098][ T4619] usb 4-1: Using ep0 maxpacket: 32 [ 1315.655013][ T4351] usb 5-1: Using ep0 maxpacket: 32 [ 1315.655279][ T4619] usb 4-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1315.670820][ T4619] usb 4-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1315.681046][ T4619] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1315.735530][ T4619] usb 4-1: language id specifier not provided by device, defaulting to English [ 1315.775144][ T4351] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1315.787989][ T4351] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1315.797414][ T4351] usb 5-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1315.810588][ T4351] usb 5-1: config 1 interface 0 altsetting 0 has an invalid endpoint descriptor of length 3, skipping [ 1315.823505][ T4351] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 1315.995134][ T4351] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1316.004412][ T4351] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1316.012832][ T4351] usb 5-1: Product: syz [ 1316.017344][ T4351] usb 5-1: Manufacturer: syz [ 1316.022107][ T4351] usb 5-1: SerialNumber: syz [ 1316.115164][ T4619] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1316.124850][ T4619] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1316.133200][ T4619] usb 4-1: Manufacturer: 悃 [ 1316.138068][ T4619] usb 4-1: SerialNumber: syz [ 1316.345287][ T4351] usb 5-1: 0:2 : does not exist [ 1316.354613][ T4351] usb 5-1: USB disconnect, device number 67 [ 1316.465332][ T4619] usb 4-1: 0:2 : does not exist [ 1316.475420][ T4619] usb 4-1: USB disconnect, device number 52 16:18:05 executing program 3: syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x10040) 16:18:05 executing program 0: bpf$PROG_LOAD_XDP(0xf, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x16, 0x0, 0x0) 16:18:05 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdf0c9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:05 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 16:18:05 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 16:18:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x6) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace(0x4207, r0) 16:18:05 executing program 3: fspick(0xffffffffffffffff, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) 16:18:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000180)=ANY=[@ANYRESOCT], &(0x7f0000000080)='GPL\x00', 0x6, 0x8a, &(0x7f00000000c0)=""/138, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x30}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:05 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) sendmsg(r0, &(0x7f0000000340)={&(0x7f00000001c0)=@un=@abs, 0x80, 0x0}, 0x0) [ 1316.913680][T25049] loop1: detected capacity change from 0 to 131072 16:18:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}, [@generic={0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:05 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8994, &(0x7f0000000180)={'wg2\x00'}) 16:18:05 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:05 executing program 5: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000080)={0x0, "df587e44add9fa303de7a6a9f6c017b1bfb2067e3b7d692aea3f93bb15c8b167d286a96aed20f6c9ebf98c7cd252f3064592d0600383f1c8c86033ecb63c127a"}, 0x48, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/button', 0x0, 0x0) [ 1316.960295][T25049] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:05 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc10ca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, 0x0, 0x0) 16:18:05 executing program 2: prctl$PR_MCE_KILL(0x7, 0x0, 0x0) 16:18:05 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) 16:18:05 executing program 5: socketpair(0x10, 0x3, 0xfe6c, &(0x7f0000000000)) 16:18:05 executing program 4: pselect6(0x65, &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 16:18:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000000)={'ip_vti0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:05 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8943, &(0x7f0000000180)={'wg2\x00', 0x80000000}) 16:18:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:05 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x5452, 0x0) 16:18:05 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x28, r1, 0xb11, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 1317.089585][T25083] loop1: detected capacity change from 0 to 131072 [ 1317.156737][T25083] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:06 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca0aa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:06 executing program 0: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000040)=""/116, 0x74}, {0x0}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7bbd99e60a82d679b2f", 0x12, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="c8d4d0bcec27082330ec687c7cafbe8e501475b39ba82ce90c5340c76f0629930606e7fb520733d1961246d18b9708587a80a12fa7de336dbfaf46e31b037fa2242a437ac30755cee8a8d885f20d3384802be2e67a069ddfaff31638ff0a41b74895152bf2822d2e22512f52c660106400c0b73700923097c081684ceab986d2c0fbf443") ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) 16:18:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000440)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x3a, &(0x7f0000000240)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getgid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x500, 0x0) syz_mount_image$vfat(&(0x7f0000003300), &(0x7f0000003340)='./file0\x00', 0x8100000, 0x3, &(0x7f0000003540)=[{&(0x7f0000003500)="8c31ee", 0x3, 0x1}, {&(0x7f00000009c0)='O', 0x1, 0x4}, {&(0x7f0000000600)="c1b859f3b6b224cf2706a9019af08ed067c568b4ba8f0f6e1e79e5b950b055a29e88bc43df3774c80e56d1f0689786909eb453f998deb702782e9d806b5f79df", 0x40, 0xf66}], 0x81, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRESOCT=r0, @ANYRESOCT], 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x101140, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 16:18:06 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8995, &(0x7f0000000180)={'wg2\x00'}) 16:18:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) socket$inet(0x2, 0x0, 0x0) exit(0x0) [ 1317.255534][T25107] loop1: detected capacity change from 0 to 131072 [ 1317.284344][T25107] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:06 executing program 4: prctl$PR_MCE_KILL(0x37, 0x0, 0x2) 16:18:06 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:06 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca5ea6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='erspaw0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00000080000007fffffff801432100cc00650000ff009078ac1414bb64"]}) 16:18:06 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}], 0x1, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) process_vm_writev(r0, &(0x7f0000003340)=[{&(0x7f0000006a00)=""/4096, 0x1000}], 0x1, &(0x7f00000036c0)=[{&(0x7f0000002280)=""/1, 0x1}, {&(0x7f0000007a00)=""/4096, 0x1000}], 0x2, 0x0) 16:18:06 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1317.972951][T25122] loop1: detected capacity change from 0 to 131072 [ 1317.994175][T25122] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:06 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca64a6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:06 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, 0x0, 0x0) 16:18:06 executing program 5: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:06 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x80) 16:18:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000200000000000000000009500050000000000829cf6"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1318.133299][T25137] loop1: detected capacity change from 0 to 131072 16:18:06 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x14}, 0x14}}, 0x0) 16:18:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x1e, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1318.173307][T25137] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:07 executing program 4: prctl$PR_MCE_KILL(0x2f, 0x0, 0x0) 16:18:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000d80)={0x2, 0x0, @broadcast}, 0x10) 16:18:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}}}}) 16:18:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1097e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x20008001, 0x0, 0x0) 16:18:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000d80)={0x2, 0x0, @broadcast}, 0x10) 16:18:07 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8932, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x17}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1318.352209][T25165] loop1: detected capacity change from 0 to 131072 [ 1318.417545][T25165] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@gettfilter={0x24, 0x2e, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x0, 0xfff3}}}, 0x24}}, 0x0) 16:18:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000d80)={0x2, 0x0, @broadcast}, 0x10) 16:18:07 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0x7ffff002}, {&(0x7f00000020c0)=""/159, 0x9f}], 0x2, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) 16:18:07 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x123682, 0x0) 16:18:07 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x0) 16:18:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd5e97e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000d80)={0x2, 0x0, @broadcast}, 0x10) 16:18:07 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x40049409, &(0x7f0000000180)={'wg2\x00'}) 16:18:07 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x80041) write$char_usb(r0, 0x0, 0xf0ff7f00000000) [ 1318.575082][T25179] loop1: detected capacity change from 0 to 131072 16:18:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, 0x0, 0x0) 16:18:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r1, 0x0) 16:18:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 16:18:07 executing program 5: setreuid(0x0, 0xee00) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000400)={'wlan1\x00'}) 16:18:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) [ 1318.650184][T25179] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x25dfdc01}, 0x80) 16:18:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e710886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x1f8, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 16:18:07 executing program 4: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 16:18:07 executing program 3: r0 = fsopen(&(0x7f00000000c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) 16:18:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 16:18:07 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x69}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:07 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0xc0189436, &(0x7f0000000180)={'wg2\x00'}) 16:18:07 executing program 3: prctl$PR_MCE_KILL(0x25, 0x0, 0x0) 16:18:07 executing program 2: setreuid(0x0, 0xee00) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 1318.822192][T25215] loop1: detected capacity change from 0 to 131072 16:18:07 executing program 5: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 16:18:07 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0xffffffffffffffff, 0x80041) 16:18:07 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/schedstat\x00', 0x0, 0x0) mmap$usbfs(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) [ 1318.874331][T25215] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e724886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:07 executing program 3: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 1318.998376][T25236] loop1: detected capacity change from 0 to 131072 [ 1319.041631][T25236] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1319.098172][T29226] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:07 executing program 4: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 16:18:07 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x79}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:07 executing program 0: timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 16:18:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 16:18:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x64, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}]}, 0x64}}, 0x0) 16:18:07 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4066e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0xec, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0xc4, 0x8, 0x0, 0x1, [{0x98, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x48, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "b5324cb637bf57664f2bf364d50706e93d0154ca7226efca2a00"}]}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0xec}}, 0x0) 16:18:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x0, 0x0, 0x0, 0x0, 0x145b, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 16:18:08 executing program 5: r0 = fsopen(&(0x7f0000000040)='overlay\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000080)='overlay\x00', &(0x7f00000000c0)='overlay\x00', 0x0) 16:18:08 executing program 3: prctl$PR_MCE_KILL(0x3c, 0x0, 0x0) [ 1319.191825][T25245] loop1: detected capacity change from 0 to 131072 16:18:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x2, 0x11, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 16:18:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x7, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x6}]}}}}}) [ 1319.246254][T25245] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:08 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4880a093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:08 executing program 4: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 16:18:08 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 16:18:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:08 executing program 5: prctl$PR_MCE_KILL(0x2c, 0x0, 0x0) 16:18:08 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$sock(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000440)="61d5eb", 0xffffffb0}], 0x1}, 0x0) 16:18:08 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'sit0\x00', 0x7ffffffd}) 16:18:08 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 16:18:08 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0x3, 0x0, {}, [@common=@inet=@tcp={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) 16:18:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000080)={'ip_vti0\x00', 0x0}) [ 1319.614147][T25274] loop1: detected capacity change from 0 to 131072 [ 1319.638151][T25274] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:08 executing program 3: pivot_root(&(0x7f0000000080)='./file1\x00', 0x0) 16:18:08 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x48}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1319.697649][T25285] sit0: mtu greater than device maximum 16:18:08 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a48825093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1319.802334][T25295] loop1: detected capacity change from 0 to 131072 [ 1319.811980][T25295] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:08 executing program 2: r0 = socket$igmp6(0xa, 0x3, 0x2) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000100)) syz_clone3(&(0x7f0000002280)={0x220000000, 0x0, &(0x7f0000001180), &(0x7f00000011c0), {0x1f}, &(0x7f0000001200)=""/4096, 0x1000, &(0x7f0000002200)=""/22, &(0x7f0000002240)}, 0x58) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0xfffffffffffffff7, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0xfffffffffffffff7, 0x0) ptrace$setopts(0x4206, 0x0, 0xfffffffffffffff7, 0x0) syz_clone(0x40000000, &(0x7f0000003480)="e1a77df7a2dbe571ae1b9ccb43e13964970c1bbe35e037be44e4ab47d172fd383dd3cd6bc5c8fc9bbd212d9670d70612201b8706451933bfcc59220dffd2eb1f81fbec0721176ee0a00eb7c1080d0d8537f062769b20c1c8f4a28c654583de690955ec48e3d4371ddabbb4dd762a52d13396c3d876245dbb1cb3c7d76d774a782806c6f6757f2feea43986669d2f77f74fb3f37a9cbb077435a8af7b0f481b680afa6e437b", 0xa5, &(0x7f0000003540), &(0x7f0000003580), &(0x7f00000035c0)="bcd72e0c4d0f204a4341cbb7cd94994138bcfd953570ee485279668d5236ef12e7223684680d82ae5c4c56fcb327119124419a489e5217f425fd995ebd7730e71a381ae7a5468dbced9de0c6c44dfc93fc98bd264153cabca38e8032608d83a6089bcca99b00ca3a") syz_clone(0xc010000, &(0x7f0000003640)="4c22710374e0e5e03ec520a1aeb7b060a29d31bbb6304ac50ac16bf7a15401b9674a1d0ea304a4eda1549f68d88bfd08ac5ed81821ac", 0x36, &(0x7f0000003680), &(0x7f00000036c0), &(0x7f0000003700)="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") ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, 0x0) 16:18:08 executing program 5: process_vm_readv(0x0, &(0x7f0000000540)=[{0x0}, {0xfffffffffffffffd}], 0x2, 0x0, 0x0, 0x0) 16:18:08 executing program 0: clock_gettime(0x6, &(0x7f0000000000)) add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0x0) 16:18:08 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e023b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:08 executing program 4: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 16:18:08 executing program 3: r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0xe7e5e38d32177e8}) 16:18:08 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14, 0x0, 0x2}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:08 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0x102, 0x0, {}, [@common=@inet=@tcp={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) [ 1320.011926][T25303] loop1: detected capacity change from 0 to 131072 16:18:08 executing program 3: syz_usb_connect$uac1(0x0, 0x99, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x87, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x8, 0x24, 0x5, 0x0, 0x0, "0e52d4"}, @selector_unit={0xb, 0x24, 0x5, 0x0, 0x0, "196fcb3a061b"}, @input_terminal={0xc, 0x24, 0x2, 0x0, 0x200}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x0, 0x2, 0x4}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x5, 0xdf, 0x7, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) mknod$loop(0x0, 0x0, 0x1) 16:18:08 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xfffffe01, 0x4) 16:18:08 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1320.054366][T25303] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:08 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e033b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:09 executing program 2: exit(0xe87) exit(0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 16:18:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8942, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:09 executing program 5: bpf$PROG_LOAD_XDP(0x3, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1320.182548][T25328] loop1: detected capacity change from 0 to 131072 [ 1320.212389][T25328] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl=@proc, 0x80) 16:18:09 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e043b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:09 executing program 0: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x600400) syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) 16:18:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1320.377352][T12838] usb 4-1: new high-speed USB device number 53 using dummy_hcd 16:18:09 executing program 0: r0 = fsopen(&(0x7f0000000140)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000240)='cgroup2\x00', &(0x7f0000000280)='cgroup2\x00', 0x0) [ 1320.435788][T25345] loop1: detected capacity change from 0 to 131072 [ 1320.486569][T25345] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1320.634985][T12838] usb 4-1: Using ep0 maxpacket: 32 [ 1320.755216][T12838] usb 4-1: config 1 has an invalid interface descriptor of length 2, skipping [ 1320.764146][T12838] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1320.774732][T12838] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1320.784386][T12838] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1320.795015][T12838] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1320.978220][T12838] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1320.987314][T12838] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1320.995615][T12838] usb 4-1: Product: syz [ 1320.999788][T12838] usb 4-1: Manufacturer: syz [ 1321.004457][T12838] usb 4-1: SerialNumber: syz [ 1321.335641][T12838] usb 4-1: 0:2 : does not exist [ 1321.345375][T12838] usb 4-1: USB disconnect, device number 53 16:18:10 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x2, 0x1f8, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x258) 16:18:10 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8910, &(0x7f0000000180)={'wg2\x00'}) 16:18:10 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x25}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:10 executing program 0: r0 = fsopen(&(0x7f00000000c0)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='bpf\x00', &(0x7f0000000080)='.%#\x00', 0x0) 16:18:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e053b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={0x0}}, 0x0) 16:18:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0xbac397d4f0b94727, 0x0, 0x0) 16:18:10 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8932, &(0x7f0000000180)={'wg2\x00'}) 16:18:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}}}) 16:18:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000040)=@raw=[@func], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:10 executing program 3: add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:18:10 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/intel_idle', 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000180), 0x2, 0x0) [ 1321.774766][T25360] loop1: detected capacity change from 0 to 131072 [ 1321.801514][T25360] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:10 executing program 0: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 16:18:10 executing program 2: select(0x40, &(0x7f00000000c0)={0x3}, &(0x7f0000000100)={0x6}, 0x0, 0x0) 16:18:10 executing program 5: pselect6(0x40, &(0x7f0000000680)={0x800}, &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740), &(0x7f00000007c0)={&(0x7f0000000780)={[0xa6]}, 0x8}) 16:18:10 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e063b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:10 executing program 4: socket(0xa, 0x6, 0x9f98) 16:18:10 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x107400, 0x0) 16:18:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x0, 0x7ffff000}, 0x80) 16:18:10 executing program 5: syz_open_dev$usbmon(&(0x7f0000000040), 0x100000000003, 0x0) 16:18:10 executing program 4: syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000400), 0x0, 0x0) 16:18:10 executing program 3: prctl$PR_GET_TID_ADDRESS(0xe, 0x0) [ 1321.955836][T25388] loop1: detected capacity change from 0 to 131072 16:18:10 executing program 3: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 16:18:10 executing program 2: request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='/dev/usbmon#\x00', 0x0) [ 1321.996287][T25388] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:11 executing program 0: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x5, 0x2, 0x0, 0x0) 16:18:11 executing program 2: r0 = epoll_create(0x81) setsockopt$MRT6_DONE(r0, 0x29, 0xc9, 0x0, 0x0) 16:18:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg1\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:11 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e073b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:11 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000640), 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000002540)) 16:18:11 executing program 5: prctl$PR_MCE_KILL(0x2a, 0x0, 0x2) 16:18:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast2}}}}) 16:18:11 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x9}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:11 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x69000000}, 0x80) 16:18:11 executing program 5: process_vm_readv(0x0, &(0x7f0000000380), 0x100000000000026f, 0x0, 0x0, 0x0) 16:18:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) [ 1322.726821][T25412] loop1: detected capacity change from 0 to 131072 [ 1322.763975][T25412] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:11 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:11 executing program 2: socketpair(0x10, 0x3, 0x4e72, &(0x7f0000000080)) 16:18:11 executing program 3: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x1b8, 0xffffffff, 0xffffffff, 0x2, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@tcp={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) 16:18:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x30, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6}]}, 0x30}}, 0x0) 16:18:11 executing program 0: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2, &(0x7f0000000440)=@string={0x2}}]}) 16:18:11 executing program 2: sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000001}, 0x4000080) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) 16:18:11 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e083b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:11 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891e, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:11 executing program 4: pselect6(0x37, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, &(0x7f0000000300)={&(0x7f0000000240), 0x8}) 16:18:11 executing program 5: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0xffff}, &(0x7f0000000140)={0x0, r0+60000000}, &(0x7f00000001c0)={&(0x7f0000000180)={[0xff]}, 0x8}) 16:18:11 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8942, &(0x7f0000000180)={'wg2\x00'}) 16:18:11 executing program 3: getgroups(0x2, &(0x7f00000000c0)=[0xee00, 0xee01]) setregid(0xffffffffffffffff, r0) 16:18:11 executing program 5: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, 0x0) [ 1322.908174][T25436] loop1: detected capacity change from 0 to 131072 [ 1322.928271][T25436] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:11 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:11 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e0a3b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1322.967783][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1323.039638][T25458] loop1: detected capacity change from 0 to 131072 [ 1323.058062][T25458] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1323.185072][T27638] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 1323.425012][T27638] usb 1-1: Using ep0 maxpacket: 32 [ 1323.545121][T27638] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1323.553824][T27638] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1323.565327][T27638] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1323.605647][T27638] usb 1-1: language id specifier not provided by device, defaulting to English [ 1323.725202][T27638] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1323.734345][T27638] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1323.743725][T27638] usb 1-1: Product: syz [ 1323.748143][T27638] usb 1-1: Manufacturer: syz [ 1323.752753][T27638] usb 1-1: SerialNumber: syz [ 1324.075144][T27638] usb 1-1: 0:2 : does not exist [ 1324.095198][T27638] usb 1-1: USB disconnect, device number 26 16:18:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @local, {[@end]}}}}}) 16:18:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e0b3b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:13 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x4}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 2: r0 = epoll_create(0x81) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000040)={0x20000000}) 16:18:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14, 0xa}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 5: fsopen(&(0x7f0000000040)='tmpfs\x00', 0x0) 16:18:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1379, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x48) 16:18:13 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x85ffffff}, [@generic={0x14}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) 16:18:13 executing program 4: prctl$PR_MCE_KILL(0x2, 0x1ffff000, 0x0) [ 1324.532144][T25468] loop1: detected capacity change from 0 to 131072 16:18:13 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@tcp={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x90, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) 16:18:13 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) 16:18:13 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x61, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1324.585765][T25468] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x13, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e0c3b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:13 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_provisioning(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffe) 16:18:13 executing program 5: r0 = fsopen(&(0x7f00000000c0)='securityfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 16:18:13 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1, 0x0, @c}, 0x29, 0xfffffffffffffffb) 16:18:13 executing program 3: prctl$PR_MCE_KILL(0x1c, 0x0, 0x0) 16:18:13 executing program 0: prctl$PR_MCE_KILL(0x10, 0x0, 0x0) 16:18:13 executing program 5: r0 = fsopen(&(0x7f0000000040)='selinuxfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000340)='\x00', &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff) 16:18:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x894a, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xb, &(0x7f0000000180)={&(0x7f0000000040)={0x128, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0xbc, 0xbe, "d87ddbc05ca725dd24f0c40ae590537f861ce4aaf16e70168de6c2cc82497f1dbc147f731d6e3e234758238121542ee11eddba865936a8a94d59a6e6366bc30ac8f907ca0e9cfd8da72db3ae37f80c90d994359b1405ef9fd9a7bea7131a5cfab12c7d5fac6b1fc6a80f001a64245532441e5d81a62b42d0c28f9d830c7fa4d2a2cc375698386e542019f38e1d4632c03416c7af6274e598151f84d037105fd25a8ad7305ae9754b7dafdb5e85d8d6dcfd5e1ba8d77cdfc4"}, @NL80211_ATTR_MGMT_SUBTYPE={0x5}, @NL80211_ATTR_STA_FLAGS={0x28, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}]}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x8, 0xbd, [0x0, 0x0]}, @NL80211_ATTR_REASON_CODE={0x6}]}, 0x128}}, 0x0) 16:18:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) socketpair(0x0, 0x0, 0x0, 0x0) 16:18:13 executing program 0: bpf$PROG_LOAD_XDP(0x6, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x8c) 16:18:13 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 1324.738015][T25502] loop1: detected capacity change from 0 to 131072 [ 1324.793502][T25502] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e0d3b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:13 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x894a, &(0x7f0000000180)={'wg2\x00'}) 16:18:13 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0xc0189436, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:13 executing program 0: sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, 0x0, 0x0) 16:18:13 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000cc0)={0x2, 0x0, @broadcast}, 0x10) 16:18:13 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x4102, 0x0) 16:18:13 executing program 2: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x2, 0x0, 0x0) 16:18:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x2, 0x11, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x60}}, 0x0) 16:18:13 executing program 4: clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, &(0x7f0000000280)={0x0, r0+60000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 16:18:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x58, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x4}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}]}, 0x58}}, 0x0) 16:18:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, 0x0, 0x0) [ 1324.953512][T25534] loop1: detected capacity change from 0 to 131072 [ 1325.014387][T25534] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:13 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e0e3b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:13 executing program 3: syz_clone(0x40044080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="c8d4d0bcec27082330ec687c7cafbe8e501475b39ba82ce90c5340c76f0629930606e7fb520733d1961246d18b9708587a80a12fa7de336dbfaf46e31b037fa2242a437ac30755cee8a8d885f20d3384802be2e67a069ddfaff31638ff0a41b74895152bf2822d2e22512f52c660106400c0b73700923097c081684ceab986d2c0fbf4") 16:18:13 executing program 2: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "df587e44add9fa303de7a6a9f6c017b1bfb2067e3b7d692aea3f93bb15c8b167d286a96aed20f6c9ebf98c7cd252f3064592d0600383f1c8c86033ecb63c127a"}, 0x48, r0) keyctl$unlink(0x1d, r1, 0x0) 16:18:13 executing program 5: r0 = gettid() process_vm_writev(r0, &(0x7f0000001180)=[{&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000000040)=""/189, 0xbd}], 0x2, &(0x7f0000001400)=[{&(0x7f0000001200)=""/38, 0x26}], 0x1, 0x0) 16:18:13 executing program 0: syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x210800) 16:18:13 executing program 4: process_vm_readv(0x0, &(0x7f0000002240)=[{0x0}, {0x0}], 0x2, &(0x7f0000003940), 0x0, 0x0) syz_clone(0xc025000, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='A') 16:18:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x1, 0x4) 16:18:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x200000d0, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:13 executing program 0: request_key(&(0x7f0000000080)='encrypted\x00', 0x0, 0x0, 0x0) 16:18:13 executing program 4: r0 = fsopen(&(0x7f0000000040)='overlay\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) getrusage(0x0, &(0x7f0000000080)) 16:18:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x4b218a14abc5083a}) 16:18:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891a, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1325.171691][T25557] loop1: detected capacity change from 0 to 131072 [ 1325.207428][T25557] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1325.220472][T25566] overlayfs: missing 'lowerdir' 16:18:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e103b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1325.312149][T25571] loop1: detected capacity change from 0 to 131072 [ 1325.332961][T25571] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:14 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "5556b3d0e0b9e875d03d5f4484463ef03e2a6c1fa293f086ce4859368b95fc75816f214af36b4251cdeaa39b37cf71ec4a2d5b303144efbf05ed2d712515ab"}, 0x80) 16:18:14 executing program 0: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 16:18:14 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x80089203, 0x0) 16:18:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:14 executing program 5: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0), 0x2a}) 16:18:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e113b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x45}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:14 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x5421, &(0x7f0000000180)={'wg2\x00'}) 16:18:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1325.517258][T25583] loop1: detected capacity change from 0 to 131072 16:18:14 executing program 0: r0 = fsopen(&(0x7f0000000040)='selinuxfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) 16:18:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x71}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:14 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8904, &(0x7f0000000180)={'wg2\x00'}) 16:18:14 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x40040) [ 1325.568255][T25583] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:14 executing program 4: syz_genetlink_get_family_id$mptcp(&(0x7f0000000940), 0xffffffffffffffff) 16:18:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) 16:18:14 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x4020940d, &(0x7f0000000180)={'wg2\x00'}) 16:18:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e123b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:14 executing program 5: socketpair(0xa, 0x1, 0x10001, &(0x7f0000000200)) 16:18:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8912, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:14 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip_vti0\x00', &(0x7f0000000240)=ANY=[]}) 16:18:14 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:14 executing program 3: add_key(&(0x7f0000000340)='.request_key_auth\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 16:18:14 executing program 5: r0 = fsopen(&(0x7f00000000c0)='erofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000100)='-]\x00', &(0x7f0000000140)='/]#\xa8w]-\x00', 0x0) [ 1325.720228][T25611] loop1: detected capacity change from 0 to 131072 16:18:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x7, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 16:18:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x4, 0x0, 0x0) r1 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r2, &(0x7f0000002dc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002d80)={&(0x7f00000000c0)={0x730, r3, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x2f0, 0x5, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x6c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x68, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}]}]}]}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2d}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0xd0, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0xc0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}]}, {0x160, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xd0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x200}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1478}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8001}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x2c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x1e8, 0x5, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x6c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x4}, @NL80211_PMSR_PEER_ATTR_REQ={0x34, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x14, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}]}]}, {0x130, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x100, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xac, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xa945}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6f}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_WIPHY_FREQ={0x8}]}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x4}]}]}, @NL80211_PMSR_ATTR_PEERS={0x244, 0x5, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1a2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_CENTER_FREQ1={0x8}]}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x4}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}]}]}, {0xe8, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xa0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x8c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x89a}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x4}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x104, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x64, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x9c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_LMR_FEEDBACK={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xe9}]}]}]}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}]}]}, 0x730}}, 0x20000000) 16:18:14 executing program 2: syz_usb_connect$uac1(0x0, 0x9e, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x8c, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5}, @selector_unit={0xb, 0x24, 0x5, 0x0, 0x0, "196fcb3a061b"}, @input_terminal={0xc}, @output_terminal={0x9}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x5, 0xdf, 0x7, {0x7, 0x25, 0x1, 0x83}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 16:18:14 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000fc87947800001a000000beeec91b7058f05e00009d"], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e183b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1325.771312][T25611] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1325.802522][T25626] netlink: 'syz-executor.0': attribute type 5 has an invalid length. 16:18:14 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8902, &(0x7f0000000180)={'wg2\x00'}) 16:18:14 executing program 5: clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000280)={0x0, r0+60000000}, 0x0) 16:18:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x5, 0x0, 0x0, 0x0, 0x3c000000}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:14 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x1e7460, 0x0) [ 1325.865204][T25636] loop1: detected capacity change from 0 to 131072 16:18:14 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b1044716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@nl=@proc, 0x200000c0) 16:18:14 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000b80)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x14}, 0x14}}, 0x0) 16:18:14 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x7}, 0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={[0x5]}, 0x8}) [ 1325.910336][T25636] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:14 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1325.989988][T25647] loop1: detected capacity change from 0 to 131072 [ 1326.010150][T25647] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1326.125913][ T4341] usb 3-1: new high-speed USB device number 47 using dummy_hcd [ 1326.395004][ T4341] usb 3-1: Using ep0 maxpacket: 32 [ 1326.525272][ T4341] usb 3-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1326.536331][ T4341] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1326.549444][ T4341] usb 3-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1326.559515][ T4341] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1326.570691][ T4341] usb 3-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1326.735191][ T4341] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1326.744271][ T4341] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1326.752304][ T4341] usb 3-1: Product: syz [ 1326.756500][ T4341] usb 3-1: Manufacturer: syz [ 1326.761084][ T4341] usb 3-1: SerialNumber: syz [ 1327.131058][ T4341] usb 3-1: USB disconnect, device number 47 [ 1327.147839][T28675] udevd[28675]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory 16:18:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x20000, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:16 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000001000000000000400000140000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8993, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x2, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a5c716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:16 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) 16:18:16 executing program 3: syz_clone(0xd0388400, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x0, 0x1000}, 0x48) 16:18:16 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8929, &(0x7f0000000180)={'wg2\x00'}) [ 1327.535503][T25665] loop1: detected capacity change from 0 to 131072 16:18:16 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @private=0xa010102}}}}) 16:18:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80) [ 1327.582757][T25665] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:16 executing program 5: prctl$PR_MCE_KILL(0x3d, 0x0, 0x2) 16:18:16 executing program 2: socket(0x10, 0x0, 0xffffff3f) 16:18:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x63, 0x0, 0x0, 0x0, 0x10}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a5e716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:16 executing program 0: prctl$PR_GET_NAME(0x10, &(0x7f00000000c0)=""/109) 16:18:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = fsopen(&(0x7f0000000140)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000200)='\x00', 0x0, r0) 16:18:16 executing program 3: sendto(0xffffffffffffffff, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0) 16:18:16 executing program 0: pselect6(0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740), &(0x7f00000007c0)={&(0x7f0000000780)={[0xa6]}, 0x8}) 16:18:16 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8947, &(0x7f0000000180)={'wg2\x00'}) 16:18:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:16 executing program 3: socketpair(0x10, 0x0, 0x1, &(0x7f0000000000)) [ 1327.769428][T25692] loop1: detected capacity change from 0 to 131072 16:18:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @private}}, {{0x2, 0x0, @empty}}}, 0x108) 16:18:16 executing program 4: setreuid(0x0, 0xee00) fsmount(0xffffffffffffffff, 0x0, 0x0) 16:18:16 executing program 0: prctl$PR_SET_IO_FLUSHER(0x39, 0x2) [ 1327.838787][T25692] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:16 executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}, 0xc, 0x0, 0x0, 0x0, 0x1}) 16:18:16 executing program 2: pselect6(0x40, &(0x7f0000000100), &(0x7f00000001c0)={0x5}, 0x0, 0x0, 0x0) 16:18:16 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8970, &(0x7f0000000180)={'wg2\x00'}) 16:18:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44710aae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:16 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x64}, [@generic={0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:16 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) 16:18:16 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000000), &(0x7f0000000080)=0xffffffffffffff1b) 16:18:16 executing program 2: socketpair(0x1, 0x4, 0x0, &(0x7f0000000040)) 16:18:16 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='sync\x00', 0x0, 0x0) 16:18:16 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000400), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {}, {}, {0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "9720b5fef58c8ae0"}}, 0x48}}, 0x0) 16:18:16 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x2, &(0x7f0000000180)={'wg2\x00'}) 16:18:16 executing program 3: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x80047453, 0x0) 16:18:16 executing program 2: process_vm_readv(0x0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}], 0x1, &(0x7f0000001100)=[{&(0x7f00000000c0)=""/4101, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x1000000000000063, 0x0) [ 1327.954773][T25724] loop1: detected capacity change from 0 to 131072 16:18:16 executing program 0: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, "bdc884af31b98be1b08d56dd3d55d07c9dfdb278817bbc31f46ade4b81a21409027d6bb246a2816502138b5300a2c84e7d83df1625c6d26b255db7b20dbf0fd2"}, 0x48, 0xffffffffffffffff) 16:18:16 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xffffffffffffffff) [ 1328.024859][T25724] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:16 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a447125ae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x4}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x2c}}, 0x0) 16:18:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x7a8) 16:18:16 executing program 0: prctl$PR_MCE_KILL(0x24, 0x1, 0x0) 16:18:16 executing program 3: prctl$PR_MCE_KILL(0x1e, 0x0, 0x0) 16:18:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000008c0)={'wpan4\x00'}) 16:18:16 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000040)={'sit0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @local, @dev}}}}) [ 1328.128967][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x30, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x30}}, 0x0) 16:18:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8994, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_PEERS={0x8, 0x8, 0x0, 0x1, [{0x4}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}]}, 0x40}}, 0x0) 16:18:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @multicast2}}}}) [ 1328.211703][T25758] loop1: detected capacity change from 0 to 131072 16:18:17 executing program 0: fsopen(&(0x7f0000000040)='selinuxfs\x00', 0x0) [ 1328.323025][T25758] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:17 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44715cae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x4, &(0x7f0000000240)=ANY=[@ANYRESOCT], &(0x7f0000000080)='syzkaller\x00', 0x6, 0x98, &(0x7f00000002c0)=""/152, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:17 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x80041) write$char_usb(r0, 0x0, 0x0) 16:18:17 executing program 3: bind$xdp(0xffffffffffffffff, 0x0, 0x0) 16:18:17 executing program 4: keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000580)=[{&(0x7f0000000000)="2e2225ed35e288f9a8304cdb52e1070e1e1a2e2e9c123ae60715295fcf2c9b019eb9ccc40577ecc30b6231558683d14122bae2468f76ac1672a29833206ceeaed37b7172b8f86147034b82c7c6b090fe5c60f8400a3a60d57c7e6057db72d94651e007f2d808a903f4e5fd8d5e17d3b1", 0x70}, {&(0x7f0000000080)="f9d6334110dcbb8aef3b6edaa4647468b09e08b7159fff727d5fd9be47cbb2c2a011bf7ff6c21e19dcda8d8f200ab1f5253550caf3eaf8f12be546b03c528ad7ac0913395073e2a481d3406818e9edb2a174ecd6ec05352946b0760d96544f9a0ad6d1e8639f4473114e597e", 0xfffffffffffffcc9}, {&(0x7f0000000180)="df07db1745de17e1ab809a9ef1a1d6eaf8af76f66a9fcfc8187c5aa1239ccca2a3c68361c23dad307ed0e8c33d68a876be81dfba8582310670763d42ce7db472ad33d151f73d836d4c6250bad54c1fe299c3af9d41ca046368500d0b0ad6eeaaafc79ec3d2f0ae36090df7180ae8590890eb43e4ea9e36c5f1931f9f8462ec74d9c774601ba22f87ce3bd23b794d1d4b7d91a2e3d988cf4d6648013c07dfdac31e920599dcf515b11318339f2e5936c55660706845f64a0c6355e3e2666b68f0c4ae5d18a02a126b6ead394c179429904b264df3c6e52c158a13", 0xda}, {&(0x7f0000000280)="784daaee8a57eaacab64503947d75256cbc8b7edb2d6e930918c684c0f83af47cfb6aa38261cad4e15a535f1ac9606e96b8331aea74e66e93c6e8f248ecff5471c323c37a6eeff3e0ec2fdb3674196363efb414d39bad407f7", 0x59}, {&(0x7f0000000300)="8537c83b27ef6eb62f26df0aa18d87190172451bda266a0a30a098160bb0d1e8cebc1399c1ae413aa063154450240f26fb2c9ec180c5c2d3b8f98a7d40f492d5f4e57d88390b7ff6c6cdccdd92ce82a0447526ada37d1aa375daaf4623b758e79d686e3d1706e91083098ea7e4eb01a3edccd27d299abd0aae09b1b04e97aee53484224e02d4a8370f58d1af4942cdd3", 0x90}, {&(0x7f00000003c0)="e0c3cb6030cee9bded1ca973c24a1f129369743082242ef7f6bbca2aa2e92bd5bfb58ebaa4c4be99fb8967ef3f74b6b2f7ba4031678bba8dffcf90ffe5ace841f71382794b4ae69ca41034bf11cc392626f31d7957e4f81859d3345fba0ad57f319aa60ae940ba2750b2f1667e86a7a9af202c", 0x73}, {&(0x7f0000000440)="2590c00c2d409540fc445e90768a788c000f43a9e60199685bf0f4dfb40671e648e6772eec5c51836daeb46faca6f1b097ceb514193c8c819c4f3b8e236888561abbc82a717363bdb823e631b0c901d680534e0f983ff9dd8644a462152b4e74c7d1ecc99004ba38573ebb5dfaa0adbf204a58ac485452b1f9d6a96cd44985a872dba15e85a1bbdc4c8f0ba70b65937af34370e60e3361f2c989d6cc38a428a52f045f1ca477af9585985fb0b4f1c224080880c6093173a42532b59a79ac4ca95e9b", 0xc2}, {&(0x7f0000000540)="7a077214e40c2d809691d8f400844adbf455c98e4fac5f034627a86287c6b67ca26c4a1850ba508469a0a5d8bffe86e8bf73bd182ef87e449594", 0x3a}], 0x8, 0x0) 16:18:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) 16:18:17 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/schedstat\x00', 0x0, 0x0) read$usbfs(r0, &(0x7f0000000000)=""/20, 0x14) read$char_usb(r0, &(0x7f0000000880)=""/41, 0x29) 16:18:17 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x201) 16:18:17 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x891f, &(0x7f0000000180)={'wg2\x00'}) 16:18:17 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/sync_on_suspend', 0x0, 0x0) read$char_usb(r0, &(0x7f0000000880)=""/22, 0x16) 16:18:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x1d, r0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) [ 1328.510453][T25787] loop1: detected capacity change from 0 to 131072 [ 1328.581944][T25787] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:17 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d0a01e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:17 executing program 4: prctl$PR_MCE_KILL(0x3a, 0x0, 0x2) 16:18:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8922, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:17 executing program 2: r0 = socket$inet(0x2, 0x2, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, 0x0, 0x0) 16:18:17 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xa, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:17 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x14, 0xc}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:17 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000003340)=[{&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/36, 0x24}, {&(0x7f0000002040)=""/220, 0xdc}], 0x3, &(0x7f00000036c0)=[{&(0x7f00000033c0)=""/58, 0x3a}, {&(0x7f0000007a00)=""/4096, 0x1000}], 0x2, 0x0) 16:18:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f0000000a40)={0x0, {}, {{0x2, 0x0, @remote}}}, 0x108) [ 1328.693281][T25807] sit0: mtu less than device minimum 16:18:17 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x77359400}, 0x0) 16:18:17 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 16:18:17 executing program 3: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x1) 16:18:17 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1328.722888][T25809] loop1: detected capacity change from 0 to 131072 [ 1328.755500][T25809] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:17 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d2501e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:17 executing program 4: r0 = epoll_create(0xf0f8d62) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x7ffffffc) 16:18:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @broadcast}}}}) 16:18:17 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x541b, 0x0) 16:18:17 executing program 5: r0 = fsopen(&(0x7f0000000000)='vfat\x00', 0x0) r1 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='\x00', 0x0, r1) 16:18:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x200912) keyctl$unlink(0x1d, r0, 0x0) 16:18:17 executing program 2: prctl$PR_MCE_KILL(0x3a, 0x0, 0x0) [ 1328.888059][T25831] loop1: detected capacity change from 0 to 131072 [ 1328.916209][T25831] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:17 executing program 5: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x2}, 0x0, &(0x7f0000000280), 0x0) 16:18:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000780)={0x14}, 0x14}, 0x2}, 0x0) 16:18:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d2e01e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:18 executing program 5: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x100000001}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x40]}, 0x8}) 16:18:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891d, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1329.601070][T25849] loop1: detected capacity change from 0 to 131072 [ 1329.630717][T25849] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:18 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x2, 0x11, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x38}}, 0x0) 16:18:18 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8927, &(0x7f0000000180)={'wg2\x00'}) 16:18:18 executing program 2: process_vm_readv(0x0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}, {&(0x7f00000020c0)=""/159, 0x9f}], 0xf000, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) 16:18:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000080)={0x0, "df587e44add9fa303de7a6a9f6c017b1bfb2067e3b7d692aea3f93bb15c8b167d286a96aed20f6c9ebf98c7cd252f3064592d0600383f1c8c86033ecb63c127a"}, 0x48, r0) 16:18:18 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x181041) write$char_usb(r0, 0x0, 0x7ffff000) 16:18:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d2f01e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:18 executing program 2: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='$[.{R\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 16:18:18 executing program 3: syz_usb_connect$uac1(0x0, 0x9a, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x88, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x9, 0x24, 0x5, 0x0, 0x0, "0e52d427"}, @selector_unit={0xb, 0x24, 0x5, 0x0, 0x0, "196fcb3a061b"}, @input_terminal={0xc, 0x24, 0x2, 0x0, 0x200, 0x0, 0x0, 0x0, 0x6}, @output_terminal={0x9, 0x24, 0x3, 0x0, 0x303}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x6, 0x0, {0x7, 0x25, 0x1, 0x80}}}}}}}]}}, &(0x7f0000000740)={0x0, 0x0, 0x8, &(0x7f0000000340)={0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}, 0x4, [{0x2, &(0x7f0000000440)=@string={0x2}}, {0x4, &(0x7f0000000480)=@string={0x4, 0x3, "8360"}}, {0x0, 0x0}, {0x0, 0x0}]}) 16:18:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:18 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x250, 0x1b8, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1b8, 0xffffffff, 0xffffffff, 0x190, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@inet=@tcp={{0x30}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) 16:18:18 executing program 4: clock_gettime(0x0, &(0x7f0000000240)={0x0}) select(0x40, &(0x7f00000000c0)={0x3}, &(0x7f0000000100)={0x6}, 0x0, &(0x7f0000000280)={r0}) 16:18:18 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8992, &(0x7f0000000180)={'wg2\x00'}) 16:18:18 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 16:18:18 executing program 2: setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) [ 1329.743208][T25866] loop1: detected capacity change from 0 to 131072 [ 1329.753499][T25866] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}}}}) 16:18:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x0, {}, {{0x2, 0x0, @multicast2}}}, 0x108) 16:18:18 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d5c01e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:18 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/bus/input/handlers\x00', 0x0, 0x0) read$usbfs(r0, &(0x7f00000000c0)=""/248, 0xf8) 16:18:18 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8911, &(0x7f0000000180)={'wg2\x00'}) [ 1329.848406][T25886] loop1: detected capacity change from 0 to 131072 [ 1329.893536][T25886] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1330.055065][ T4619] usb 4-1: new high-speed USB device number 54 using dummy_hcd [ 1330.305000][ T4619] usb 4-1: Using ep0 maxpacket: 32 [ 1330.435292][ T4619] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1330.445461][ T4619] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1330.454374][ T4619] usb 4-1: config 1 interface 0 altsetting 0 has an invalid endpoint with address 0x0, skipping [ 1330.465149][ T4619] usb 4-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1330.516953][ T4619] usb 4-1: language id specifier not provided by device, defaulting to English [ 1331.065139][ T4619] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1331.074338][ T4619] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1331.082455][ T4619] usb 4-1: Manufacturer: 悃 [ 1331.415383][ T4619] usb 4-1: 0:2 : does not exist [ 1331.424168][ T4619] usb 4-1: USB disconnect, device number 54 16:18:20 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}], 0x1, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) syz_clone(0x28842200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)="82") 16:18:20 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 16:18:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="e90670cf616e624eba163c6aeab20000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00E']}) 16:18:20 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6402e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) 16:18:20 executing program 2: pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000280), 0x0) 16:18:20 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000980)=@framed={{}, [@func, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x6, 0x9c, &(0x7f0000000180)=""/156, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:20 executing program 2: r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @remote}, 0xc, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)='ip6tnl0\x00', 0x0, 0x1000000000, 0x400}) 16:18:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000001c0)={'gre0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}) 16:18:20 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240), 0x8}) [ 1331.878684][T25903] loop1: detected capacity change from 0 to 131072 16:18:20 executing program 5: r0 = fsopen(&(0x7f0000000140)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) 16:18:20 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_CSMA_BACKOFFS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 16:18:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89b1, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:20 executing program 0: r0 = syz_clone(0x10000180, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_readv(r0, &(0x7f0000002240)=[{&(0x7f0000001f40)=""/244, 0xf4}], 0x1, &(0x7f0000003940)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) [ 1331.925202][T25903] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:20 executing program 2: pselect6(0xfffffcf6, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000200)={0x77359400}, &(0x7f0000000300)={&(0x7f0000000240), 0x8}) 16:18:20 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6403e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:20 executing program 4: syz_usb_connect$uac1(0x0, 0x94, &(0x7f0000000200)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x82, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@selector_unit={0x5, 0x24, 0x5, 0x5}, @selector_unit={0xb, 0x24, 0x5, 0x0, 0x0, "196fcb3a061b"}, @input_terminal={0xc}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x8, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x80}}}}}}}]}}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0}) 16:18:20 executing program 2: syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x400) 16:18:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89a1, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x4, 0x4) 16:18:20 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8991, &(0x7f0000000180)={'wg2\x00'}) 16:18:20 executing program 2: prctl$PR_MCE_KILL(0x19, 0x0, 0x0) 16:18:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000dc0)={0x2, 0x11, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2}]}, 0x20}}, 0x0) 16:18:20 executing program 5: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000000)='bpf\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 16:18:20 executing program 3: clock_gettime(0x0, &(0x7f0000000180)={0x0}) socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000280)={r0}, 0x0) 16:18:20 executing program 2: bpf$PROG_LOAD_XDP(0x8, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1332.090986][T25937] loop1: detected capacity change from 0 to 131072 [ 1332.155722][T25937] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:21 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6404e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x101143, 0x0) [ 1332.279426][T25956] loop1: detected capacity change from 0 to 131072 [ 1332.292201][T25956] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1332.334998][ T4619] usb 5-1: new high-speed USB device number 68 using dummy_hcd [ 1332.595116][ T4619] usb 5-1: Using ep0 maxpacket: 32 [ 1332.725180][ T4619] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1332.739198][ T4619] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 1332.750378][ T4619] usb 5-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1332.762398][ T4619] usb 5-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1332.772520][ T4619] usb 5-1: config 1 interface 1 has no altsetting 0 [ 1332.945167][ T4619] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1332.954549][ T4619] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1332.962737][ T4619] usb 5-1: Product: syz [ 1332.967038][ T4619] usb 5-1: Manufacturer: syz [ 1332.971678][ T4619] usb 5-1: SerialNumber: syz [ 1333.321780][ T4619] usb 5-1: USB disconnect, device number 68 [ 1333.338640][T28675] udevd[28675]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory 16:18:22 executing program 4: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='$[.{R\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 16:18:22 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 16:18:22 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x5452, &(0x7f0000000180)={'wg2\x00'}) 16:18:22 executing program 2: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000700), r0) 16:18:22 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6405e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:22 executing program 3: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040), 0x10) 16:18:22 executing program 2: socketpair(0x15, 0x0, 0x0, &(0x7f0000000340)) 16:18:22 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, 0xfffffffffffffffa) 16:18:22 executing program 0: prctl$PR_MCE_KILL(0x38, 0x0, 0x0) 16:18:22 executing program 3: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7", 0x9, &(0x7f0000000100), &(0x7f0000000140), 0x0) ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) getpgid(r0) 16:18:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1333.755635][T25967] loop1: detected capacity change from 0 to 131072 16:18:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x14, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @local}}}}) 16:18:22 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x3a) [ 1333.804784][T25967] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:22 executing program 5: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000040)=""/116, 0x74}], 0x2, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7bbd99e60a82d679b2f", 0x12, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="c8d4d0bcec27082330ec687c7cafbe8e501475b39ba82ce90c5340c76f0629930606e7fb520733d1961246d18b9708587a80a12fa7de336dbfaf46e31b037fa2242a437ac30755cee8a8d885f20d3384802be2e67a069ddfaff31638ff0a41b74895152bf2822d2e22512f52c660106400c0b73700923097c081684ceab986d2c0fbf443") ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) getpgid(r0) 16:18:22 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000040)={0x0}) 16:18:22 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6406e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:22 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, &(0x7f00000003c0)='t', 0x1, 0x40, &(0x7f0000000440)=@tipc=@name={0x1e, 0x2, 0x0, {{0x2}}}, 0x80) 16:18:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f0000000080)={'sit0\x00', 0x0}) 16:18:22 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)={0x2, 0x0, @b}, 0x48, 0xfffffffffffffffe) 16:18:22 executing program 4: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) prctl$PR_GET_FP_MODE(0x2e) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/schedstat\x00', 0x0, 0x0) read$char_usb(r1, &(0x7f00000000c0)=""/46, 0x2e) read$char_usb(r1, &(0x7f0000000000)=""/174, 0xae) sendto(r0, &(0x7f0000000280)="d6", 0x300, 0x0, 0x0, 0x0) [ 1333.952239][T25995] loop1: detected capacity change from 0 to 131072 [ 1333.968014][T25995] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:23 executing program 3: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7", 0x9, &(0x7f0000000100), &(0x7f0000000140), 0x0) ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) getpgid(r0) 16:18:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000040)=@framed={{}, [@generic={0x5}, @kfunc]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:23 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6407e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:23 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8943, &(0x7f0000000180)={'wg2\x00'}) 16:18:23 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x9802, &(0x7f0000000000)=@framed={{}, [@generic]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1334.563410][T26009] loop1: detected capacity change from 0 to 131072 [ 1334.619859][T26009] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/schedstat\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:18:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x5, 0x0, 0x0, 0x0, 0xff000000}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:23 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6408e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:23 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000002c0), 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0xc0189436, 0x0) 16:18:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000040)=@raw=[@call], &(0x7f0000000080)='GPL\x00', 0x6, 0x8a, &(0x7f00000000c0)=""/138, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1334.780664][T26024] loop1: detected capacity change from 0 to 131072 [ 1334.843117][T26024] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:24 executing program 3: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7", 0x9, &(0x7f0000000100), &(0x7f0000000140), 0x0) ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) getpgid(r0) 16:18:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 16:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, {[@ra={0x94, 0x4}]}}}}}) 16:18:24 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x89b1, &(0x7f0000000180)={'wg2\x00'}) 16:18:24 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @broadcast}}}}) 16:18:24 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6409e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:24 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 16:18:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 16:18:24 executing program 4: exit(0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) 16:18:24 executing program 5: bpf$PROG_LOAD_XDP(0x2, &(0x7f0000000280)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1335.438598][T26040] loop1: detected capacity change from 0 to 131072 16:18:24 executing program 2: ioprio_set$uid(0x0, 0x0, 0x2004) 16:18:24 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8991, &(0x7f0000000080)={'sit0\x00', 0x0}) [ 1335.485893][T26040] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:24 executing program 3: syz_clone(0xb10b1600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)=""/115, 0x73}], 0x1, 0x0) r1 = syz_clone(0x40044080, &(0x7f0000000000)="99480829b70b9f90e7", 0x9, &(0x7f0000000100), &(0x7f0000000140), 0x0) ptrace$peek(0xf4a52ece5af3d721, r1, &(0x7f0000000240)) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001100)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r2, &(0x7f0000003380)) utimensat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{}, {0x0, 0xea60}}, 0x0) getpgid(r0) 16:18:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000700), r0) 16:18:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'tunl0\x00', &(0x7f0000000180)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x2, 0x0, 0x0, @rand_addr=0x64010100, @local}}}}) 16:18:24 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d640ae346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:24 executing program 5: setrlimit(0x8, &(0x7f0000000000)) 16:18:24 executing program 5: r0 = epoll_create(0x101) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x0) 16:18:24 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000100)=0x6) 16:18:24 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x1d, &(0x7f0000000000), 0x8) [ 1336.058261][T26068] loop1: detected capacity change from 0 to 131072 [ 1336.141048][T26068] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x903, &(0x7f0000000000), 0x8) 16:18:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x2}, 0x98) 16:18:25 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) recvmsg(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/90, 0x5a}, 0x0) 16:18:25 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0xb) 16:18:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6410e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000040), 0x4) 16:18:25 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 16:18:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x20100, &(0x7f0000000080)={0x10, 0x2}, 0x10) 16:18:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000280), 0xc) 16:18:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040), 0x10) 16:18:25 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="e8", 0x1}], 0x1, &(0x7f0000000440)=[@sndinfo={0x1c}], 0x1c}, 0x0) [ 1336.897720][T26108] loop1: detected capacity change from 0 to 131072 16:18:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x28, r1, 0xa371538a7523d20f, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}]}, 0x28}}, 0x0) 16:18:25 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) listen(r0, 0x2) [ 1336.956822][T26108] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:25 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6411e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:25 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x10, 0x2}, 0x10) 16:18:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001340)=[@init={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 16:18:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000100), &(0x7f0000000000)=0x98) 16:18:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00', @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={r2}, 0x8) 16:18:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, 0x0, 0x0) [ 1337.084173][T26130] loop1: detected capacity change from 0 to 131072 16:18:25 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r1, &(0x7f0000000200)={0x10, 0x2}, 0x10) dup2(r0, r1) 16:18:25 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @sndrcv={0x2c}, @authinfo={0x10}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xcc}, 0x0) [ 1337.128608][T26130] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r3}, &(0x7f0000000040)=0x10) 16:18:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000000), &(0x7f0000000040)=0x8) 16:18:26 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) shutdown(r0, 0x1) 16:18:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6414e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f00000002c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, 0xb) 16:18:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x1, 0x0, 0x108}, 0x98) 16:18:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000), 0x88) 16:18:26 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=@in={0x10, 0x2}, 0x10) [ 1337.291430][T26155] loop1: detected capacity change from 0 to 131072 16:18:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 16:18:26 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="91", 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) shutdown(r0, 0x1) 16:18:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x0, 0x7}, 0x8) [ 1337.375014][T26155] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000024c0), &(0x7f0000002580)=0x90) 16:18:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:26 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xb) 16:18:26 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000280), &(0x7f0000000380)=0x8) 16:18:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6418e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 16:18:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000280), &(0x7f0000000200)=0x88) 16:18:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/13, 0xd}, 0xc0) 16:18:26 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) recvmsg(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x60001) [ 1337.626598][T26195] loop1: detected capacity change from 0 to 131072 16:18:26 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x101}, 0x10) 16:18:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffff}, 0x14) 16:18:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 1337.673349][T26195] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000015c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 16:18:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x8) 16:18:26 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r1, r0) r3 = dup2(r1, r2) sendmsg$inet_sctp(r3, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000740)='z', 0x1}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, &(0x7f0000000040), &(0x7f0000000080)=0x8) 16:18:26 executing program 5: clock_gettime(0x0, &(0x7f0000000380)) select(0x40, &(0x7f00000002c0), 0x0, &(0x7f0000000340)={0x9}, &(0x7f00000003c0)) 16:18:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6425e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:26 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 16:18:26 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=""/120, 0x78}, 0x0) 16:18:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @prinfo={0x14}, @sndinfo={0x1c}, @authinfo={0x10}, @sndinfo={0x1c}, @authinfo={0x10}, @init={0x14}, @prinfo={0x14}], 0xb0}, 0x0) 16:18:26 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000000c0)={0x0, @in, 0x0, 0x0, 0x18}, 0x98) [ 1337.980327][T26235] loop1: detected capacity change from 0 to 131072 16:18:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000100)=r2, 0x4) [ 1338.033876][T26235] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:26 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d643ee346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000000c0)=0x94) 16:18:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@dstaddrv4={0x10, 0x84, 0x9, @broadcast}, @init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}], 0x40}, 0x0) 16:18:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0xb) 16:18:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2, 0xb9184f9, 0x0, 0x40}, 0x10) 16:18:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 16:18:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000100), &(0x7f00000000c0)=0x2) 16:18:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="29c095209d092db8510e6181fc705d2804c64435533a8ec29422f165f8e52a01dfd7d8d5da6dc2f9d7d6ef7547851b70d14e5120662cbe177cbdb63d4b941945f51997d00e98e436032a52554db4cdbd5380d0a440839cf671f96cc33c29dfde98073b66a62aab50d4692bf405ad9f657226c78125c8b0cebe584088e74c7c2e1de7ffb37823d998ecff08c0614ce17b", 0x90}, {&(0x7f00000000c0)="0486f6dc298286f551c611777716aca9691192c2", 0x14}, {&(0x7f0000000180)="6aabbad0f2e1994163738134a1b2a8c7247500"/29, 0x1d}, {&(0x7f0000000500)="0e082ff6b7286730f45bf58bbd04d9d7a8ebcd0fbfd4c64275dd5f9f1cacb6eb7c5d2de2ff388695debcedd5bc42903b4a941313a46e3c11d15d5a43947e5c5ea3c416bac48bbdcb5bd5c145e4da8702efc30d460767e8cf4667a6c808624de5c280458679246fca2d6bb04dac37207b341116673155f7f8c2e1522bec4f11c47a53c4372b3caddffb1b8324f3b77697c349480fdded968e9572a8a3beba8c684cc366e5716311", 0xa7}, {&(0x7f00000005c0)="5610f7ba3b4766e0495b19e3cb20c6bbfe3621102886d782133c47fc4780ff356b9b4d252150551168d1e4f3e2786a129cad0fdc87f315b3992cb11380227efdd9f2ef9a7d40f927da51366115cf4b1b0f7b7929b1c8df3539118972d14c0638aa514ef37518a9edbd8015b3198c0c697c4f861afdc77150336fbde8f760e0415c909ff37f247ceecf600c659633463c5ad21753ef9dbf49bad0c4ac93527c8898942a84a368d4ffc6b39758b20ebf40d907a816082c1ce42da6d0ce1428a553c1d7a3796c3a18", 0xc7}, {&(0x7f00000006c0)="ef8e1e060ece03382b688cf2f0bca6af91627b212937e1f560b1a95a79090ffdc855fc43ff9824b1dd44c5d719bfbaa637e1b3dbc4e9ad366652dd7ece45a991e6513be91ab8351909cf902abdad6665ccea321c402de8bc4e9ecddec422172c813c16de500ecd4fd1514f74a6a3c5368f3874b21daa9639a480d6f4b751dd790b4a1abc8824288543c303a934ffd479b6a987dc5070e4c04a3782f151c681b540a759d0ff7e5b83e93af37ed90a3a9efb29a92d90925f597808a0f2183862abe7d494a1caf2d31efcfe11e9d037bf48eba6a6faa7c8c910", 0xd8}, {&(0x7f0000001ec0)="ebbd9ca1a3b3f94e46fa44ac0d4ef12cb27104f57edbfe89a669b5cb970b82edb117e9f3ed7b9711890504f3de845a64e99745697b117623fdc3fba4c07bbca3d68604cf4b1dce734c7e837a7674bd0f4d1e90c3d48885205818c1de098c6446b59a2606c20d20b1fa426ab1b599b3389ffe14cb23b6561b6855ca06e250294bc53cd31498bac4e3f4fe9259d40b5f634832885a43692f1b11f9d433c10748e813beeeb2a22325c70924c54e54f331e922b71d364edd1d8ff884df3420407f0b698a7d5aee5d81c94e984ea705d073be59746403c8b2872858066b1aa8a90b8b498f41dc1f92dda2133f2d406f3600fcb5a6b26514be67f6129ea3e5c2b9793e0a11aa88f6aa0075f116b744423adc0e4c21f7ad2b158446547ea595fa01c309d6a02e840b31f48a950fe60452b1094a5e024b59b1d573f7f2ca629592d1037fe1d767a676e0a8aa6a391dcdbb136a59632040d594f7b120efd51718a5fb1825e44ce5435b2d3b94e099f1c8871f95906399c8cdd7912249564d0442552f05ed50257aecbab1d45c29375803314adc1b3b81e383a6fa36e50d2ce088b986b5b9dd524286229866721baa1e861005cc1f01d27994ea84d7008bf2d2fcb4a7d1afb76761af1d9f1806a9b1b9f83ef0d0a9c816f0e227d98f9e0a7c800af5a49e51827c8c918505c8657967d3baecfaf98031ec54776b58068fbfbed666e5ef0cf4b307832b705ed9247f37c7292886bc227209e5243e9f32dcc662fa778f79bcce6013a3acedd26f5445d3da287f35f542e3e1dbcc7f35db221b286f407d5a51fb639765f740856914c1e49d819290e2ed4f1897b0911c87a25133032ef801815617ffc1e4888e46f71b348225669628ca97e941631e5ab6e1fe956589d40a0c46a84d8db5496ea3ac4f5b40e2c6af93ef85968ef5fd30d5d12025db187eedeeb3a240512ea174", 0x2a6}], 0x7}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000880)="450518caa546d1959e908a3b38cfd1b214", 0x11}], 0x1}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f00000001c0)="6318ac4a8699da20de29f80dfa3db2a5d8f6c14c1897304dd1bdcaa821", 0x1d}, {&(0x7f0000000340)="9aa12d39d464f55ef31247870e1036234548b83147427fd401b28aeb00890d4d37b010a1b6040e8ce7c72ba1ce0a110091bdb89b4e0a683441863f2aafe8f55d47a6ecba2696c91411a680715948bcee080577033d194ce95399697d801939d6ece9804f05396a67de349ea30bc6f87f7490d27f7d00fffa48dddc5f39157abd79e3c097d7c2b0ee6041ff", 0x8b}, {&(0x7f0000001b00)="56fa23ff639dbfd9e792de9a48e773c5e29ac2489587e4c488199b381c1479eb5bb8620a10c3daccd21f63f2624fc86c1c7f819524fa7dd378ef5f5ace36959ae55c6388796851a0ef1d3081ac56ee3a4becbf1947887d47de0d7b3fff6788fff1f009d91c15dbb74223c1d267375d804e5250a1f8a4f5d399eb4156125c3b18cf3280e624", 0x85}, {&(0x7f0000000f00)="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", 0x2b3}, {&(0x7f0000000bc0)="82dbdb1c0ac4a57eb7138b9179bdadec42295824c9620000000000000005eda098f51639ae5c78f41f6aab87e7f0a9d8727196a69cdd7604f22db4b02811971d216490ebd0b9256c5bce92130cd9206c8838dcd50a76c669c789a5340ada4060a82111ef6b7c6b9c8d919bed13753a8d338400d4eca643f537c858baba8b27a7a34091e9f8827b4288605670fb52d197b04f7723d2ab7a40bde0c3e071d9dfaa228b89a9a8a9ad3d40bfefea700ecd782d204f8bcd8b6de089c4a178d7ad304d58", 0xc1}, {&(0x7f0000000cc0)="a72eb8c697df01cab5e12979fc54686a6a53411939c341ec4b5292c3b914090c2d311f811519c119f0d3ebd9b9eeb3f329b5dd562706f9387007ab150533a45d86446940394607664c04061e5dbaf8f096f5205ee0c1244e6c4690ccb5ae46d7a65e4f914d4d10054a57d4243632db729c36d5e145bf59c8b8699d00c6adbc8365b524fe813a0cc12c6811fea5205581f4a9d53a481211b5d5de4158c908872e26ac6e6a5e9b22907661ed9c9cc1f1447052a198956fa095d59fcf13a95c622038c35f9c45f292763f90247d2858ec04c6acab02911b982ededcef09ea780cb6382ad04de0e35db659a6e033b100f675588d9aefcfc4", 0xf6}], 0x6}, 0x0) 16:18:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000640)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 1338.181835][T26250] loop1: detected capacity change from 0 to 131072 16:18:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@sndinfo={0x1c}], 0x1c}, 0x0) 16:18:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000003b00)={&(0x7f0000002580)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000003a00)=[{&(0x7f00000025c0)='w', 0x1}], 0x1, &(0x7f0000003ac0)=[@dstaddrv6={0x1c, 0x84, 0xa, @rand_addr=' \x01\x00'}], 0x1c}, 0x100) [ 1338.242558][T26250] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:27 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6464e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:27 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 16:18:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x2, 0x3f, 0x7, 0x400}, 0x8) 16:18:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000440)=ANY=[@ANYBLOB="01"], &(0x7f00000002c0)=0x8) 16:18:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@dstaddrv6={0x1c, 0x84, 0xa, @rand_addr=' \x01\x00'}], 0x1c}, 0x0) 16:18:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000340), &(0x7f0000000400)=0x2c) 16:18:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f00000004c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x38}, 0x0) 16:18:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, 0x0, 0x2c}, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000080), &(0x7f00000000c0)=0x18) 16:18:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000015c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001580)=[@init={0x14}], 0x14}, 0x0) 16:18:27 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r0, 0x0) [ 1338.516977][T26286] loop1: detected capacity change from 0 to 131072 16:18:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f00000000c0)={0x0, 0x7ffe}, 0x8) 16:18:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000280), &(0x7f00000000c0)=0x4) [ 1338.573847][T26286] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:27 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e30afd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), &(0x7f00000000c0)=0x90) 16:18:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@prinfo={0x14}, @sndinfo={0x1c}, @authinfo={0x10}, @sndinfo={0x1c}, @init={0x14}, @prinfo={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}], 0xa0}, 0x0) 16:18:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000400), &(0x7f0000000440)=0x4) 16:18:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) 16:18:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x49}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) 16:18:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x4}, 0x10) 16:18:27 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cdg\x00', 0x4) 16:18:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='cubic\x00', 0x4) [ 1338.693164][T26311] loop1: detected capacity change from 0 to 131072 16:18:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="29c095209d092db8510e6181fc705d2804c64435533a8ec29422f165f8e52a01dfd7d8d5da6dc2f9d7d6ef7547851b70d14e5120662cbe177cbdb63d4b941945f51997d00e98e436032a52554db4cdbd5380d0a440839cf671f96cc33c29dfde98073b66a62aab50d4692bf405ad9f657226c78125c8b0cebe584088e74c7c2e1de7ffb37823d998ecff08c0614ce17b", 0x90}, {&(0x7f00000000c0)="0486f6dc298286f551c611777716aca9691192c2", 0x14}, {&(0x7f0000000180)="6aabbad0f2e1994163738134a1b2a8c7247500"/29, 0x1d}, {&(0x7f0000000500)="0e082ff6b7286730f45bf58bbd04d9d7a8ebcd0fbfd4c64275dd5f9f1cacb6eb7c5d2de2ff388695debcedd5bc42903b4a941313a46e3c11d15d5a43947e5c5ea3c416bac48bbdcb5bd5c145e4da8702efc30d460767e8cf4667a6c808624de5c280458679246fca2d6bb04dac37207b341116673155f7f8c2e1522bec4f11c47a53c4372b3caddffb1b8324f3b77697c349480fdded968e9572a8a3beba8c684cc366e5716311", 0xa7}, {&(0x7f00000005c0)="5610f7ba3b4766e0495b19e3cb20c6bbfe3621102886d782133c47fc4780ff356b9b4d252150551168d1e4f3e2786a129cad0fdc87f315b3992cb11380227efdd9f2ef9a7d40f927da51366115cf4b1b0f7b7929b1c8df3539118972d14c0638aa514ef37518a9edbd8015b3198c0c697c4f861afdc77150336fbde8f760e0415c909ff37f247ceecf600c659633463c5ad21753ef9dbf49bad0c4ac93527c8898942a84a368d4ffc6b39758b20ebf40d907a816082c1ce42da6d0ce1428a553c1d7a3796c3a18", 0xc7}, {&(0x7f00000006c0)="ef8e1e060ece03382b688cf2f0bca6af91627b212937e1f560b1a95a79090ffdc855fc43ff9824b1dd44c5d719bfbaa637e1b3dbc4e9ad366652dd7ece45a991e6513be91ab8351909cf902abdad6665ccea321c402de8bc4e9ecddec422172c813c16de500ecd4fd1514f74a6a3c5368f3874b21daa9639a480d6f4b751dd790b4a1abc8824288543c303a934ffd479b6a987dc5070e4c04a3782f151c681b540a759d0ff7e5b83e93af37ed90a3a9efb29a92d90925f597808a0f2183862abe7d494a1caf2d31efcfe11e9d037bf48eba6a6faa7c8c910", 0xd8}, {&(0x7f0000001ec0)="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", 0x2a6}], 0x7}, 0x20114) 16:18:27 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="91", 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) 16:18:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x98) [ 1338.739970][T26311] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:27 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e325fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x90}, 0x0) 16:18:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000040), &(0x7f0000000100)=0x90) 16:18:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r2}, 0x10) [ 1338.805296][T28675] I/O error, dev loop1, sector 130160 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x18) 16:18:27 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffff, 0x40}, 0x14) 16:18:27 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1c0000008400000004"], 0x90}, 0x105) 16:18:27 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000300), &(0x7f00000003c0)=0x98) 16:18:27 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000180)) 16:18:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040), 0x98) [ 1338.936812][T26346] loop1: detected capacity change from 0 to 131072 [ 1338.974812][T26346] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0x101, &(0x7f0000000380), &(0x7f0000000440)=0x98) 16:18:27 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937cee02146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000000), 0x4) 16:18:27 executing program 4: r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x401, 0x0, 0x2}, 0x10) 16:18:27 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000140)={0x0, 0x9}, 0x8) 16:18:27 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) sendmsg$inet_sctp(r1, &(0x7f00000003c0)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000240)="a8", 0x1}], 0x1, &(0x7f0000000140)=[@init={0x14}, @init={0x14}], 0x28}, 0x0) 16:18:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)=0x14) [ 1339.120902][T26369] loop1: detected capacity change from 0 to 131072 16:18:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={r2, 0xfa}, 0x8) 16:18:27 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000380), &(0x7f00000003c0)=0x8) [ 1339.168434][T26369] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f00000004c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 16:18:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0066c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:28 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000580)="88", 0x1}], 0x1, &(0x7f0000000440)=[@authinfo={0x10}, @sndrcv={0x2c}], 0x3c}, 0x0) 16:18:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x10000, 0x11}, 0x98) 16:18:28 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect(r1, &(0x7f00000000c0)=@un=@file={0xa}, 0xa) 16:18:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) 16:18:28 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000), 0x88) [ 1339.318675][T26401] loop1: detected capacity change from 0 to 131072 16:18:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000280), &(0x7f0000000180)=0xb) 16:18:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) [ 1339.390490][T26401] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:28 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) select(0x40, &(0x7f0000000000)={0x2}, &(0x7f0000000040)={0x3}, 0x0, &(0x7f0000000100)) 16:18:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) 16:18:28 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8602"], 0xa) 16:18:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0076c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0xb}, 0x98) 16:18:28 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="91", 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) shutdown(r0, 0x1) 16:18:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) 16:18:28 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 16:18:28 executing program 5: r0 = socket(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) [ 1339.568141][T26433] loop1: detected capacity change from 0 to 131072 [ 1339.611140][T26433] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 16:18:28 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f00000000c0), &(0x7f0000000180)=0xb0) 16:18:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f00000001c0)=ANY=[@ANYBLOB="01"], 0xf8) 16:18:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0276c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, &(0x7f0000000040)='g', 0x1, 0x20180, &(0x7f0000000080)={0x10, 0x2}, 0x10) 16:18:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:18:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f00000001c0)={r5}, &(0x7f0000000280)=0xb0) 16:18:28 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c}, 0x1c) [ 1339.761255][T26454] loop1: detected capacity change from 0 to 131072 16:18:28 executing program 3: r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, &(0x7f0000000180)={0x10, 0x2}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = dup2(r2, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100)={r5, 0x0, 0x1, '\r'}, 0x9) 16:18:28 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) [ 1339.804043][T26454] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea02a6c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:28 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) close(r0) 16:18:28 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 16:18:28 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) [ 1339.921468][T26482] loop1: detected capacity change from 0 to 131072 [ 1339.951769][T26482] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:28 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x44, 0x0, 0x0, 0x0) 16:18:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={0x0, 0x2, "112c"}, &(0x7f0000000180)=0xa) 16:18:28 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0946c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:28 executing program 5: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=@in={0x10, 0x2}, 0x10) 16:18:28 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f00000004c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) [ 1340.119038][T26503] loop1: detected capacity change from 0 to 131072 16:18:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockname(r0, 0x0, &(0x7f0000000040)) 16:18:29 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000001740)={&(0x7f0000000200)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000240)="a5", 0x1}], 0x1, &(0x7f0000001700)=[@authinfo={0x10}], 0x10}, 0x0) [ 1340.164530][T26503] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x10) 16:18:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x10001}, 0x10) 16:18:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000440)=0x9) 16:18:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f00000023c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000002380)=[@authinfo={0x10}], 0x10}, 0x0) 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@prinfo={0x14}], 0x14}, 0x0) 16:18:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0140a27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:29 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast1}, @prinfo={0x14}, @sndinfo={0x1c}, @sndrcv={0x2c}, @sndrcv={0x2c}, @authinfo={0x10}], 0xbc}, 0x0) 16:18:29 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000240), &(0x7f0000000280)=0x8) 16:18:29 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:18:29 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x10, 0x2}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000100)="55a035d8a75a0d879f02a23fef3e0623d9a01f35202d219d180e7046ef40837ae9ffeecc99442b6e995fbcd69c4bb5965061185b11146d7d756c07f4dadf9f1939b7f474d160abd0f836394f79035680fb8b3aa3b65238c04098d10e262231e087c5723be8b6ba6706f388938df70754615a01f69dbd0ebb92c462db807952d609f8e64b84222ec3f8fd008083a03a06260b118d9ee12bf6d18787f443affcd6bb7cdd80e55c41eb90e91dec49", 0xad}], 0x25f, 0x0, 0x0, 0x104}, 0x104) 16:18:29 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) bind(r1, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) [ 1340.317816][T26524] loop1: detected capacity change from 0 to 131072 [ 1340.353119][T26524] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142327e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) 16:18:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000080), 0x10) [ 1340.463920][T26548] loop1: detected capacity change from 0 to 131072 16:18:29 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000040), &(0x7f0000000080)=0x8) 16:18:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0x8, 0x0, 0x64c}, 0x98) 16:18:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="29c095209d092db8510e6181fc705d2804c64435533a8ec29422f165f8e52a01dfd7d8d5da6dc2f9d7d6ef7547851b70d14e5120662cbe177cbdb63d4b941945f51997d00e98e436032a52554db4cdbd5380d0a440839cf671f96cc33c29dfde98073b66a62aab50d4692bf405ad9f657226c78125c8b0cebe584088e74c7c2e1de7ffb37823d998ecff08c0614ce17b", 0x90}, {&(0x7f00000000c0)="0486f6dc298286f551c611777716aca9691192c2", 0x14}, {&(0x7f0000000180)="6aabbad0f2e1994163738134a1b2a8c7247500"/29, 0x1d}, {&(0x7f00000005c0)="5610f7ba3b4766e0495b19e3cb20c6bbfe3621102886d782133c47fc4780ff356b9b4d252150551168d1e4f3e2786a129cad0fdc87f315b3992cb11380227efdd9f2ef9a7d40f927da51366115cf4b1b0f7b7929b1c8df3539118972d14c0638aa514ef37518a9edbd8015b3198c0c697c4f861afdc77150336fbde8f760e0415c909ff37f247ceecf600c659633463c5ad21753ef9dbf49bad0c4ac93527c8898942a84a368d4ffc6b39758b20ebf40d907a816082c1ce42da6d0ce1428a553c1d7a3796c3a18", 0xc7}, {&(0x7f00000006c0)="ef8e1e060ece03382b688cf2f0bca6af91627b212937e1f560b1a95a79090ffdc855fc43ff9824b1dd44c5d719bfbaa637e1b3dbc4e9ad366652dd7ece45a991e6513be91ab8351909cf902abdad6665ccea321c402de8bc4e9ecddec422172c813c16de500ecd4fd1514f74a6a3c5368f3874b21daa9639a480d6f4b751dd790b4a1abc8824288543c303a934ffd479b6a987dc5070e4c04a3782f151c681b540a759d0ff7e5b83e93af37ed90a3a9efb29a92d90925f597808a0f2183862abe7d494a1caf2d31efcfe11e9d037bf48eba6a6faa7c8c910", 0xd8}, {&(0x7f0000001ec0)="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", 0x2a6}], 0x6}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000880)='E', 0x1}], 0x1}, 0x0) 16:18:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000), &(0x7f0000000180)=0x8) [ 1340.507550][T26548] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x3, 0x3, 0x1, 0x3, 0x5, 0x8, 0x49, 0x0, 0xa6, 0x0, 0x4}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) 16:18:29 executing program 4: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) shutdown(r0, 0x1) 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xb9184f9, 0x4, 0x40}, 0x10) 16:18:29 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, 0x0, 0x2c}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000000), 0x8) 16:18:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x5d) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000500)={r4}, 0x8) 16:18:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142527e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0x8) 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @prinfo={0x14}, @sndinfo={0x1c}, @authinfo={0x10}, @sndinfo={0x1c}, @authinfo={0x10}, @init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}], 0xb8}, 0x0) 16:18:29 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='dctcp\x00', 0x6) 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f00000001c0)={0x0, 0x2, "1f58"}, &(0x7f0000000200)=0xa) 16:18:29 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000640)={&(0x7f0000000480)=@in={0x10, 0x2}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000500)=':', 0x1}], 0x1, &(0x7f0000000600)=[@authinfo={0x10}], 0x10}, 0x0) [ 1340.724182][T26588] loop1: detected capacity change from 0 to 131072 16:18:29 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x16, &(0x7f0000000000)={0x0, 0x8}, 0x8) 16:18:29 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000001f40)={&(0x7f00000018c0)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000001900)="eb", 0x1}], 0x1, &(0x7f0000001e80)=[@init={0x14}, @init={0x14}], 0x28}, 0x0) [ 1340.763958][T26588] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142a27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:29 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f00000000c0), 0x90) 16:18:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0x200}, 0x98) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) [ 1340.869007][T26607] loop1: detected capacity change from 0 to 131072 16:18:29 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x20, &(0x7f0000000000), 0x4) 16:18:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={r2}, 0x8) 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), 0x90) 16:18:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x0) 16:18:29 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockname$inet6(r0, 0x0, &(0x7f0000000280)) [ 1340.958350][T26607] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x280, 0x0, 0x4}, 0x98) 16:18:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142b27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:29 executing program 5: r0 = socket(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000000c0)='z', 0x1}], 0x1, &(0x7f00000020c0)=[{0x10}, {0x10}], 0x20}, 0x0) 16:18:29 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect(r1, &(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c) 16:18:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x70}, 0x0) 16:18:29 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) read(r0, &(0x7f0000000280)=""/215, 0xd7) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) execve(0x0, 0x0, 0x0) 16:18:29 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000340), &(0x7f0000000400)=0x90) 16:18:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, r1}, &(0x7f0000000040)=0x10) [ 1341.097315][T26636] loop1: detected capacity change from 0 to 131072 [ 1341.131349][T26636] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:29 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142d27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f00000001c0), &(0x7f0000000200)=0xc) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000300), &(0x7f0000000140)=0x8) 16:18:30 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="91", 0x1, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x7b) 16:18:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000040)="b4", 0x1}], 0x1, &(0x7f0000000900)=[@sndinfo={0x1c}], 0x1c}, 0x0) 16:18:30 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) 16:18:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000000), 0x10) [ 1341.245402][T26659] loop1: detected capacity change from 0 to 131072 [ 1341.283865][T26659] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7, 0x1, '\a'}, 0x9) 16:18:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@sndinfo={0x1c}, @sndinfo={0x1c}], 0x38}, 0x0) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000380), 0xc) 16:18:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142e27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:30 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x80) 16:18:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0xffff}, 0x10) 16:18:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000180), 0x88) 16:18:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000040), 0x4) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0xf}, 0xc) [ 1341.409611][T26685] loop1: detected capacity change from 0 to 131072 16:18:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r2, 0x84, 0x13, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="0120f0e6"], 0xf8) 16:18:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @sndrcv={0x2c}], 0x48}, 0x0) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 16:18:30 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) [ 1341.459885][T26685] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:30 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0x14) 16:18:30 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x104, &(0x7f0000000100), &(0x7f0000000140)=0x4) 16:18:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0142f27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:30 executing program 5: r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0x8}, 0x10) 16:18:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000280)="1a", 0x1}], 0x1}, 0x0) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0xffff, 0x71}, 0x10) [ 1341.626838][T26719] loop1: detected capacity change from 0 to 131072 16:18:30 executing program 4: r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x401, 0x8, 0x2}, 0x10) 16:18:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f00000000c0), 0x8) 16:18:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000740)=[@dstaddrv6={0x1c, 0x84, 0xa, @rand_addr=' \x01\x00'}], 0x1c}, 0x0) [ 1341.678693][T26719] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={r2}, 0x8) 16:18:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket(0x2, 0x1, 0x0) dup2(r0, r1) connect$inet(r1, &(0x7f0000000240)={0x74, 0x2}, 0x10) getsockname$inet6(r1, 0x0, &(0x7f0000000000)) 16:18:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000000), 0x1) 16:18:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000280)={r3, 0x2, "9c6b"}, &(0x7f00000002c0)=0xa) 16:18:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0143027e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x10}, 0x0) 16:18:30 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) 16:18:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r0, r1) getsockname$inet6(r1, 0x0, &(0x7f00000001c0)) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000000), &(0x7f0000000100)=0x8) 16:18:30 executing program 4: r0 = socket(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) [ 1341.878611][T26753] loop1: detected capacity change from 0 to 131072 16:18:30 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r0, 0x0) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 16:18:30 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x3}, 0x1c) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x1d, &(0x7f0000000000)={0x0, 0x4}, 0x8) [ 1341.991326][T26753] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0xb) 16:18:30 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet(r2, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000040), &(0x7f0000000100)=0x98) 16:18:30 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0144827e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0xffffffffffffff47, 0x2}, 0x4) 16:18:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000440)=ANY=[@ANYBLOB="11"], &(0x7f0000000040)=0x8) 16:18:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) 16:18:31 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000300)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @sndrcv={0x2c}, @authinfo={0x10}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xb0}, 0x0) [ 1342.206136][T26783] loop1: detected capacity change from 0 to 131072 16:18:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, &(0x7f0000000100)="ba", 0x1, 0x0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 16:18:31 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f00000000c0), 0x90) 16:18:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @prinfo={0x14}, @sndinfo={0x1c}, @authinfo={0x10}, @sndinfo={0x1c}, @init={0x14}, @prinfo={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}], 0xbc}, 0x0) [ 1342.291948][T26783] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:31 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x81) 16:18:31 executing program 2: r0 = socket(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000000c0)="7aee9d6ab816f531485eb17eca9a8df584dfca8ac7700d03a7fa0f689060a185a0b2d5910c9405557d80f04de7ca8720db0e10e08c4fd4eb5a72c5c283eb2e8c68c604c914afb4517cb040fa70f87e6646e7ccf8cce908b0b787274e77b0a9bb65a3ebb0b8", 0x65}, {&(0x7f0000000140)="874009458b7da017219cdc90177ded1a68ceeeac5edeb2a0bc", 0x19}], 0x2, &(0x7f00000020c0)=[{0x12, 0x0, 0x0, "ab16eb16259ded11f48b53418c8f978abe8163bc62ad3be9813d9621c2d30fe3bef3e369297b7630bee05b985b9c03ddba9e8ca9dc637f8ce3885beb6ee316060afb4535c3de7cd8f14e69467c4921d2b150838560c8"}, {0x80, 0x0, 0x0, "320c430e1196527f72475ffbde40cee65470f0e316f5eff731321be39c2bc38eeb98fa0622a4480d34ddecc8e921483dba1e2168f2e174c4c553a6e3bbbc0539b4a423fa9c3e32ef03c468c4e5da6be324e91fb0839b90ba8d439a9a86910009999bf69773e65d2a1650ce"}, {0xa8, 0x0, 0x0, "0fe5d79bffdc6b74d116875fab4a2a8a532ed22317ac2da8e9f656cfeb42bc7070e93860028dba6afa72575a19331b17f80a13e2d87bb06177696ce782d7d25f5ff1120a28ec834775300d6d70c8d637451b1303a3cede79077e1029f029e1b1c79eaf152d88dd11ae7f3dc719b3aded1ea403cbaab70eb35f2cced6e9dc73cd7c2c8201ead687d91b03d3b672ca1b10e3af50100af8"}, {0x68, 0x0, 0x0, "57ea6b6c1322cd549960189cb798067542f206b63e84eb8fc3815609c63f457ea0ba3ccdc1e7f327b924aa08202c786186288f4de2190bfe0ba732c2ebab8694638fa28741a0870cec20ec17ad6b2cef567377f585b3"}, {0xf0, 0x0, 0x0, "0d2265073fe2b9319ddb5c7bca6733e5de1a2f5abab2bbeaf5b373d6ed3e3a3cee4cd44fdb8fa43af809146e126e46b9cf5db1cddff69f0326977ba8dc44c5112bbae997c2d24258de5859f1f5e44f317ee1c4f598164ee8eed778a68f7f9797a198986afa6f6d2f68b5d0b20a18f48e9b9aa59608600cccd144c0e4d3fc8e6c1b82b139126fc06506ea0465a63934980fe73ce0ee414bcfc40be96ba6fcb78d00eec287bca9777adeb2d6d9502a28ee274bb19b221860bf8447544da2f497ea12c5c1f5c204a348ce08c9c7381dfc22d9214b15f544e1074003cc80d1"}, {0xf0, 0x0, 0x0, "04030d9c635d227256132048420e82f5302a11d59b85006844b4de608522fb2e8a57e9b3a77f8543bf1737cfa0e7890114cc98eca1beaf5d7758b158215f260dfc57ea6c4a317e92a49b001378e055c5f525b33c21b653f5115957a35cb72dd4484d8658e128307a57365d6ab566b9dd8c0e20226a7cba12ee25d437688eee7083da276adf5668c8b85d6c741367e5f5b4d9b2205817dfb31c3b953573f7d80204890b72cfb1781013f0e8eeae65a57c5805b7258667e2c7afb74a2004369e29deeb686e701529f4e05fb661d8a82cee6464490f3704c34ff10b5c5554"}, {0x108, 0x0, 0x0, "a04f123900f59094163006289158510dc55ba4b1e657cda8df2ef09382e3472f9ea39564213d967abc9b1312a650282995980cd8058fd8fef76a56543b403c36059cd1873e46a637ab8462142ea71491a23143ceab8ebcc400771f81044e51e4b9f938650e7f1225a9c3175ca0a4f587294f22fd720b5d3282b3045f9d321fb228a1bf806ad992dc873040897e048cf5219d904f9480e83846c0db0d5f302de8db630e7457dac2c05f69cba5d7607d37cbccb32ee3c597c393d051237fae5a5cf9805b469fb2c19ac65b4ecaad09d10208d4381f2d466971f01c050d743e5b6e3e36e1b8a5ce3694d95ad69ed8cafaa6ea78ab"}], 0x4d8}, 0x200) 16:18:31 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) 16:18:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2, 0xb9184f9, 0x4, 0x40}, 0x10) 16:18:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0144c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000240)={0x0, 0x7fff}, 0x8) 16:18:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x10}, 0x0) 16:18:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0xb) [ 1342.515775][T26819] loop1: detected capacity change from 0 to 131072 16:18:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) 16:18:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000001c0), &(0x7f0000000140)=0x98) 16:18:31 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f00000002c0)={0x0, 0x0, 0x1}, &(0x7f0000000300)=0x18) 16:18:31 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=""/164, 0xa4}, 0x81) 16:18:31 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffffffe}, 0x10) [ 1342.607967][T26819] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0145827e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:31 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/238, 0xee}, 0x0) [ 1342.742198][T26843] loop1: detected capacity change from 0 to 131072 16:18:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000002d80)="d3", 0x1, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 16:18:31 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@prinfo={0x14}], 0x14}, 0x0) 16:18:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001500)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@sndrcv={0x2c}], 0x2c}, 0x0) 16:18:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) close(r0) [ 1342.820953][T26843] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0145c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 16:18:31 executing program 4: socketpair(0x29, 0x5, 0x2, 0x0) [ 1342.932121][T26862] loop1: detected capacity change from 0 to 131072 16:18:31 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000240)={0x1c, 0x1c, 0x3}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000), 0x98) 16:18:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x71}, 0x10) 16:18:31 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146827e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1342.971286][T26862] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:31 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x7fffffff, 0x110}, 0x98) 16:18:31 executing program 4: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f00000002c0)=ANY=[@ANYRES64], 0x3ef) 16:18:31 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000100), 0x98) 16:18:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) [ 1343.073383][T26880] loop1: detected capacity change from 0 to 131072 16:18:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000000)={r3}, 0x8) 16:18:31 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000100)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x98) [ 1343.141232][T26880] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:32 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) recvmsg(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x60083) 16:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000180)=ANY=[], &(0x7f0000000600)=0x16) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000040), &(0x7f0000000100)=0x8) 16:18:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0147427e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:32 executing program 5: r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100), 0x8) 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@sndrcv={0x2c}], 0x2c}, 0x0) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xeb}, 0x14) 16:18:32 executing program 0: r0 = socket(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000020c0)=[{0x10}], 0x10}, 0x0) 16:18:32 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) shutdown(r0, 0x1) 16:18:32 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="e8", 0x1, 0x20104, 0x0, 0x0) [ 1343.340532][T26912] loop1: detected capacity change from 0 to 131072 16:18:32 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000), 0x88) 16:18:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f00000000c0)) 16:18:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0147527e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1343.410906][T26912] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 16:18:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1c0000008400000004"], 0x90}, 0x105) [ 1343.520597][T26939] loop1: detected capacity change from 0 to 131072 [ 1343.557216][T26939] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000000)={r3}, 0x8) 16:18:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0147a27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x2, 0x0, 0x7}, 0x8) 16:18:32 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000a40)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000740)=[{&(0x7f0000000040)="b4", 0x1}], 0x1, &(0x7f0000000900)=[@sndinfo={0x1c}], 0x1c}, 0x0) 16:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@init={0x14}, @prinfo={0x14}], 0x28}, 0x0) 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x101}, 0x98) 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000001340)=0x10) 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000140)={0x10, 0x2}, 0x10) 16:18:32 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000), 0x88) [ 1343.697768][T26948] loop1: detected capacity change from 0 to 131072 [ 1343.719982][T26948] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffff01, 0x7}, 0x14) 16:18:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca0a64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:32 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000280), &(0x7f0000000200)=0x88) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), &(0x7f0000000080)=0x98) 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@authinfo={0x10}], 0x10}, 0x0) [ 1343.797160][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x14) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 16:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)="80", 0x1}], 0x1}, 0x0) [ 1343.869803][T26983] loop1: detected capacity change from 0 to 131072 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000340), 0x8) 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x8) 16:18:32 executing program 0: setresuid(0x0, 0xee01, 0xee01) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 16:18:32 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="b8", 0x1, 0x20100, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000100)) [ 1343.912450][T26983] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca2564a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:32 executing program 2: syz_emit_ethernet(0x32, &(0x7f0000000dc0)={@broadcast, @random="2b925efb4a80", @val, {@ipv4}}, 0x0) 16:18:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @multicast2}}, @dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x2c}, 0x0) 16:18:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x2, 0x0, 0x41, 0x0, 0x3ff}, 0x98) 16:18:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1f, 0x0, 0x2}, 0x10) [ 1344.023033][T27006] loop1: detected capacity change from 0 to 131072 16:18:32 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000080)="02", 0x1, 0x20190, &(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c) 16:18:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) 16:18:32 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f00000002c0)=ANY=[], 0x3ef) 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xca9}, 0x14) 16:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000002c0), &(0x7f0000000200)=0x98) 16:18:32 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@init={0x14}, @dstaddrv4={0x10, 0x84, 0x9, @multicast1}, @prinfo={0x14}, @sndinfo={0x1c}, @sndrcv={0x2c}, @sndrcv={0x2c}], 0xac}, 0x0) 16:18:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2}, 0x10) [ 1344.094303][T27006] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:32 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca5c64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:32 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) listen(r1, 0x0) 16:18:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x5d) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000000), &(0x7f0000000040)=0x8) 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:18:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), 0x90) [ 1344.207832][T27038] loop1: detected capacity change from 0 to 131072 [ 1344.239195][T27038] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x2}, 0x98) 16:18:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)=ANY=[], &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r3}, 0x10) 16:18:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), 0xc) 16:18:33 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x1c, 0x1c}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 16:18:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca7864a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0xc0) 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\t'], 0x10}, 0x0) 16:18:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), &(0x7f00000000c0)=0x90) 16:18:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x5d) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x14) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@un=@file={0xa}, 0xa) [ 1344.411665][T27064] loop1: detected capacity change from 0 to 131072 16:18:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x10}, 0x0) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@sndrcv={0x2c}, @init={0x14}, @prinfo={0x14}, @dstaddrv4={0x10}, @sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @broadcast}}], 0xc8}, 0x0) 16:18:33 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x20104, 0x0, 0x0) 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000340)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0], &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={r2}, 0x8) 16:18:33 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xf7b}, 0x10) [ 1344.464952][T27064] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f0aa47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x98) 16:18:33 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="9b", 0x1, 0x0, &(0x7f0000000100)={0x1c, 0x1c}, 0x1c) 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x800}, 0x14) 16:18:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7}, 0x14) 16:18:33 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000440), 0x4) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000000c0), 0x8) [ 1344.620033][T27103] loop1: detected capacity change from 0 to 131072 16:18:33 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1344.659663][T27103] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000003c0)={0x0, 0x7ff}, 0x8) 16:18:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 16:18:33 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x90}, 0x105) 16:18:33 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000001c0)='htcp\x00', 0x5) 16:18:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f25a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@init={0x14}], 0x14}, 0x0) 16:18:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x17) 16:18:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)=@in={0x10, 0x2}, 0x10) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:18:33 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f00000002c0)={0x1c, 0x1c, 0x3}, 0x1c) [ 1344.930761][T27133] loop1: detected capacity change from 0 to 131072 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000480), &(0x7f0000000540)=0xb0) 16:18:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)=')', 0x1}], 0x1}, 0x20114) 16:18:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvfrom$inet(r0, 0x0, 0x0, 0x6, 0x0, 0x0) [ 1345.012261][T27133] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:33 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f2ea47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r0, r1) bind(r1, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 16:18:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@sndinfo={0x1c}, @authinfo={0x10}], 0x2c}, 0x0) 16:18:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}], 0x30}, 0x0) 16:18:33 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffff}, 0x14) 16:18:33 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xb) 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000001c0), &(0x7f0000000100)=0x98) 16:18:34 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffffffe, 0x101}, 0x10) [ 1345.156051][T27157] loop1: detected capacity change from 0 to 131072 [ 1345.188098][T27157] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:34 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 16:18:34 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 16:18:34 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) r2 = dup2(r1, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000080)=ANY=[@ANYRES32=0x0], &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 16:18:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f2fa47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:34 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000002c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="ca", 0x1}], 0x1, &(0x7f0000000240)=[@prinfo={0x14}], 0x14}, 0x0) 16:18:34 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000580)="88", 0x1}], 0x1}, 0x0) sendto$inet6(r1, &(0x7f0000000000)='\\', 0x1, 0x0, 0x0, 0x0) [ 1345.325329][T27184] loop1: detected capacity change from 0 to 131072 16:18:34 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000), 0x10) [ 1345.387200][T27184] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:34 executing program 0: r0 = socket(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x1a, &(0x7f0000001800), &(0x7f0000001840)=0x8) 16:18:34 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000300), &(0x7f00000003c0)=0x98) 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xb9184f9}, 0x10) 16:18:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000280), &(0x7f0000000200)=0x98) 16:18:34 executing program 3: r0 = socket(0x2, 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) connect$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c}, 0x1c) [ 1345.510634][T28675] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f5ca47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c) 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @prinfo={0x14}, @sndinfo={0x1c}, @authinfo={0x10}, @sndinfo={0x1c}, @authinfo={0x10}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}], 0xa4}, 0x0) 16:18:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000000), 0x88) 16:18:34 executing program 2: linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0, 0x3400) 16:18:34 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockname$inet(r2, 0x0, &(0x7f0000000080)) 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000440)=ANY=[@ANYBLOB="01fa"], &(0x7f00000002c0)=0x8) [ 1345.618121][T27219] loop1: detected capacity change from 0 to 131072 16:18:34 executing program 0: r0 = socket(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000040)=@un=@file={0xa}, 0xa) 16:18:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 16:18:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x3, 0x3, 0x1, 0x0, 0x5, 0x8, 0x49, 0x8, 0xa6, 0x0, 0x4}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) 16:18:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000), 0x90) [ 1345.688936][T27219] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x1ff, 0x28, 0xfff7, 0x1}, 0x8) 16:18:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64107937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000140)=0x88) 16:18:34 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000440), 0x90) 16:18:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@init={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @local={0xfe, 0x80, '\x00', 0x0}}], 0x30}, 0x0) 16:18:34 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) 16:18:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xb) 16:18:34 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@init={0x14}, @prinfo={0x14}], 0x28}, 0x0) 16:18:34 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0xffffffff}, 0x98) 16:18:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10000}, 0x14) 16:18:34 executing program 0: r0 = socket(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000180)=[{&(0x7f00000000c0)='z', 0x1}], 0x1}, 0x0) [ 1345.869878][T27259] loop1: detected capacity change from 0 to 131072 [ 1345.893878][T27259] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:34 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64247937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:34 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:34 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="91", 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) close(r0) 16:18:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket(0x2, 0x1, 0x0) dup2(r0, r1) connect$inet(r1, &(0x7f0000000240)={0x74, 0x2}, 0x10) getsockname$inet6(r1, 0x0, &(0x7f0000000000)) 16:18:34 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000400)=[{&(0x7f0000000580)="88", 0x1}], 0x1, &(0x7f0000000440)=[@sndrcv={0x2c}], 0x2c}, 0x0) [ 1346.092321][T27283] loop1: detected capacity change from 0 to 131072 16:18:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f00000000c0), &(0x7f0000000100)=0x18) 16:18:34 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) 16:18:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@prinfo={0x14}], 0x14}, 0x0) [ 1346.143022][T27283] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000940)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000840)=[@init={0x14}, @prinfo={0x14}, @dstaddrv4={0x10}, @sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9, @local={0xac, 0x14, 0x0}}, @sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @broadcast}}], 0x9c}, 0x0) 16:18:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f00000002c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) 16:18:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto$inet(r0, &(0x7f0000000000)='F', 0x1, 0x0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 16:18:35 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r0, &(0x7f0000000200)=@in={0x10, 0x2}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a45c37f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000003c0), 0x8) 16:18:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="bc", 0x1}], 0x1, &(0x7f0000000140)=[@authinfo={0x10}], 0x10}, 0x0) 16:18:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x5d) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000a00)={r3}, &(0x7f0000000a40)=0x8) 16:18:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 16:18:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f00000002c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, 0xb) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) dup2(r1, r0) 16:18:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000200), 0xb) [ 1346.369576][T27315] loop1: detected capacity change from 0 to 131072 16:18:35 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000200), &(0x7f0000000240)=0xc) [ 1346.411431][T27315] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:35 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f00000000c0), 0x8) 16:18:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000001380)={0x10, 0x2}, 0x10) 16:18:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a4790af5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:35 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x101}, 0x10) 16:18:35 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000140), 0x8) 16:18:35 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0x100, &(0x7f00000000c0), &(0x7f0000000180)=0xb0) [ 1346.578105][T27340] loop1: detected capacity change from 0 to 131072 [ 1346.610943][T27340] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:35 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000340), &(0x7f0000000400)=0xfe7f) 16:18:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x5d) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000000)={r4}, &(0x7f0000000040)=0x18) 16:18:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa0a815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1346.685921][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:35 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x8001}, 0x14) 16:18:35 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) connect(r1, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) [ 1346.749885][T27362] loop1: detected capacity change from 0 to 131072 16:18:35 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffffffe, 0x101, 0xf7b}, 0x10) 16:18:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa23815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0), 0x98) [ 1346.822961][T27362] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:35 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000500), &(0x7f0000000580)=0x18) 16:18:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x3f, 0x0, 0x400}, 0x8) 16:18:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2, 0x0, 0x0, 0x40}, 0x10) [ 1346.918815][T27380] loop1: detected capacity change from 0 to 131072 16:18:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@authinfo={0x10}], 0x10}, 0x0) 16:18:35 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000)={r2}, &(0x7f0000000040)=0x8) [ 1346.959282][T27380] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:35 executing program 3: mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') 16:18:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000040)=0x1, 0x4) 16:18:35 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa25815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:35 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000100), &(0x7f0000000140)=0x8) 16:18:35 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000340), &(0x7f0000000400)=0x90) 16:18:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 1347.074491][T27399] loop1: detected capacity change from 0 to 131072 16:18:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 1347.128581][T27399] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa2a815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:36 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='cubic\x00', 0x4) 16:18:36 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) [ 1347.171458][T27408] sctp: [Deprecated]: syz-executor.5 (pid 27408) Use of int in maxseg socket option. [ 1347.171458][T27408] Use struct sctp_assoc_value instead sendmsg$inet_sctp(r1, &(0x7f0000000500)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000002580)=[{&(0x7f0000000080)="747d9b655173d201d2bc40c19ff57de0878e821d917f0873698ddc30f2db63c13ec1a7c588a86f1191758648d785d17bed9bb60c952da56329c1a91185a5ebb173607736152d6637ff48600ac681efd6b717ee4001e420249827939d3551e0d60148fa43fc8d85b20106268de532c2e2ff5724f7f77ba49f178aa4b7ae48107de02201e61b8d44bf8698dc839af2e86ef8e27027fe", 0x95}, {&(0x7f0000000140)="ace077", 0x3}, {&(0x7f0000000200)="a3cf56f5b03cc129691b97ec77846e37b5cd6aedcd6d37a63c896300294d3cc567477c9da2431ae0a21c79bae31f63b7257a454ca96529620b320c1c41ae56d19dc2c59a359f7f3878dd26dbd7a87b89ac782bcbd045423cd244428176db190ab6c7c83d40caac9d33163eb519493d57b4598e2db2d4ca5bde778e859160100c86fe631bf40921d2", 0x88}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000000180)="ee1207054837ad69f1d40c86f7896ed617b0ea2e187918653098fc9aacbf21e6268fc12897e899eddce03c72595c2bd1841fc7d5d3", 0x35}, {&(0x7f00000002c0)="f75e225571b263f904c17a048f087e1f52f1f28f1552e9ade173afd3a2806d27e6ec0bd7db198e4f14ff44c6b170a3bb071cff66f074a1f2c08f885953d177d88a70915e0d34e9ce3a4c8ba941219eb2d90f3c51f9a29c76403bb855e406097d9650f26400205f064712a05e55c3998f6addb83863bf525864b56711a1769b4d77857480aab3cefebbd5db90c3335e81ca55833d65c270727649130b18f4b336d94b04f90dcf9bf39a76ded5b4462735885de89fe8a8d92c00f63ee1c3", 0xbd}, {&(0x7f0000000380)="1e1305727f1ab0fbc399ecc1b609186fc731e65b00f8503aea018796e9788c7d9779635f90fa8f336f37f2d03c2967509bcbc25209d8da559b0a2d38bc4ab29d6ff55e45b5b35e745e04eeb789de9cc968084023d124573c884d878a3fe9d1fc89f7ed1498f15d882987e841988097794a9fb917cf34b364ca80635d798ca03b8ac4dab6eb4be7321a5c7208170e4e35af9fdd5146171d", 0x97}, {&(0x7f0000000480)="6663c6ac5bcaf0084cd2bf8dc196ce9c87ccc67dd41f6c488424cc76", 0x1c}, {&(0x7f0000001580)="3fd5908e9d6b34873fbe587ce04a4dc7be8488aea29d44d4303d1d5d145675dd3f5cb468bf0c7ee24408582a6bc6bd85666bced0fd3c1589323e4f0cc5c3d1a87694dfc594428d3882328d9cf90299ec1cc8e148eec7f68a10d793640a2b883efb1b9ff658668eac1e878e93d45d69eb3b051832d1aef834bc5d035eebe4e26e75278d63b855b9e969467cd091e7c199f4b097b7ab609d1050f35f88ba70919b07d88642efaad756b7a949629059464f8f53cfc2ed53c2d0967ee49e06c7753913b500bab0e6c712463966d7f11ad9f38ca8fa4513797c1cc7363312171d6c52e13145a078cb4694d2f44f03a91021e3c020f56c45cbadbbe2976124a83ba2097e70294c33a5bb0b771f5f3e5bc6644fe60587013158725087a6aecd1dd20bdd5017d759257b28b4668e4b5247e291c168e89ed50671e68d1f9502fac7e107f83dbb50d5da7ad3667b973f6f6ccc0ae349d4e9a35e24ac6af0bb954cee52664e532d6958e43b3f7bfe9082473308e65e198bdfd354d931e42f5bec510447d4b3fe461e0de508884338b66ad2fade7e584d4bdbd38aeede17d2082e25a9bee7b7d7d67375cd437eb115c2737938b6342a88c88e8f5b5e72093c12aa41b3cb4348d6263c484e6aea3c34f50edf2d3937ac2be4f12a21018193d599433fb147b6e421c46544f8b1e9717a0cebe7708c7b704099bb243c42344ed4f5c6735be6996f6b4b60df3d4155a5a8f72f538231652af2bf08aae4adef5bc58fef94f1c091e4b2447f13a16ce3372a3d91fab450ec674f582ee6a85b2ac791b7d5636f6929ae28ccaf4a30d061eedaf2558fbb5dafa3800982ceaaf9e61beaa064b6bebb6e49b9d963870e92abec29493776973c1924d3dbdb0cf6290f6fb91cee979ea8e625bacdf49edfd3bc75ec88865717c2cc3a1fcd171c4afa91bb8287c22f96cb87f4ec2d1070151827614960a5282743aa047fb91e613dc3cd8f89a9277da4c1f42f4627bee7f6e90a9190cba67f9f1cb67f4eef580ef6469ea7993753f9c30fa8acd4b848aa7fdbeaeada5169d42673e0ab94b87c11a595c13964d994a65802278249c6dcaacf1498ebf81e5857cda13529c33b0d4d320012eb238d96361af76a79e0f27ab990abbf36942b67e0aecbb31d8cac8a938c1d89aa6e5e50a91820a2cd9995f8a7b2eeeffdbbe1bb7f74914deace1e38f416de8b44853c16fecb5e672d14aa56b57465045e3a4adfc07c220a544f40da94df81e33292d7165548a2196a3cab3501871edd75fe046e357a2f6a4e0e59a2fa0fc561dc0bee824d391eba0af66fa3f1961d610c52c2f72ffba0afd1c9d6d06f95c282181cdfac937a8e92fd31e912039d7c3fcc1f0bf05a858b1f0ebb25fa13c128cd3aec7d1caac673d0b5c66cfc3d167e8ad75d030a4ed84168f5f8b08cd2995ef3bdf3087713930e2ab881082d4a542347d7fcd853cd5d8c2cb04bd8563709421dd5fea25f0b2211e90c4fff835bb71c3d47e1326cc37052a4965dd21c9cba123f94cfd86b182765afd5e1f2f18244768f03b65a46c1359391e36754b935e9e63cc4f2825416660d01b8352ffd76356b84343cb58f9930308859ed1c543a6263c0c9ee29ded1800d07bc98ce537c01c2b90e7024d2cba6350a69c26b91dd5cb2e66f2dd368de9ea3dd931bbda4d3cb71b33cce607e3eabe8c23b14783e4dea7d384cacb778b6ea6aea68aa2d5ddf0141aeab61545544d094b365d90df5082cacecf8e80da38f036bb0dadcafc4d9e77d9ebac273d5346c92adef82de884738a7390d5f2033a0195f3655230921a2ebc0bf3c1d98319f563d12aa71a06a6b0e21b2d0802355f88e51bc73d70abf4d2013d3aea0a422fe28d99037fca80e7aa256c4d67e342b30d319ff794fa67c9c77a5fc19e638ad918c0710438d5e03961805b0f4dd4b009fc35d16dba943ff884982d134e24ad922b89b36c4f4427c2f774857a8c1d2ebaa919aa9694c67d5e5e6229955f5550a8d9c342b94692261e0998b6d276dc0cdeaec4803a3febb1243cc4bafa250e853dc70ec8eacb154b1bab256b53978e45f499d1316d6e56a2db2b2efdc73968c77f5d9f5be39a885c13d61e573418378aa9ee7e9feef100e0e7d270a22eafd57431dbf6ebabf337eaad49f4859a9a845c10e52279ca45f25cf1f6499b48ccf564f2f41c830002bf379b6646dd9dc1cca2cab2de83b449384a307e74dedd2dc717edb83ad607899d21e8175ee4ebf2bbc4fe872f98e57a4f9e624f92d2e21da898303723b0ff72adb7916fb6a63f0225d4b40a0b6bf914bbba857ba5fddaccc30185d2bf00d62b3007a09ca6657cfd74156fc33a1a885c4779e344cb48f38da2e955cfc3530073b690390f726b7692d606e32f24b090d865ba5a656288e2381b381027e7d2b6af8b8f0fc2a0810a224a5ffb9e971a4c3dbaecbe726368bf2ee087e8f7a266d04f339a5901573b8ca9d755df802e0b15708fb02c3001af3e465564350d3f152c15ba2ec6a2f0d794fbe6535e1c19c01d67cd85275455284270a26846cf71563b01c9d72ba9d9de66144480d3a992b31db2d89d27bf812193a30710efc3fe04e1452898cd0b4d346d6e07f01824734883c285dab05fe13a8113200f1bc7a20e811352d401fcc333a8d420d2a9c63a99032014b7d64d7baa7808953fca27db2613132b526b6796d305ed02229a6afe863e46c734d9a1d9e14f774f9407ed5c4d9a42ed2f2408b108b0e6d065f6875fbaf80adb8067b36f43f9da1daf2fa3a028f976b89f1bdac061d6c6e8253455f9558d5adf741397efc3df2edfdc7b7551f35990558de43307edf4dc4dab20f2a248fb96bc91e8bb3afc9ae1fa802f92c2e741b7969db9b4e6d4160a433402f99d794517c6de6b8b6dfafca381141a5cd4f49b22b2e9204ccfb8bfd0c697021800dec481b4a4f25a979117cedbb3de62f5764d961efc733606b539db2db10f5e63ed05e236006b3dad6be432d239dc0f001f3bcbbd2314a4e58bc5156f30f44e417c44736054da4b981bf0ae4923c6b6594aabc257a02e1d2b097c34bb6ff298bb8f7f5b5d5bd0e0367400cd04ffdac540f60fcb68af4c3896b5d40b4c3e1b378641b7d9d15f7eb6eb9326597f009d1a484f3d95b26ce01e699e462faed1b92b1fa94db5214e0ac1c89b3e99c87df7e356cf70cd627010ca0d5cc153443fafb58fda5f911a48d2bf7bfb6b97c5a36af455b2cca236f5915b26a18f60e8edaf445363bfa761e1032c4dd91c3142635bfadc5418c096d6a10c1c681d37037ca2b1672122561f615b93b57ed7a058af8eb47ed12df82c0db65996244aef14ab340c6e1ae6dd563b3c84e534fb8f3f52be4e639ff2b010fcb35c054267ca962055f5df2d86f940d48779dd280c777da60065947c8e1e5a9c0ea429fe20452f1ccd596966fd846f7f5faf3ebebc83559b33e0ad9cd497e42a671e24a3d208cd1d144e0dc4b885a628ff3d7317c9041a57f5cd3607551abde34c31ea8477572c18d6d7b35b6f425d88aa6bb8e1a6eb6f7909845122bc79079ca59194de7840bc52d8f679851637f24c21eaab5cd400f75c2d0bf32a2d4cc03e5193c83ce24bfdbc3acaaf4dbd98229eb8f0af207bad1018814f7d4cda78368dcbc39e249ff45676b9554059aef844aa7e90cfeb96ed137ee204a4c0c187e3f3946371aa5b254b79a220fd6a77da8a04c8e1562116457f444e06e3bfc28d7b0ff02358fb4f4ec3425c4bb7b8a7c99e7c882146f1f5e8eea08d3aea6a4039e2612147229d08d30e8fbe114458fe32b34cf6a64531bd0bf8fd8fc2dfb6fd1c80e2b556647899da3454f997dda38f1aa84f68048a08d6a442991c246d498065b8caddd4c9482d38450e9637397a8ac56f882ed44deb32b07af2df20125f2dc6f28ba5c5653516524b5211b513c07e19d4e88cec15a59b7d40972819ec79508ee74e74b8908f58203f1283a34dbaf40e9c3ef53d26ee86614c9ad67319ece3600502ad228ef5402a8ec93390e8caf20bb6414f945eccbe68725e6a1024b127117855647bfd814eeb1cb32471ef0461dbc0c6b3105edd3210d8b67df7d3ba0caed02b6fff92e5920f231e98916a9357247e7e3c4e0c753c91b21f3d289fd0893ea03f7894996438f9559151f46c1cc06fab3e04d6c60a3d51828d343ce262511a4079a68cda8020d1b73d09ededc6844347bd679a9b6007d93cf2936d27d05390176bab7d56e1d36cd4a88efb41e442c14a3034bb0cc5bfaade55643aa3b788d5617e2c48c27e2051dd484c48971fd38d46423ae48411b87bfd7f42bf51f85862443bf6a18fe7be689a54d535eea50f06b7d67be7d06983627834dfb9baa2c5b1e1d860dfc1ae45b28a236289de792f30f8bf7e660435d0bf93885d84c3a53409985be2e462d71d7acb4b44d3953af9295daa301fc8c182363749bf279c1c41221a125a7b5d41293fcd03811d3581523f4d891c0f100e82b217a46e05ee451b9da23a31ca629c7983086b748d824ec8cde91ec0388020414c78479606b52da4a4534f917681112f88db24be31a76a4cdb2f196afcbde0c59015f533edada043ff5337e0c095eabecb1b893e4b15df99f20c9f8cf26f4cdac21d61d37955922e25326b77574805a8be2a9c66a883a1fa4c225814618a8f8a295f5d1b2bff942c647ffba89f5d2dfbecc0f7171062d10300b1ac4080ba669bf0f1b689427f6f1ab7c195bb452ffd91d8711e7c19343578353a10bcbecaf46eb0b559437", 0xd2c}], 0x9}, 0x0) 16:18:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa2b815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=""/133, 0x85}, 0x80) 16:18:36 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) recvmsg(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/90, 0x5a}, 0x60083) 16:18:36 executing program 4: r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) open$dir(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 16:18:36 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000240)=ANY=[], 0x8) [ 1347.325203][T27429] loop1: detected capacity change from 0 to 131072 [ 1347.341418][T27429] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:36 executing program 3: r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:36 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x95, 0x0, 0x0, 0x0, 0x3}, 0x98) 16:18:36 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 16:18:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000040)=0x20, 0x4) 16:18:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa2d815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:36 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x8, &(0x7f0000000180), &(0x7f0000000200)=0x4) 16:18:36 executing program 3: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000002980)={0x1c, 0x1c, 0x3}, 0x1c) 16:18:36 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000), 0x98) 16:18:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000380), &(0x7f0000000000)=0x90) 16:18:36 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='vegas\x00', 0x6) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='dctcp\x00', 0x6) [ 1347.537559][T27456] loop1: detected capacity change from 0 to 131072 16:18:36 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x90}, 0x105) [ 1347.599364][T27456] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@prinfo={0x14}, @sndinfo={0x1c}], 0x30}, 0x0) 16:18:36 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000000)='cdg\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000040)='htcp\x00', 0x5) 16:18:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa2e815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 16:18:36 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000015c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=[@prinfo={0x14}], 0x14}, 0x0) 16:18:36 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) 16:18:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendmsg$unix(r2, &(0x7f0000001680)={&(0x7f0000000000)=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000001640)=[@rights], 0x10}, 0x0) [ 1347.768929][T27489] loop1: detected capacity change from 0 to 131072 16:18:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="10"], 0x70}, 0x0) [ 1347.814395][T27489] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:36 executing program 5: r0 = socket(0x1c, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000040), 0x10) 16:18:36 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:36 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 16:18:36 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) r2 = dup(r1) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x8) 16:18:36 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000340), &(0x7f0000000400)=0x90) 16:18:36 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0xffffffff, 0x0, 0x2, 0x0, 0x3}, 0x98) 16:18:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa30815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001340)=[@sndrcv={0x2c}], 0x2c}, 0x0) 16:18:36 executing program 3: socket$inet6_sctp(0x1c, 0x5, 0x84) r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f00000002c0)=ANY=[], 0x3ef) 16:18:36 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) [ 1348.089438][T27530] loop1: detected capacity change from 0 to 131072 [ 1348.100123][T27530] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:36 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000140), 0x88) 16:18:36 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa4c815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000000)="0e", 0x1, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 16:18:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000200), &(0x7f00000002c0)=0x98) 16:18:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa58815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000002d80)="d39b2845e7ba3176e4274c88fadfa5c97fcd5e5dc0e3faf8152b08516a85021e4e44df284df341d41d16f5f4940090eb8e4de3d83a9831e0d22ea7d470e904a9b060ebc8a685bda77a67145eff01521c88ea73c9f838e773fc308188c6ee56b9e6afac9d32999f9ba4db09ff4333a648fecd5002dd930b8876bfd5c1491ebb8a9f5f44a17db4a514cc6aabe8d136ef5ed4671fdbd1d80b59f1f876d753fd8793c7b406484d9dfc1a200df23c6daf897fb86aa77562067ca41930a56c10e3790d9009225e109f7a695788a5dc4a568e1348a0ce89d7d55752ee1ac5752a8fd5a4b559790fa4d508802be7fcf9205ad2723fa4a31eb68d138ba93a2f0d0a9fc9a45a44953ff52389a968011e842e14078262e2156926bbd7bb2b18dc17f4da5091b76c5dbc9d532ac21605217c70be4f07131ba2e4a9e13b625532e73de9074bae3396e72c9d64c33aaaa36e613f269c1e1660e60096292d6e4ad591da30042a92ec886e7cf5f361df4b036ee9e3176b4281a8e7310ea1124aad3c3e675fc97693e6367442a3c20ed67c1b7864240afdb4e060e622bc5c0973d314bc5e62bb09cc1334234d2abbd9a64a6df44686e43371b71b82e96add69d3bbee56467b7144bb099bafdd503998852092c6ffc7e27ce7b921c23f04d0ebe48f3cc634dd0005430328f36c34443b7da892dc832827f1efa06e215af738a72390cb915348b1863db47205009adf56e78cff1a43857f10dbbd7779007fc5179bb1f13bcaf7c22661b799b6ee79126df30517d75a34f615935e30f01b234a3a4208c75b3f74b2919980623598548b3afe2759df2101ec6f8020ddf5921cbf6b228818a605bfe6886fba3ea5cdbac89f1196965d8bb9d6ceaa604be52f5fefeb760b5355d96fe635b98660d1342550752f60a230d367efb404e1c90fafdad4a3e10524efe84d29b3ae14cb288da87a0384dbe772bb60b4d892b686fd1b86112ed6d7cbf6ba35dd9d1a2164b9b5830a790daec4ee9a7a22b94389599e8c705cc10e44f6540f1d826d1c46fec33ff4aae5b74f3a24976bcc5fd9ab2303c5443f9e2c761f692f80afbbb8a4a7b76ff7f452c8318208ff03d2303fa75ce8670617846f18316c2a27fe8da0e5e0d58aa0f92f6e2457cd862085d56e0286228ec3d1645c0ecb8d01ea0a9bcaedd84094f12bcb662a04c07b9a4624d13e2381eb266817e4385666eac0cb91c9c5b51deab6a668d423a79dd51ac669ea52cfa7cc889283cb2973ae52660a678616bd08838289b2027c2cd0c698bfed48d429457b1660b3cb6248e01adab39ee79bc8f6ac149e0e4e8474852f0fea47c90efbcbbeb6d6e94d596cc1a3c08b47c41a2503f20fe7f079da45b5d9d2a01f1fc30895c85795542649ed2c4d63f0b59f79fe9b414f7f323d2abc5a78191a364d7c2c21809bfd1eb8cb0b9987537598720dce712e801ee6e89a6a65f014b42173d42791224d61c70eb688c98470478d39da563938a09f9da502de30330da4e547c2a820da5b8bdebfabea8cab8625c9d997f5f256d2ff4f0deeea4fb529dcf93c390f3337cd984f5b32bc58092c2184d94444241bcb7c4fa3e4529aec69d0a74f403fb69cb0cd411ac55f7194974028208309be21def68689e201cde3497b9dc6b607d92bcdbdccbacad76c447829596dab09c29a07515fda24426ae1074933bec5905b136b80c097662b794516975a0107b3c8868756e87fe4b7f87a7a8f35a80f005463e2fb5efccd2f1f25bf075aa680943dba19cdc5b5c87ac0943d17f5966989ad7616f36038611aa5a8a1cdc84b19a4bacafa9f81f99f3ec7f93c2b074ff80aeaf73faff4bdb490259bcdb2ce42d78edc142cc66e75d2a42244a62a8a179379e3aa9462aee19b56ed4eb57bc12c4585e7148440432df9cf82f778e6fe75fc9bbb3696702cc52c571ad065e5959de3f17e2a2b1f6081de3abb5bdc5d602b352cac2b334fec67d4507dc2ebf6718c2f16c95696e03c667193e5921a6daf2aa6a69782f2435294556f02b7ede4468b9ef79ccb579923f7be8b53068b9cfb97912cf5e8021e3697318b2c2aad9813f974e27b12b9d454e33f0401930c7f81acd1af8051180a2112f293095e84e2154c651784d6ec94fedb289df5b7e5ad502fd0c510541bcc9828fda8959b47dbfe915f6035c1142541e5ace74ab492e896d646e56370a0e3edda6661e2888584ef2274fcfcf9df3029ce036a6af73cedd1924b6d5634aa80ecb863fff285345cc904152ebb332ac7a0d99ef5ce0769ebc93d5967058312a3f90e399257d56d10580c446dc93c547c59c63092482f84875869c57413cb8bf22d1709a7be2ca26a973b826f654dcad0f5ef4604838b66d13d33344ff024e2749fe751fe3e6cb8e446462098fd6a824150407fa4252b94e721809ad12e6963a7f456b316958028107540dcb548c06552c21aeacc7896fb55e753382a7f2cdffbee1a43b19898d434a004b590d15e489e940413c07652da22a8cc543f435294b94ec8b294e26ee13e1afb39925f17a57aa7bd6b678a9ce57a9ac322ba73a142d5bda811252d614becea9e8a0f6beac78963d1915edb5c17ba2cff23c85fdef53d2cf7fd22902afe96945126892870017036b4322393309c2af3338dc3a5d1268bff02f3449d6fd43136e2e213310022939c994d008c9301746051162f6509eb48390e57552d15e153c930f8a1894092fa6800bc2beb64562d812ab4651afaaf78b290453453380628fd83b91c64756525a199b7d3f5b652b75943e2dbcf93daae077d989a758b112985047219fc5a89c428d3906f7271de883bab6c88e07b1052b9966b678e638d6de2176a0181150d1c6160ad2843b306835f47ab4d13c4a29a33e9741578633720ad47c3f00a9bebb8b10d54069b6e0addd6ab282e7b6136dc12d94997923834f8740ea69ecc2c7596b9fdac12b939e1cc98bb4e0a6184f5e99b56649bbc603f2c079217a79f4c73f3185495f3da76d74fc5641737dd433d9a99335dc7bfda0b9abc5293c385baf76870ace93ef830586b087cc84584d2e3106e02fa2f891118f197d44d1328443915173c79c24c6a03b3e5159d4fd634c07eb2cbffafb120c11f3197596f9944c24f515186143bbc24d06556eabfa076185e33da2b0ea963c7abc39eb1ab17240f3474370fe0c9fa1269924a7985e5884db6dc327a4f9b15db75c3be1ad2d5aa4c0641009beff2f535caa116665a266389ad03b25eec94fc974dca7fe0a8b79506f2dbb28e99410c4a58a14819f15a6e42e00e6424e987c37e801db36070efe1b3f8f6fca5c22e8e8d1c4bac3925caac2764b1fcae45ab8d6d81d14e4c2069a92289edae16dbee9683e8f85bd15bf93405c1bbcbe97761bbb5f24afff7774e83bee458049be864a455a65ede0d0764c78fb51082d1179f431c420a938c33304b5b47e20060d68ca0cc44f0ba9dadf21d81650c155f09ec4b0097040c9ec5bfd7a4f633e5ef93df4d4bb453bf5aff41bfd0c2514595248410ee5bb3486a1cbfc30ab5f881dbb8a2aad727fdd9cd16b4036d4942cc8c3df6aa4ddc998aeb03c57782b5b7985e66b3f1425da0772435cc8523fe968734ee28f91d324e5a33cbd08b892b46ba8654a2e7b3f190ad5baf3b92430d70734c03245235cf5d1361164ce3326bb39ed4965a654cba2b8a3c41ec00336d8e62643426bbfb6f33b6aebb3ad8c889c55e24f2f8b111ccc87c9c5fe40b43567362c48f3e25b7312fbc4bdbf6e4ecb6cf10d185e66c998c9d732d73d9845fd1bea29c2d20999cc9b5047cd933da5d48b2bc948a508110b5fe599eedb72635f79d479b1d37cbcdd3d608623df9651199baa1083a7fc49ac6fb1c437c09fc723e2a90adae6debe80706e682dfb93827416e3b848d54dd7bf7d87b8eeeeea3d379b7f3b064c9ba9c6ffc4bedf65aee188486bc8ed9a7fa5e33f137d9c23786f53580b6470f87751173f4f9e6bd7a8ed474501d9c70aa4cc98389391ad441e9eabd0672c930b76a92768f415872d34ac6b845805415fd37bcc819d699469e99990f9d2eed6fab36da0f78465c11ec3906756e2a5157295b869d869a11d41ec485cc3c234bb9ee8ffedc4ca82453f5ebfe1e0802fb069b897e597949aea54938c5fa1bf3f9584964ecb63ffee31d548d7c56ce6364cabcadb5e876ee2a47865b3f0e4561023f18bd02e2044b790796dab022a6b4228ab3bab3c62ea7645b71fe27cd65a4196af535b6e5c6f3939200c7e1cb42c5791152c39147e514ede6a749ee38c33f5224d17020868a64aebf3a4aebb57918c93c0595fe8d2a99f8df14db542499e5c57b25a891624090fc9999dc7d291a7049275dd32964334ef9287d4a5026bae541208099a77ccbf355da974b9ee23ee12a6bdb8f918f505d570d7540940984d1be4bc04b13565305d95fbe214e51a8fc95a161ee937b879c7b29970f389dfca2197a51468dd4f8ba65e15fa8efcb86c278eda0a1818f89a75860e538f96e9255052059d158db6cdb5ffa897ca37899ef8a54be961e18407b40d01e87fa0bb932978b85b81ce99e24a9651f4ee4046d6953faf0298acb5ea0aa5e12da3023846b4360af6bece3827a825a405db5f6dd362affd68ec15458f3666c1760999f6ddef399aaee8c464b62ed21c10592a0f557caa2a5e1261edf285166e56f4288fc15350108d268d5958cd6f14525750fc6a21f4540bf6f8d7f840d05960c1aa7b9c71eb71245da304bb52eb260a48bbf623e7395fefc907ff75ae1437e6bc456d5ee46f32577ff8dda3d53b1fc8ec51ac513ab65451e7f058d2dc711e6b356cf08f00b1d17726287746e59f6b76c8488ba9812c4c61aca170d128ea7cb4965f53d50f33058321811d0e2192cabacf03eefe66b0358169972b20622fe93238b41a7875f368a98a5965e9d8d2c0925fc69360b8ac0e60c55a384aff8c82aa41b2028b823428aef06d77483f3a04a11f839258071dfe92ec4662c3020cc930557d1ead68f7463c34500533c11baf994b66703d2a9b04660d6023576a9737c0014d702f796e260a8c32a6a5930e8409592e83c1e9fe9bbbb99977df9e747f06cf2dab4df0d157af7a5358013160dcd78d75c6d32d9707aa48cc044389cd5fc4fdd4efeb46244061e821ae3a6191c8e69213e6e9f2b4b8924042927d21d678d50b35f008b8ed00ed781bf958ac661ed63dc713f521769f040d795d66d96d64008923e6dfcb9935d6e97950a63ec25f3692ca3d767bbcec0e9c2686e28f08f6d3fb57410ad322b4f6b6ced778c65e01fe274333d3c29c0241e132d33dac6243c41c2f90b4f85db0774e14d5dea9058701970a2e3a1a6c3e30b7e8f7ecce4d9d843808a8e2ba1cab1420931418c2ba948367ef1c1752a4d0a82db867b930c2f42f4a070999b5d2f68634a7427dedbc8c26104814155f1870ceb7322ca15b743c271b91653807f4f54a89f1b11005428a4a663cf11dedfe3a43b4bfd29e77f2d6d6617453b61cc845e07ead822325a5ddb8ff0d2a5c85707262c3d6243350cfe8bd0f11d54a3a0341ef2fa9ab5fdc4628d0260790120d1ce907e640144a28f5d6d070b96395d092aaeca71224a0520f77bcbc7f47ce092b78feded8fefeca76b91b8c001921e5be145bf779da6c1daec1d32597b88bb13774acf70fa1a3f9d4b9476b17c244959403387a6889b8cd07e90c0ca7d911e144cf6d18bee5feb915ca1d60faef2d6d1fef6fc1c4f7298f88f85c8816f71f92ff9e14ab4bc37648b", 0xff1, 0x109, &(0x7f0000000040)={0x1c, 0x1c}, 0x1c) 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@init={0x14}, @sndrcv={0x2c}], 0x40}, 0x0) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000001c0)=0x88) 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 16:18:37 executing program 0: r0 = socket(0x1c, 0x10000001, 0x0) close(r0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x10, 0x2}, 0x10) 16:18:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000040)={0x0, 0x5}, 0x8) 16:18:37 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) read(r0, &(0x7f0000000280)=""/215, 0xd7) execve(0x0, 0x0, 0x0) 16:18:37 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x8e}, 0x98) 16:18:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:37 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x10) [ 1348.320109][T27558] loop1: detected capacity change from 0 to 131072 [ 1348.344789][T27558] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa5c815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffff01}, 0x14) 16:18:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) sendto$inet(r2, &(0x7f0000000140)="ad", 0x1, 0x0, &(0x7f0000000880)={0x10, 0x2}, 0x10) 16:18:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0x11}, 0x98) 16:18:37 executing program 5: r0 = socket(0x1c, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000280), 0x4) [ 1348.454535][T27581] loop1: detected capacity change from 0 to 131072 16:18:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000180)='dctcp\x00', 0x6) 16:18:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)=ANY=[@ANYRES32=0x0], &(0x7f00000000c0)=0x5d) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x15, &(0x7f0000000100)={r3}, &(0x7f0000000140)=0x8) [ 1348.511279][T27581] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa63815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000200), 0x14) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x40}, 0x10) 16:18:37 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) recvmsg(r1, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x65f50f1601fa521c) [ 1348.565537][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000500)={&(0x7f00000004c0)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000008400000009000000e000e502140000008400000007"], 0x38}, 0x0) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), 0xb) 16:18:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x14, &(0x7f0000000000)={0x1, [0x0]}, 0x6) 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x7fffffff, 0xffff}, 0x10) [ 1348.629471][T27609] loop1: detected capacity change from 0 to 131072 16:18:37 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x2}, 0x98) [ 1348.679841][T27609] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa64815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffffffe, 0x0, 0xf7b}, 0x10) 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000140), 0x88) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x4, 0x10}, 0x98) 16:18:37 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000002580)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000580)="a2", 0x1}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="1c000000840000000480000305000012fb0900000700ba51", @ANYRES32=0x0, @ANYBLOB="1400000084"], 0x30}, 0x0) 16:18:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x28, &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=0x8) 16:18:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa68815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 16:18:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280), &(0x7f0000000340)=0x98) 16:18:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000000), 0x10) 16:18:37 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, 0x0, 0x2c}, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000003840)=""/74, 0x4a}], 0x1) 16:18:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000014c0)=[@sndrcv={0x2c}], 0x2c}, 0x0) 16:18:37 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000400)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000), 0x98) [ 1348.916030][T27650] loop1: detected capacity change from 0 to 131072 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_int(r0, 0x0, 0x41, 0x0, &(0x7f0000000140)) 16:18:37 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x3, 0x3, 0x0, 0x3, 0x5, 0x8, 0x49, 0x8, 0xa6, 0x0, 0x4}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) [ 1348.961827][T27650] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000003c0)={0x0, 0x7ff, 0x1, "b4"}, 0x9) 16:18:37 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa69815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:37 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x1, 0x0, 0x101}, 0x98) 16:18:37 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000100)="91", 0x1, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) sendto(r0, 0x0, 0x0, 0x109, 0x0, 0x0) sendto(r0, &(0x7f0000000000)="e8", 0x1, 0x20104, 0x0, 0x0) 16:18:37 executing program 2: r0 = socket(0x1, 0x5, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) dup2(r1, r0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x6, 0x1, '\r'}, 0x9) 16:18:37 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f0000000180)={r2}, &(0x7f0000000040)=0x18) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000280)={0x0, @in, 0x0, 0x0, 0x41}, 0x98) 16:18:37 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=@in={0x10, 0x2}, 0x10) 16:18:37 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x3, 0x3, 0x1, 0x3, 0x5, 0x8, 0x49, 0x8, 0xa6, 0x0, 0x4}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) [ 1349.117775][T27686] loop1: detected capacity change from 0 to 131072 16:18:38 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000340), &(0x7f0000000400)=0xfe7f) 16:18:38 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f00000000c0), 0x8) 16:18:38 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000040), &(0x7f0000000140)=0x98) 16:18:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x3}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) [ 1349.179065][T27686] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa6c815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f00000005c0)={0x0, @in, 0x0, 0x0, 0x203}, 0x98) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000000)=0x20, 0x4) 16:18:38 executing program 3: socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000040)='S', 0x1}], 0x1, &(0x7f0000000100)=ANY=[], 0x68}, 0x0) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000a00), &(0x7f0000000a40)=0x8) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000040)=0x7, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/13, 0xd}, 0x0) 16:18:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f00000002c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f00000000c0), 0xb) 16:18:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000000), &(0x7f00000000c0)=0x98) [ 1349.334248][T27721] loop1: detected capacity change from 0 to 131072 16:18:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, &(0x7f0000000100)="c0", 0x1, 0x0, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 16:18:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 16:18:38 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x4f, 0x0}, 0x0) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @prinfo={0x14}, @sndinfo={0x1c}, @authinfo={0x10}, @sndinfo={0x1c}, @authinfo={0x10}, @init={0x14}, @prinfo={0x14}], 0xb0}, 0x0) [ 1349.412286][T27721] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa6f815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x800, 0xeb}, 0x14) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f0000000040), 0xc) 16:18:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000001100), &(0x7f00000000c0)=0x4) 16:18:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000000), &(0x7f0000000100)=0x8) 16:18:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x1f, 0x10001, 0x2}, 0x10) 16:18:38 executing program 4: socket(0x1c, 0x1, 0x84) 16:18:38 executing program 2: r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) open$dir(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 16:18:38 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000240), &(0x7f0000000280)=0x8) 16:18:38 executing program 5: r0 = socket(0x1c, 0x1, 0x84) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2}, 0x10) 16:18:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) sendmsg$inet_sctp(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000008400000009000000e000e502140000008400000007"], 0x38}, 0x0) [ 1349.629124][T27764] loop1: detected capacity change from 0 to 131072 [ 1349.658832][T27764] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x6, 0x0, 0x8, 0x0, 0x64c}, 0x98) 16:18:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa73815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0xffff, 0x10000, &(0x7f0000000000), 0x4) [ 1349.738050][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1349.779892][T27786] loop1: detected capacity change from 0 to 131072 16:18:38 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), 0x98) 16:18:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000)=ANY=[], 0x8) 16:18:38 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000000)={0x0, @in, 0x0, 0x0, 0x8e}, 0x98) [ 1349.802701][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 16:18:38 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f0000000540)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000140), 0x8) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) 16:18:38 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) [ 1349.852406][T27786] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1349.861249][T28675] Buffer I/O error on dev loop1, logical block 16368, async page read 16:18:38 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa74815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:38 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x7fffffff, 0x0, 0x71}, 0x10) 16:18:38 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 16:18:38 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 16:18:38 executing program 3: setresuid(0x0, 0xee01, 0xee01) r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, 0x0) [ 1350.011043][T27808] loop1: detected capacity change from 0 to 131072 16:18:38 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2, 0x0, 0x4}, 0x10) 16:18:38 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 16:18:38 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000200)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)="29c095209d092db8510e6181fc705d2804c64435533a8ec29422f165f8e52a01dfd7d8d5da6dc2f9d7d6ef7547851b70d14e5120662cbe177cbdb63d4b941945f51997d00e98e436032a52554db4cdbd5380d0a440839cf671f96cc33c29dfde98073b66a62aab50d4692bf405ad9f657226c78125c8b0cebe584088e74c7c2e1de7ffb37823d998ecff08c0614ce17b", 0x90}, {&(0x7f00000000c0)="04", 0x1}], 0x2}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000880)='E', 0x1}], 0x1}, 0x0) [ 1350.091543][T27808] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:38 executing program 4: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$damon_schemes(r0, &(0x7f00000002c0), 0x7ffffffff000) 16:18:38 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000200)=@raw={0xfe, 0x0, "eb46f4ad3154"}) 16:18:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4a, 0x0, 0x3) 16:18:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-des3_ede-asm\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) [ 1350.159232][T28675] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa75815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:39 executing program 5: openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 16:18:39 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f0000000180)={0x10, 0x2}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x10, 0x2}, 0x10) 16:18:39 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f00000000c0)) 16:18:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000005240)={0x0, 0x0, &(0x7f00000051c0)=[{&(0x7f0000005040)={0x24, 0x3a, 0x1, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@loopback}]}, 0x24}], 0x1}, 0x0) 16:18:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1) 16:18:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x84, 0x4, 0x0, 0x7ffff) [ 1350.253116][T27841] loop1: detected capacity change from 0 to 131072 [ 1350.264376][T28675] I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:39 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x48, 0x0, 0x3) 16:18:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000400)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000480)=0x78) 16:18:39 executing program 0: r0 = socket(0xa, 0x6, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, 0x0) [ 1350.307808][T27841] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1a, 0x0, 0x4) 16:18:39 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r0) 16:18:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa78815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) connect$qrtr(r0, 0x0, 0x0) 16:18:39 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x11, 0x0, 0x3) 16:18:39 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @bcast, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x0, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) [ 1350.385009][T28675] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:39 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000080)=@n={0x1, 0x0, @generic}) 16:18:39 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3, 0x0, 0x4) 16:18:39 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f00000002c0)=@n={0x5, 0x0, @generic}) 16:18:39 executing program 4: r0 = socket(0x1, 0x2, 0x0) connect$pppl2tp(r0, 0x0, 0x0) 16:18:39 executing program 0: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$damon_schemes(r0, &(0x7f0000000000), 0x66) write$damon_schemes(r0, 0x0, 0x0) [ 1350.443556][T27866] loop1: detected capacity change from 0 to 131072 16:18:39 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x0) read$sequencer(r0, 0x0, 0x0) 16:18:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="040300002300010026bd7000fbdbdf250000000005001900ff00000024000900d6010000000000001f00000000000000000000800000000007000000003115ac67c3"], 0x304}}, 0x0) 16:18:39 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) accept$packet(r0, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0xfffffe57) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"/534], 0x304}, 0x1, 0x0, 0x0, 0x480c0}, 0x4880) [ 1350.495819][T27866] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa7a815de85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:39 executing program 0: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$damon_schemes(r0, &(0x7f0000000000), 0x66) write$damon_schemes(r0, 0x0, 0x0) 16:18:39 executing program 2: r0 = socket(0x2c, 0x3, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x5, 0x0, 0x3) 16:18:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x14, 0x0, 0x4) [ 1350.557126][T27887] netlink: 708 bytes leftover after parsing attributes in process `syz-executor.3'. 16:18:39 executing program 0: r0 = socket(0xa, 0x5, 0x0) getsockname$qrtr(r0, 0x0, &(0x7f0000000800)) 16:18:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x2b, 0x0, 0x4) 16:18:39 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4c, 0x0, 0x3) 16:18:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000840)=@newtfilter={0x478, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {}, {0x8}}, [@filter_kind_options=@f_basic={{0xa}, {0x448, 0x2, [@TCA_BASIC_POLICE={0x444, 0x4, [@TCA_POLICE_RATE={0x404}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x8, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0xafa5}}}]}]}}]}, 0x478}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20020080, &(0x7f0000000080), 0x10) 16:18:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="04030000230001"], 0x304}}, 0x0) [ 1350.605688][T27894] netlink: 708 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1350.624073][T27899] loop1: detected capacity change from 0 to 131072 16:18:39 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000080)=@l={0x92, 0x0, 0xc0}) 16:18:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x20) 16:18:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) [ 1350.690726][T27899] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1350.699458][T27910] netlink: 752 bytes leftover after parsing attributes in process `syz-executor.4'. 16:18:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70810ae85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:39 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1e, 0x0, 0x4) 16:18:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@mcast2}, {@in=@empty}, @in6=@local}}}, 0xf8}}, 0x0) 16:18:39 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$SNDCTL_SEQ_RESET(r0, 0x5100) [ 1350.742881][T28675] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:39 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'tunl0\x00'}) 16:18:39 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x143001) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040), 0x2) 16:18:39 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1d, 0x0, 0x4) 16:18:39 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4d, 0x0, 0x4) 16:18:39 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x84, 0x4, 0x0, 0xfd9d) 16:18:39 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1d, 0x0, 0x4) [ 1350.824319][T27927] loop1: detected capacity change from 0 to 131072 [ 1350.858845][T27927] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:39 executing program 0: r0 = socket(0xa, 0x5, 0x0) sendmsg$qrtr(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="58000000000000002c01000005000000145c00f9423043f0937dc073dce14cd696eb55867803c0e96796abe60921bd18ea8c8169a494e518d1876f0fafb71225a6965a35909c2138758c7d995ccbed7be8e847dcd119ed00000000000000d8"], 0x440}, 0x38) 16:18:39 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x16, 0x0, 0x4) 16:18:39 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89a0, &(0x7f0000000040)={0x3, @bcast, 0xffffffffffffffff}) 16:18:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) 16:18:39 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) accept$alg(r0, 0x2, 0x0) 16:18:39 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa708125e85488b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:39 executing program 3: r0 = socket(0x1, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) 16:18:39 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x890b, &(0x7f0000000000)) 16:18:39 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3c, 0x0, 0x3) [ 1351.037559][T27954] loop1: detected capacity change from 0 to 131072 16:18:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) 16:18:39 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0, 0xffffff7f00000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x38) 16:18:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x2, 0x0, 0x0) 16:18:39 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0xffffff7f}, 0x38) 16:18:39 executing program 5: socket(0x26, 0x5, 0xb3) 16:18:39 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x5, 0x0, 0x4) [ 1351.101324][T27954] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:39 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000200), 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 16:18:39 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000080)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xffffffffffffffff}) 16:18:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de80a88b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539esp(rfc3686(xts(ecb(arc4)-generic)),digest_null)\x00'}, 0x58) 16:18:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8912, &(0x7f0000000000)) 16:18:40 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x13, 0x0, 0x3) 16:18:40 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x10, 0x0, 0x4) 16:18:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-arm64\x00'}, 0x19) read$sequencer(0xffffffffffffffff, 0x0, 0x0) 16:18:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8912, &(0x7f0000000000)) 16:18:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$sequencer(r0, &(0x7f0000000100)=""/119, 0xfffffffffffffcf0) 16:18:40 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840), 0x100001ff}, 0x38) 16:18:40 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4b, 0x0, 0x3) [ 1351.276501][T27994] loop1: detected capacity change from 0 to 131072 16:18:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x890c, &(0x7f0000000000)) [ 1351.357680][T27994] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85e88b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:40 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3c, 0x0, 0x4) [ 1351.481007][T28018] loop1: detected capacity change from 0 to 131072 [ 1351.510376][T28018] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:40 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={{0x3, @default}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 16:18:40 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f00000000c0), 0x4302, 0x0) 16:18:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[], 0x6c0}}, 0x0) 16:18:40 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000200)=@e={0xff, 0x1}) 16:18:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85406b6d74f9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="34a1ecca186938bc0b1635610991209e526f323a6cd1d0139702cb49f48fcfb45580ccfb2da42b13ce8931a91d7bbef406dbdfed284bb12da2b6cd727fad22ab5098e96749cdc033d37e0eccb26717dfee0b2df102ccb4e11315da0febc3919fae46eaedf2af5c3dd18d92c5e3f1ac7f44ec0c602221594a", 0x78) 16:18:40 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x2, 0x0, 0x4) 16:18:40 executing program 2: r0 = socket(0x15, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={{0x3, @default}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) 16:18:40 executing program 3: io_setup(0x80, &(0x7f0000000340)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, 0x0) 16:18:40 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4e, 0x0, 0x4) 16:18:40 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'geneve1\x00', 0x80000001}) [ 1351.668105][T28027] loop1: detected capacity change from 0 to 131072 [ 1351.701286][T28027] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:40 executing program 2: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$damon_schemes(r0, 0x0, 0x0) 16:18:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:18:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 16:18:40 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r0, 0xc074510c, &(0x7f0000000100)={"d17e7a3aaa7b6b91536dce66f18229ee20a5496b6b28e6fec8aff890705b"}) 16:18:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0xc004510e, 0x0) [ 1351.752402][T28042] geneve1: mtu less than device minimum 16:18:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d70a9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:40 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000200)=@raw={0x8, 0x0, "43953967f292"}) 16:18:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) 16:18:40 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000000)=@l={0x92, 0x0, 0xd0}) 16:18:40 executing program 4: r0 = socket(0x1, 0x5, 0x0) recvmsg$qrtr(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x38, 0x0) 16:18:40 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x8916, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:40 executing program 2: r0 = socket(0x2a, 0x2, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) 16:18:40 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000), 0x22441, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 16:18:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) sendmsg$qrtr(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x440}, 0x38) 16:18:40 executing program 0: r0 = socket(0x15, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1351.883230][T28063] loop1: detected capacity change from 0 to 131072 16:18:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) 16:18:40 executing program 0: syz_open_dev$audion(&(0x7f0000000080), 0x0, 0x80280) [ 1351.941658][T28063] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1351.979820][T28078] misc userio: No port type given on /dev/userio 16:18:40 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d75e9ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:40 executing program 4: r0 = socket(0x2, 0x2, 0x1) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 16:18:40 executing program 0: r0 = socket(0xa, 0x5, 0x0) recvmsg$qrtr(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x38, 0x0) 16:18:40 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x143001) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040), 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080), 0x2) 16:18:40 executing program 5: r0 = socket(0x1e, 0x5, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) 16:18:40 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000040)=@v={0x93, 0x0, 0x80, 0x0, @generic}) 16:18:40 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x49, 0x0, 0x4) 16:18:40 executing program 0: r0 = socket(0x2, 0x2, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:40 executing program 2: r0 = socket(0xa, 0x6, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1352.118122][T28095] loop1: detected capacity change from 0 to 131072 16:18:40 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000180)={'wlan1\x00', 0x29ff}) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 16:18:40 executing program 3: r0 = socket(0x29, 0x5, 0x0) accept4$llc(r0, 0x0, 0x0, 0x0) [ 1352.160266][T28095] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d7649ea28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1352.213428][T28106] wlan1: mtu greater than device maximum [ 1352.231957][T15660] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1352.247069][T28110] loop1: detected capacity change from 0 to 131072 [ 1352.258300][T15660] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1352.270924][T28110] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1352.282699][T15660] Buffer I/O error on dev loop1, logical block 16368, async page read [ 1352.326502][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1352.337070][T28675] Buffer I/O error on dev loop1, logical block 16368, async page read 16:18:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(seed)\x00'}, 0x84) 16:18:41 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x31, 0x0, 0x3) 16:18:41 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x143001) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040), 0xfffffdef) 16:18:41 executing program 3: r0 = socket(0x1e, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 16:18:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f10a28e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:41 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x5, 0x0, 0x3) 16:18:41 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3e, 0x0, 0x4) 16:18:41 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x80045105, 0x0) 16:18:41 executing program 4: r0 = socket(0x1, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:41 executing program 3: r0 = socket(0x1, 0x5, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'veth0_virt_wifi\x00'}) 16:18:41 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1b, 0x0, 0x4) [ 1352.952747][T28118] loop1: detected capacity change from 0 to 131072 [ 1352.971213][T28118] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:41 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000200)=@raw={0x3, 0x0, "43953967f292"}) 16:18:41 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9e228e4b4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:41 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1a, 0x0, 0x3) 16:18:41 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x36, 0x0, 0x4) 16:18:41 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x10d, 0xd, 0x0, 0x3) [ 1353.022364][T28126] veth0_virt_wifi: mtu less than device minimum 16:18:41 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x38, 0x0, 0x3) 16:18:41 executing program 3: r0 = socket(0xa, 0x5, 0x0) recvfrom$netrom(r0, 0x0, 0x0, 0x40010102, 0x0, 0x0) 16:18:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="04030000230001"], 0x304}, 0x300}, 0x0) 16:18:41 executing program 5: r0 = socket(0x1, 0x5, 0x0) connect$qrtr(r0, 0x0, 0x0) 16:18:41 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x8912, &(0x7f0000000040)={0x3, @bcast, 0xffffffffffffffff}) 16:18:41 executing program 0: syz_open_dev$audion(&(0x7f0000000000), 0x1, 0x3) 16:18:41 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000100)={'batadv0\x00'}) 16:18:41 executing program 3: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x8918, 0x0) [ 1353.092764][T28140] loop1: detected capacity change from 0 to 131072 [ 1353.123391][T28140] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e5e4f73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00'}}) 16:18:42 executing program 3: r0 = socket(0xa, 0x3, 0x3) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x6, 0x0, 0x4) 16:18:42 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x43, 0x0, 0x3) 16:18:42 executing program 0: r0 = socket(0x1, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x26) 16:18:42 executing program 5: r0 = socket(0xa, 0x6, 0x0) getsockname$qrtr(r0, 0x0, &(0x7f0000000080)) 16:18:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000230001"], 0x304}}, 0x0) 16:18:42 executing program 4: r0 = socket(0xa, 0x3, 0xff) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:18:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x38) 16:18:42 executing program 2: r0 = socket(0x1, 0x5, 0x0) bind$netrom(r0, 0x0, 0x0) 16:18:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="2d6a7102166e08eb26353a8a390b5e7dd07563d904faca6b8d74a72d8a2f6c653dcbbc39a6c2a67ebd92d628647f34b148b7d6bfa2cecb27fdb626b4e1c03f4086", 0x5002) 16:18:42 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x890b, &(0x7f0000000040)={0x3, @bcast, 0xffffffffffffffff}) [ 1353.297644][T28173] loop1: detected capacity change from 0 to 131072 [ 1353.339039][T28173] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b0a73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:42 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x19, 0x0, 0x3) 16:18:42 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x10, 0x0, 0x4) 16:18:42 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x35, 0x0, 0x4) 16:18:42 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x6, 0x0, 0x4) 16:18:42 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f00000002c0)=@t={0x81, 0x3}) 16:18:42 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="040300002300010026bd7000fbdbdf250000000005001900ff00000024000900d6010000000000001f00000000000000000000800000000007000000003115ac67c3"], 0x304}}, 0x0) 16:18:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) 16:18:42 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x38) 16:18:42 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000000480)=[{0xffffffffffffffff}], 0x1}, 0x38) 16:18:42 executing program 3: r0 = socket(0xa, 0x6, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x10d, 0x5, 0x0, 0x4) 16:18:42 executing program 5: r0 = socket(0xa, 0x6, 0x0) recvmsg$qrtr(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x38, 0x0) [ 1353.505188][T28199] loop1: detected capacity change from 0 to 131072 [ 1353.521931][T28206] netlink: 708 bytes leftover after parsing attributes in process `syz-executor.2'. 16:18:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b5e73fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:42 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0xb, 0x0, 0x4) 16:18:42 executing program 4: r0 = socket(0x25, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={{0x3, @bcast}, [@default, @default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @default]}, 0x48) 16:18:42 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4, 0x0, 0x4) 16:18:42 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) [ 1353.557326][T28199] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="2d6a7102166e08eb26353a8a390b5e7dd07563d904faca6b8d74a72d8a2f6c65", 0x20) 16:18:42 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x100000000000000}, {0x0}], 0x9}, 0x38) 16:18:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40045108, &(0x7f00000002c0)=@n={0x5, 0x0, @generic}) 16:18:42 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="040300002300010026bd7000fbdbdf250000000005001900ff00000024000900d6010000000000001f00000000000000000000800000000007000000003115ac67"], 0x304}}, 0x0) 16:18:42 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r0, &(0x7f0000000640)={{0x3, @null}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) 16:18:42 executing program 5: r0 = socket(0xa, 0x1, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0x61) [ 1353.680391][T28231] netlink: 604 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1353.701308][T28222] loop1: detected capacity change from 0 to 131072 [ 1353.716397][T28222] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1353.744635][T28236] ax25_connect(): syz-executor.3 uses autobind, please contact jreuter@yaina.de 16:18:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b6473fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f00000002c0)=@echo=0x20007ad) 16:18:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) 16:18:42 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000000)=@e={0xff, 0xc}) 16:18:42 executing program 3: r0 = socket(0x2, 0x1, 0x0) getsockname$qrtr(r0, 0x0, &(0x7f0000000180)) 16:18:42 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @bcast, 0x0, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:42 executing program 5: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, 0x0) 16:18:42 executing program 3: r0 = socket(0xa, 0x6, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'veth0_virt_wifi\x00'}) 16:18:42 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x80045105, &(0x7f00000002c0)=@n={0x0, 0x0, @generic}) 16:18:42 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000080), 0x0, 0x19ce450056021322) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000040), 0x2) [ 1353.869463][T28249] loop1: detected capacity change from 0 to 131072 16:18:42 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000080), 0x0, 0x0) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) [ 1353.945043][T28249] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:42 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f0afb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:42 executing program 5: r0 = socket(0xa, 0x6, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x17) 16:18:42 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, @null, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) 16:18:42 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, &(0x7f00000005c0)=0x80000001) 16:18:42 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x8936, 0x0) 16:18:42 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$damon_schemes(r0, &(0x7f00000002c0)={0x0, 0x0, 0x20, 0x20, 0x0, 0x249f356a}, 0x66) 16:18:42 executing program 3: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89a0, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:42 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000000)=@e={0xff, 0xd, 0x0, 0x0, @generic}) 16:18:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40045108, &(0x7f00000002c0)=@n={0x0, 0x0, @generic}) 16:18:42 executing program 2: r0 = socket(0xa, 0x6, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$sock_qrtr_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 16:18:42 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000), 0x0, 0x40401) write$cgroup_type(r0, &(0x7f0000000180), 0x9) [ 1354.051515][T28275] loop1: detected capacity change from 0 to 131072 16:18:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="040300002300010026bd7000fbdbdf250000000005001900ff00000024000900d6010000000000001f00000000000000000000800000000007000000003115ac67c3"], 0x304}}, 0x0) [ 1354.112953][T28275] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1354.137908][T28290] netlink: 708 bytes leftover after parsing attributes in process `syz-executor.5'. 16:18:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f1bfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:43 executing program 3: socket(0x29, 0x5, 0x405) 16:18:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="34a1ecca186938bc0b1635610991209e526f323a6cd1d0139702cb49f48fcfb45580ccfb2da42b13ce8931a91d7bbef406dbdfed284bb12da2b6cd727fad22ab5098e96749cdc033d37e0eccb26717dfee0b2df102ccb4e11315da0febc3919fae46eaedf2af5c3dd18d92c5e3f1ac7f44ec0c602221594ac7f1a1c5861d7cae", 0x80) 16:18:43 executing program 5: r0 = socket(0xa, 0x1, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(blake2s-224-generic,ecb-twofish-avx)\x00'}, 0x58) 16:18:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) 16:18:43 executing program 2: r0 = socket(0x10, 0x3, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) 16:18:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[], 0x304}, 0x8}, 0x0) 16:18:43 executing program 5: r0 = socket(0xa, 0x6, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x5, 0x0, 0x3) 16:18:43 executing program 3: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8916, &(0x7f0000000000)) 16:18:43 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4, 0x0, 0x4) 16:18:43 executing program 5: syz_open_dev$dri(&(0x7f0000000000), 0x1ff, 0x84000) [ 1354.259129][T28308] loop1: detected capacity change from 0 to 131072 [ 1354.293552][T28308] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f23fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:43 executing program 2: socket(0x0, 0x0, 0x0) syz_read_part_table(0x81, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000000)="d32aec8492d6", 0x6, 0xfd1e}]) 16:18:43 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4e, 0x0, 0x3) 16:18:43 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x42, 0x0, 0x3) [ 1354.370648][T28675] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 1354.427814][T28328] loop1: detected capacity change from 0 to 131072 [ 1354.452848][T28329] loop2: detected capacity change from 0 to 126 [ 1354.456959][T28328] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:43 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0xf0ff7f}, 0x38) 16:18:43 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x82, 0x0) write$sequencer(r0, 0x0, 0x24) 16:18:43 executing program 5: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00', 0x0, 0x0, 0x100, 0xc00000}}) 16:18:43 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x33, 0x0, 0x3) 16:18:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f25fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="2d6a7102166e08eb26353a8a390b5e7dd07563d904faca6b8d74a72d8a2f6c653dcbbc39a6c2a67ebd92d628647f34b148b7d6bfa2cecb27fdb626b4e1c03f4086", 0x41) 16:18:43 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x2}, 0x38) 16:18:43 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x84, 0x4, 0x1ffff000, 0x4) 16:18:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket(0x15, 0x4, 0xfffffffe) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) syz_open_dev$media(&(0x7f0000000180), 0x0, 0x20000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="2d6a7102166e08eb26353a8a390b5e7dd07563d904faca6b8d74a72d8a2f6c653dcbbc39a6c2a67ebd92d628647f9db148b7d6bfa2cecb27fdb626b4e1c03f4086", 0x41) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="ae34f2d0d78268441c222558dcfc6ddba27e7cfccc6aa659991ad478e639c3cb3ea2566396d45b08a287bd14c7fab4c09aaf074d7b6c931efb9d03b3be1ffb723f2b4672ed09d5336b", 0x49) socket$alg(0x26, 0x5, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x29, 0x7f, 0x5, 0x7, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, 0x40, 0x20, 0x40, 0x2}}) 16:18:43 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) mmap$qrtrtun(&(0x7f0000ff3000/0xb000)=nil, 0xb000, 0xa, 0x10, r0, 0x0) 16:18:43 executing program 2: r0 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xc) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000200), 0xc) 16:18:43 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x32, 0x0, 0x4) 16:18:43 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x102, 0x9, 0x0, 0x0) 16:18:43 executing program 4: r0 = socket(0xa, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) [ 1354.577474][T28341] loop1: detected capacity change from 0 to 131072 [ 1354.604770][T28341] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:43 executing program 0: r0 = socket(0xa, 0x5, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x12040, 0x0, 0x0) 16:18:43 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x39, 0x0, 0x4) 16:18:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f2afb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:43 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x11, 0x0, 0x3) 16:18:43 executing program 3: syz_open_dev$ttys(0xc, 0x2, 0x0) r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, 0x0) 16:18:43 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000002c0), 0x2) io_setup(0xa, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000280)={0x40000000, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000000300)="ce4718da", 0x4}]) 16:18:43 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x541b, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:43 executing program 5: r0 = socket(0x25, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4, 0x0, 0x4) 16:18:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[], 0x304}, 0x300}, 0x0) [ 1354.708712][T28361] loop1: detected capacity change from 0 to 131072 [ 1354.730004][T28361] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:43 executing program 4: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_INC(r0, 0x40045701, &(0x7f0000000080)) 16:18:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) 16:18:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f2bfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:43 executing program 5: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @rand_addr=' \x01\x00', 0x0, 0x1}}) 16:18:43 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x8916, 0x0) 16:18:43 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x48, 0x0, 0x4) 16:18:43 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40045108, &(0x7f00000002c0)=@n={0x0, 0x0, @generic, 0xfe}) 16:18:43 executing program 2: r0 = socket(0xa, 0x5, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 16:18:43 executing program 5: r0 = socket(0x1, 0x5, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x0) 16:18:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@allocspi={0xf8, 0x16, 0x0, 0x0, 0x0, {{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@mcast2}, {@in=@empty}, @in6=@local}}}, 0xf8}}, 0x0) 16:18:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) 16:18:43 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x18, 0x0, 0x3) [ 1354.877818][T28386] loop1: detected capacity change from 0 to 131072 16:18:43 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_TMR_STOP(r0, 0x5403) 16:18:43 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x6, 0x4000, 0x0) [ 1354.941768][T28386] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:43 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f2dfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x58) 16:18:43 executing program 3: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x89a1, &(0x7f0000000000)) 16:18:43 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:18:43 executing program 2: r0 = socket(0xa, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x140, 0x0, 0x0) 16:18:43 executing program 4: socketpair(0x2b, 0x0, 0x1, &(0x7f0000000080)) 16:18:43 executing program 3: r0 = socket(0xa, 0x5, 0x0) sendmsg$qrtr(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, 0x0, 0x0, &(0x7f0000000180)=[{0x10}, {0x10}], 0x20}, 0x38) 16:18:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'blake2b-384-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:18:43 executing program 2: r0 = socket(0xa, 0x6, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x3a) 16:18:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) 16:18:43 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x1e, 0x0, 0x3) [ 1355.098098][T28423] loop1: detected capacity change from 0 to 131072 [ 1355.126025][T28423] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f2efb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1355.208486][T28437] loop1: detected capacity change from 0 to 131072 [ 1355.229256][T28437] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1355.302692][T16024] I/O error, dev loop1, sector 130944 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 16:18:44 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x38, 0x0) 16:18:44 executing program 0: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0, 0xffffff7f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x38) 16:18:44 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r0, 0x5452, &(0x7f0000000040)={"0d18d062ebbf561a2616b3e13ec53a5942b27c6b779095fb20c485388dd2"}) 16:18:44 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvmsg$qrtr(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x36, 0x0, 0x630}, 0x38, 0x0) 16:18:44 executing program 4: r0 = socket(0x1, 0x5, 0x0) bind$netrom(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) 16:18:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f2ffb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x6, 0x0, 0x0) 16:18:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:18:44 executing program 5: r0 = socket(0x1, 0x5, 0x0) getpeername$packet(r0, 0x0, 0x0) 16:18:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getsockname$qrtr(r0, 0x0, 0x0) 16:18:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)='\b', 0x1) 16:18:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="2d6a7102", 0x4) [ 1355.410959][T28457] loop1: detected capacity change from 0 to 131072 16:18:44 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3a, 0x0, 0x4) 16:18:44 executing program 5: r0 = socket(0xa, 0x1, 0x0) connect$qrtr(r0, 0x0, 0x0) 16:18:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) [ 1355.485171][T28457] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:44 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x89a1, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:44 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'ip6tnl0\x00'}) 16:18:44 executing program 2: r0 = socket(0xa, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, 0x0) 16:18:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f30fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:44 executing program 3: r0 = socket(0xa, 0x6, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3in6={0xa, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x3a) 16:18:44 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x30, 0x0, 0x4) 16:18:44 executing program 5: prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) dup(r0) r1 = syz_io_uring_setup(0x3ede, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) dup(r4) syz_io_uring_submit(r2, r3, &(0x7f0000000400)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@l2tp6={0xa, 0x0, 0x0, @loopback}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r1, 0x2ff, 0x0, 0x0, 0x0, 0x2000000000000000) 16:18:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x49, 0x0, 0x3) 16:18:44 executing program 4: r0 = socket(0x2, 0x2, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x11, 0x0, 0x3) 16:18:44 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[@ANYBLOB="040300000f0001"], 0x304}}, 0x0) 16:18:44 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f4bfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1355.638774][T28489] loop1: detected capacity change from 0 to 131072 [ 1355.662174][T28489] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:44 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x8936, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:44 executing program 0: connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1, 0x4, {0xa, 0x4e22, 0x7fffffff, @mcast1, 0x3}}}, 0x3a) r0 = socket(0x1, 0x5, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000340)={'filter\x00', 0x6d, "5e26b202a2933d84e74318f01e6cf5d8c5b962b7f8c3863230c4b47f038203ef502e7ae07ddfdf0dbe765a516ce15361ec85e8facfbf735955dd1f7f2c292005c507de2cf9c3eb12ee6b733638f42e37496789f3d7d1555bbc96f824afbebd8ed9825613a659e28a135b739ced"}, &(0x7f0000000400)=0x91) recvfrom$netrom(r0, &(0x7f0000000000)=""/152, 0x98, 0x10041, &(0x7f00000000c0)={{0x3, @bcast, 0x8}, [@bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) sendto$netrom(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={{0x3, @default}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000001c0)=0x14) ioctl$SIOCNRDECOBS(r0, 0x89e2) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl1\x00', r1, 0x29, 0x1, 0x8, 0x6, 0x1d, @dev={0xfe, 0x80, '\x00', 0x42}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7800, 0x8, 0x7, 0x3ff}}) 16:18:44 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0xb8, 0x0, 0x0, "f156b4d156220395821a3dec015519c9d753cdd89e70e8043edc745791401a3838cef944117021419e80a3116cc7d33a8e5ff2f7d569911fe00a3b3baec89cd684b59c963a3ec1cb0984dff73f10c293c79119ced38cc8d4590eef7178dc46d0a5137dcb44a05167d8c258a4fce889a150fdd35746a3420e8bc51a9d1db85edce24fdbdd3bed8bf11328cbf4628bed934df371f2fac179fe1cbc17ecd034a67527"}, {0x100, 0x0, 0x0, "c37ac9ae918bee162c1117955cf0e3200bd0a9e34a82dc3d614a749705685baeafba144f8c3a4452d4f70a168739a999ceada50307d9b366456eea3c3d9c36b882e2e5b0952cdce57d8064451915cb03e04024ae74da6d5868deffa7869950d0cff1aa06fa3b690182eab0e99c88b8eca0f92ee5f93b368cc7c0421d26adf8189fca62891945788001df7b75cb6ff5f32ef525a3d0f2db20a6269548332a6e3a7775bebc101c2cd2b36a0465e1c234c6f96219038c7b2ec7c87848324bfc879f7240e0b12b3a605016af85779307bef883f8733b0a00ee6f4d0d1e7f384d9bf5a05fb157fd0d980e06"}, {0x1010, 0x0, 0x0, "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"}, {0xe40, 0x0, 0x0, "85dd4a7a1324361dd3e4965e4d29914b55646fbd1bd98f1f56ff16141bf050e2a093eada2b6afaad1635019cc07036b332a3bfc37e7839dc727bf333f94ff224b26a484ba92b88d23919c3895ae47e3fc8833ed58d09c884fd3c14bb3d095592fc8b793bd1e6846344dc27728f74b0920a97d2c4147f2ab7c8d402db187347c541f57aa3dc98bef82e43b20372ee8837296925b58df616a8e6d10b6e6af7901c596495b5d857a0bd4f66da7db999dc70ea1a4e65bec60d29be4281d4825e7894de8cd25a393f06eec4bbd8dccbf60175dfe8365262cbbf59e75dbe3281733dcb1c30a87dfee2576c4ed52306bddf35597fbb90a5c316afce34d4f35cb59c6a7c118ca8e5b9fee206372a358a483fbf6fd7132931fe1b126e8614ccc484dd03eb2c22bf278d5dd6dfbc7bdd5cf4d4ce592f459508016a0191099eea5d60e1cec1ad55ffdce547311e76ad4f909fbafb164f339a5ed4203635bf4f448815fac13599f342b0522dbbdbad25168371691ec0bc4b223eeaabfa232d8a8c5594bd64df86b1b9a765945dade027fd029a241e7e73caad8f8b240b6a3806c7733a948a9c98ea1d4a68e8bf0066035caa0b6c73380ea26edee6dac36d9fafeeb25520df4877c7058e4fdb02d0988e568db99deae8114edc37f8ab6515fc5eeb9ab86072bf7fa02005af7fdb870ad4127b1c0093608456a1ef092f7c5334455c95a1467fb77cfe048da09b54434578d7dfaffc0b5ef9a9f4601b1c41a4976b424d6f2dab2b76a28152448e9c835bccf1d3ae85fa4a86c6a7d51fa1ae91314a6691fedef59e3f028f8680e75433c7d27f2acc046e68facc4881a35136245a0ad46451f77080f49aadae830a3e0a1a56ad91b2a745169908b15e89e14d11dac4393173c24bbe54a7254da9e55810582e274dc5cb7097834574371f9f71cf29d45bf7518c49d0e9bb1556bb14f64483fb902158b8d45220d7c0ab54316dbd3c7abe9ab360fe70c388dd3fc56b3e084ac7227e2605b3e9df498c1a0e7a93caa59a696f0000622bdd8bf1b8cfb7a49359ae625e8841989c29a456aefcc528c25915437c73ac1decc41a0b7a47aaedcbba0ec3162f7eb66ad2cb64c254adc41386c74c593e2790e9ebcb042d9f210b05606f470d4470a38a14adf5e31e04e783e01afe7347eb51167a2e43a5b7770efc67545124713437745ad0a8539d2fb58808bb2e34c6368080f4a3b2017f85586d4f90951ca3106648941dcbacc99579c41ee71a316eb593723959303ebb60c00a8cb8212d05421c7b03e9b027b8ab7761ae438c872e938d1eed8222597e51bee77d7864fbb14da29803841aea77f24ab693c784a61c1aee6e46628712d90f0c1ae253fe3003d121bbbbe6c7c8eabf8e6b92d71cb73c8be5399a98f1f2ae6c2773f2a29d04941f7fd6f68a1b7ddddb21dc9a20229cf312de308746eebf96bbc68ec5b6c04ee8e6e42b8e33f8f2540a178c7ba9c118360ec62d31d75ab39e567e5da1dd5406f72810a137c703fcd8053707644c09ff6eb630222b35b3a563f98bf158f3951b73da4bd56c1c1d4dd533ca4241c3eaf36af1ebb4735e5e48eef173fb01df9add30d1957929e903cd1ec129efd991de044a4e3bddea166f0f3a6518d5900fbac8b668001938e12e4fe069f1f155f34a200cfbe15b7d9370300e0cdf3e342e6d598b9dfc87eb3503c6abb47619f251ddb6f222cd9632b1329df5b5fc640d4158364d62308776f7c011f32621e7de1c8472f34f907563e13471ad42cfe69aba24e283ad23697f0fd010911f3c50484d9aef90ddef68910ce1d792d41fa5d82b417b55c765fe0847f143f004780309845073afe756a8b46c72bd5d921262549e27e71eeaf8a677bef1682d312123f80b4c55075954ed2d297fd2b37d9990b6c6aa9240065359c682e3af6a8cbbe5079c6f08c891c710f0779664f7c2ff855004d91a71215bbe7fd721b2f6b305f9c34e38d805c0bb80452d17a3ee29c78a5f209f2275edd94f8be0fa8e1321e9f9ef8f8201b3077f7b477b86e6c6ee665846a617bb5443703b2c25e70e60c494e7f96262338f0c1df12a9e37834b0322c5a9876d80c6596a62b4fd5efc326f7a1a4b2772c7ece1d46ae0a7357b71b431ada0ff4a8ab40fca945f1308ec1c24a47e292641537510cc10eca1684f625007b9c9ac494b3c3375f3ecacf759c9dc8ab36d5cd25e954335ab608f59cb53fd1e5b5608b55445d1a2118f7b345d7decfea539705564730423933e68b0a0d455a513c6950fe07486304b7849a75dadd55934b0d9639da51f37daa0b5417a6b311b819bc8eb58efadbc5643e86aeb6f0e4f7b2e111d1028384f8d95d98bbf087410a7d617542f001562f347482af0a826312bd669200dd9a50f05843e855e879f1342ec85abf6dcffddeb9765c85c1a9130a81c319982ad40f8e3998a6ed500d3c096c693409305258646da2e6b554575f3fc57878bb8cf01375579230c98624b440a2a06f02830ecfa0c4b0ff716e463a586a0ea1f5685956b4727cf4417f8fb63d8ac977fcdf07198b745f0671404d869f90ba6623b6e0acaa8a51f49ec0fc64097f4c59320c0c6caaca220a14df174e5fd77da7aa8a3d54605f2c3ece2a04cd398605e52d811966da2a30e7941c011a6ed616084a0be64efc2575a203931cd7a315ff255b8650a1d3f2192f8327ee4342505ec3b9a3f455571c2b6a6c77d8271a31956f93bfb21dec74b8741b9f0299808b2236d5b8954038f1cc71bde6d41b6e8f280fb61132cffd68868eef0eb43841bde5c8d7387a30fcd632ecabf1e191681acf64b0ba308fe77bbba3c648905cd83e4ff6b4653c0a5cb74f2d15a7f0cff521df6aa01a5a951c23573b220ba4c45349aad08a430af674188d2f5be044bbcec2cb8a6749af5d1976d0fdda4dc8de35c3b0ecb0fda0e62c3557c73b317269e138079272995d86c7ea6031c7c5b89e18cbf678d7f019430ab54d89c1201222185fdc2652fb86e6aa519fbb0090745cafdbfa1b1c8e9dda659440c5ddb92c7ca6f9aaaacc0d33358dc6e4eb3ea15bb81e78e3251ebfb9bb67dcf7b5d4c2f9d3f8a2dba41816ce157e4ecf61423b47b28aa146fba6d3f1eb51c30fb28160f963d5e9ec204e1e2b9a07bd9c424c9b3c77567c1551ea1804a079f8bc9e2592106c420e3cab47d2044f953b6cd193ace6e954493ca077443f3969450467a45d89aaca49b382f6c5cb6b4ed149ee27980b038d6bc3e0483a7b5afd600bbd239bfce8e31b945a3e4a30d9bffa7502e0f4f35f3d81dc63a53b492d96a21dbe5de789c23aaef7ca1d13460543df1c1d1b9280b23f69b0c31f62bcc2ee6a2b39b7ec89f940b93af90bd6cfba17cba4bee8175a7a8c2701d18ebc523b692755d12a8056a1e76943f6fa23a8195ec49ac2061b4fbc1d516fde61bcb9ddcfdfbb83ac3b1565375ad225211b2c647599e70c94ec0149ab765a863e557b2e74aa8d9d9b470871488086748cc03adc0582ba93de827b5839ebf2363c246d17cf7d6f9fd56972ef8d559170e83ac9d89293184fc613d552cca0c1f65f3c275b5bc0a5d9597bd3f11af9b8d06029521bae11c92006a6e70a35fc70994b9c15f45d1b5307d4fbb36982b57b89f17b0a68b373eeeabbd7d43ea6d8d47b82b88b3dbfe2d71104d2966b6a0ce68d1dd5cb20994255e3f6ee3462007a95bc3f592da2bc92fc21b51c5285e40ed450dd6a07c8e645a54d356ca0dd42eb89b54c06dd33d294eb009f3cc3294d57a1691b2e096ba23a15302ee36e8c65985604e49b09c44ea69bd5f3888530e414e3d267cf4371b82001734964c92e312dd3ba153a6e3719b313a82ca71e19a9879cad71b53c158004558e3e0f93b84d32aba2f32a9aa0604648985cfaff2251d496ce436f59eadea458ae4131118168707aa02091e621b58a48ed02bfe7ddf5a854ea0d1d51a5aa2b31e814913e6ea251e55fa46204b3eeadd44a90f01accf4122cbeb767361db1e95daf93016309e5a8175592062b74516012048ccc44264ce3742c4d870810792cc47acdfbbbeab4a6ad6dc14d0f3475adb9fa318088feabc40d9c71fab46c84068113c9c01fefe1a7ef1c9b58b4f528f1f2c8d9225593e8d745c80f7ce08d2e57a7dc05928bf0ab19bb46a4644ba01dcff86317b8a5992b6d6273183a905da36ac3a768843ab49a94e7f345148221ebd359c96fd36e19e76c26df90e4f475f2ce720bcf8721aa40ab592b59c3e0953cd5e5701e84a18b219129a5d69b33e964fb185ea3acb70c83b1b3087afd4d29ba9a2804d956a658ec3a959bcb4cf66bbbac96ddd904099344502e833f783bd64037c8cd3f1d0276ef28d6721fdf3e1a469941b2dd1c5844b8e64858d3148ef58b1189330905e0f06f7718ff905beebe0779afd818622f10c70ed9c36864e253e12ef61df691fcd6d46d770d872358bd463ecdc0a1288abefb1c5d493897ff1177d70e561f8d39a2956d21e08795b1687907ecbea0bd60fc7ccd42d8808abaa0700568acae9c0df5fd91a6c92c7f94e4f263a3ef414c1ab613c12991cc35ed5cf09f9c88c3cb0a2ec36ef5c56d4ced786781108f2610a0a105711162d66e18c70aeddf114882a06ef1e2147449632f92df520604537d01171377961e30e06f829ff0d10bd738ddab2177841ac7be7f0549bc1d7179a284d776bff4bad62974102edf54b384e72da31ae0fda0486b8dbbea95b5f6ccd2c55fb99adbd99cba8f9e608f219eaddc3eba294fa48bc83cff6da9e3cfda641a974970da274981768da4485056b298003024b91be8d6d0ca0a9c8f13170abf24f09f38c9cd1b6f9be7475b2a896ec0bbe58ed117db04a06ea5a10ad576916782871f5aacc2c3f6a31a12d88b1c697ae4d3addff0f9806f88ab33cd348036a86a76b29caaff78162ba40a82ac6dd57fda4ab68a115dab9c8092616371b35648d3aafbc6b27b811e1232067a6a49f9b17ba499784b3910efc6fb471ea2b9d4a3d4835b78bd38c8e895033d52c7b51dcd09162c7485faae58d14e02ed63a8399011fd6840197ac93f59d05ad8a3758d44d7bc6c43ad8f859fca9f76ee90eb144aa6816e5e740c57642900ca91d015d47b6e5df6e0d33"}], 0x2008}, 0x38) 16:18:44 executing program 5: r0 = socket(0x1, 0x5, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'veth0_virt_wifi\x00', 0x1ff}) 16:18:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) [ 1355.751329][T28506] loop1: detected capacity change from 0 to 131072 [ 1355.771015][T28506] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:45 executing program 3: r0 = openat$damon_schemes(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$damon_schemes(r0, 0x0, 0xf0ffffff7f0000) 16:18:45 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x8927, &(0x7f0000000040)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 16:18:45 executing program 5: r0 = socket(0xa, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r0, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) 16:18:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x2, 0x0, 'cbc(twofish)\x00'}, 0x58) 16:18:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f4cfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:45 executing program 5: r0 = socket(0x1, 0x2, 0x0) sendto$packet(r0, 0x0, 0x0, 0x4011, 0x0, 0x0) 16:18:45 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000180)={0x0, "fdf28baa59ed7b6cd8b366409d709f179b24feb55395c4d436ea69e09c4a77320c4775dbe28ef941ddf42554bedec2a1d6df3c6152a7e3695c178ae764aeac7c"}) 16:18:45 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x18, 0x0, 0x4) 16:18:45 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000200)=@raw={0xc, 0x0, "43953967f292"}) [ 1356.498871][T28525] loop1: detected capacity change from 0 to 131072 16:18:45 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3a, 0x0, 0x3) 16:18:45 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x12, 0x0, 0x4) 16:18:45 executing program 5: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x4081, 0x0) 16:18:45 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) recvmsg$qrtr(r0, &(0x7f0000003c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x630}, 0x38, 0x0) 16:18:45 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000240)) [ 1356.546081][T28525] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:45 executing program 0: r0 = socket(0x1, 0x2, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 16:18:45 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f58fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:45 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_TMR_START(r0, 0x5402) ioctl$SNDCTL_TMR_CONTINUE(r0, 0x5404) 16:18:45 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x21, 0x0, 0x4) 16:18:45 executing program 2: r0 = socket(0xa, 0x5, 0x0) connect$netrom(r0, 0x0, 0x0) 16:18:45 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, &(0x7f0000000180)) 16:18:45 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x4004510f, &(0x7f00000002c0)=@n={0x0, 0x0, @generic}) 16:18:45 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0)={'ip_vti0\x00'}) 16:18:45 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_TMR_START(r0, 0x5402) ioctl$SNDCTL_TMR_CONTINUE(r0, 0x5404) 16:18:45 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x82, 0x0) write$sequencer(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="ff"], 0x24) [ 1356.666210][T28551] loop1: detected capacity change from 0 to 131072 [ 1356.702490][T28551] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[], 0x33fe0}}, 0x0) 16:18:46 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x17, 0x0, 0x4) 16:18:46 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvmsg$qrtr(r0, &(0x7f0000003c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x630}, 0x38, 0x0) 16:18:46 executing program 4: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000003840)=[{0x0, 0x7ffffffff000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x100000000000000}, {0x0}], 0x9}, 0x38) 16:18:46 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000c00)=ANY=[], 0xf}}, 0x0) 16:18:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f5cfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:46 executing program 5: r0 = socket$qrtr(0x2a, 0x2, 0x0) recvmsg$qrtr(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xfffffffffffffcfb, &(0x7f00000001c0)=[{&(0x7f0000000640)=""/215, 0xd7}, {&(0x7f0000000140)=""/85, 0x55}], 0x2, &(0x7f0000000200)=[{0x40, 0x0, 0x0, ""/29}, {0x28, 0x0, 0x0, ""/18}, {0xf0, 0x0, 0x0, ""/222}, {0x100, 0x0, 0x0, ""/236}, {0xd8, 0x0, 0x0, ""/200}, {0x40, 0x0, 0x0, ""/48}], 0x370}, 0x38, 0x0) 16:18:46 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x8918, &(0x7f0000000080)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) accept$alg(r0, 0x0, 0x0) 16:18:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}}}) 16:18:46 executing program 3: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4, 0xa4ffffff, 0x4) 16:18:46 executing program 0: r0 = socket(0x18, 0x0, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4, 0x0, 0x4) 16:18:46 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000080), 0x0, 0x2) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) [ 1357.493736][T28581] loop1: detected capacity change from 0 to 131072 [ 1357.517726][T28581] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f61fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:46 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x31, 0x0, 0x4) 16:18:46 executing program 2: r0 = socket(0xa, 0x6, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x3e, 0x0, 0x3) 16:18:46 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0xc004510e, &(0x7f00000002c0)=@n={0x0, 0x0, @generic}) 16:18:46 executing program 0: r0 = socket(0x1, 0x2, 0x0) recvfrom$llc(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:46 executing program 3: recvmsg$qrtr(0xffffffffffffffff, &(0x7f0000003c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x630}, 0x7ffffffff000, 0x0) 16:18:46 executing program 4: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_qrtr_SIOCGIFADDR(r0, 0x8915, 0x0) 16:18:46 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x35, 0x0, 0x3) 16:18:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256-avx2)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) 16:18:46 executing program 4: r0 = socket(0x29, 0x2, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) [ 1357.643412][T28605] loop1: detected capacity change from 0 to 131072 [ 1357.677041][T28605] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x4004510f, &(0x7f0000000200)=@raw={0x0, 0x0, "43953967f292"}) 16:18:46 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f62fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:46 executing program 2: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x0, 'syz1\x00', @bcast, 0x0, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 16:18:46 executing program 4: r0 = socket(0xa, 0x2, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)={'geneve1\x00'}) 16:18:46 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) read$sequencer(r0, &(0x7f0000000100)=""/119, 0x7ffffffff000) 16:18:46 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x8, 0x0, 0x3) [ 1357.793077][T28624] loop1: detected capacity change from 0 to 131072 [ 1357.823547][T28624] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:47 executing program 0: r0 = socket(0x25, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 16:18:47 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4b, 0x0, 0x4) 16:18:47 executing program 3: r0 = socket(0x28, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x5, 0x0, 0x3) 16:18:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(seed-generic)\x00'}, 0x58) 16:18:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f63fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:47 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x46, 0x0, 0x4) 16:18:47 executing program 5: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x22, 0x0, 0x4) 16:18:47 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r0, 0xc0884123, &(0x7f0000000180)={0x0, "fdf28baa59ed7b6cd8b366409d709f179b24feb55395c4d436ea69e09c4a77320c4775dbe28ef941ddf42554bedec2a1d6df3c6152a7e3695c178ae764aeac7c", {0x4}}) 16:18:47 executing program 3: r0 = socket$qrtr(0x2a, 0x2, 0x0) sendmsg$qrtr(r0, &(0x7f0000003900)={0x0, 0x0, &(0x7f0000000000), 0x9, 0x0, 0x4e}, 0x38) 16:18:47 executing program 0: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x2a, 0x0, 0x4) 16:18:47 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) 16:18:47 executing program 3: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x24d, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xc1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) [ 1358.521479][T28644] loop1: detected capacity change from 0 to 131072 [ 1358.555294][T28644] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0x4}}}}, 0x20}, 0xa}, 0x0) 16:18:47 executing program 0: r0 = syz_clone(0x44000000, &(0x7f00000001c0)="9520101ceeca36fa5f441e3528e1a7c58047b45747a0ce1b2ce3ae627e2bdf76b09d56e027174b09974f0e593a39", 0x2e, &(0x7f0000000240), 0x0, 0x0) sched_rr_get_interval(r0, 0x0) get_robust_list(0x0, 0x0, 0x0) 16:18:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f64fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:47 executing program 2: r0 = socket(0xa, 0x5, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r0, 0x29, 0x4a, 0x0, 0x4) 16:18:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x300}, 0x0) 16:18:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[], 0x7b9c0b) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRESOCT=r1, @ANYRES32=r0, @ANYRESOCT=r0, @ANYRES16=r1, @ANYRES64=r0, @ANYRES16=r1], 0x14}, 0x1, 0x0, 0x0, 0x404a060}, 0x2004d8d0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8b1a, &(0x7f0000000000)={'wlan1\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x48010}, 0x0) sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRES64, @ANYRESDEC, @ANYBLOB="050000000000000000002e000000080003005dfa81caecea414508999304682ee4afacfac56809c70a70e0e03844390cee7839eb078a41e432b640e45a8c2e7e2f1f9a42046f9785a1bede8300ba295de24546408d1eaaaddd99b07b814144ba83703cdba896f46d826ad0881882d630085c7af2eb30480271db75b72c9ad2d803f1377a66d68d67456aabdedcb272fcc015b6cd80a92f80c0c02e2bf66d2535dd5c08000e49ba6d1d90decf1c944d8e2842000000000000000000e7fc34697e07f21868fb0212a79427f10034ad21903d629b854661f033324242977575247e2f94c40b9c800b30c212cbdede716bb98bfac2a37a04165c8443ecfc6d01a82a1eaf18b997c39a977e6d00a07b8b", @ANYRES16, @ANYBLOB="0a0034000202010002020000"], 0x28}, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000001700)=ANY=[@ANYRESOCT, @ANYBLOB="23f909000000000000002af96342bfa3c842971b1069075715c0954b1fdeb3b5d7c04935442bf739f291e5408cd39df5a424227605bf46b1b17a92bdfae2e7b06c0ce24f3fa2fb42f6b84c98d287b23f96d290875a347e0be181ef51874864d86820027065217814b5080600000000000000af3887c1404d66fb27972d14a6f68436cb056a3644d7d0d3", @ANYBLOB="f9ddb48c03c4f1b054f34b36db28926ee2c7d1216724b90084060bf5f2824ba2072df98d1f71bd27878ce9a502f2e2a76298d41a5e489a79d4d5e501bf4bcde0f0894e665403370929905b4db70aa9db26a0ea5f075582a375e882ba991d378f3ab5ef0b51f077173720b5789f8c24c162af341ebb9a5451518d9953f6ae547d04", @ANYBLOB="925e8b9b2fab2ed5ead3654facc807f176066ce339f7ee0997babff590f2339daae0a8eee5e5cc5cac5b2b310d3b0dd1bd34a780b1d4edc513b57b1ecd96a6d0ee3da6592bf167389514bddab2af3508f23de61a937ecdd493d0361ee0874d6e2a3c5fc17cea6ed54dd41ccdf633117ef6034d1358e0ff2a6fd9cafb465930e9aeca1e715887311b782ee77bbec36068d527374ddbc931c89f4e3f9308fe2f8911b444fcdbff1c0de01f053f09195d0a5f9fcda35a3ad31f5960513af747aaa4b69019ebab8111a63aa818013736ddc5689e3efb3a82360005d15d84633f6ac054ea6624350a22772ab3c639f18575d68b4cc9f21a263b9f257c7a139953917ef48f985299299ad6327dd4d37584e8b04742dad7a03b328666e026815357da41debbd0dcd9761fb9868257c76f196807a8369a3fe3e07fa3836be47b6e8696599d89db828ba732033553a13f029843edb5422b05aa0d94a841131b28aeae6931a434e20753d05b21cf4c8b9270d6df03ff1736235ab9b8dcac892173dd21631e1e0ee67bf6016629169d7475ab57f52b4fdbd89fa71b8e38055ac0c534f8f76103f83e03af2220eb707d5898b8f23abd0d98dde442ccea0cfce76a53baa291c898542447f68a9efb6dab54fc5bd6420c86378af69f3785d698eafd0c4c6e120657d78005cd5ce95ab90655648f5931ed0bf6f1931dc3299434513b5223978768b932af62c63485833a9e504ff89a12dc4cd58022a0007e9d0e3ba7652fc33cf35923687bc2ff4287080a560e030ef1f7786df586cce5c810319eb9777ce8b9f42b69984a73019b19f7d4bd7114c17c44ae1b8df655d944de2ce5ca91a2d187d54c40de5ab0d9e37e7ca662c7f0b6a0df3710171cff42d9f3db8f411c85a47389e3a8061c0827166437d8bb2fafebf22052c68f984fe4c679df92bb420b5128e468f63403900f54244cc33473746901ea9eea13d2827df6b3bba69c3820056164f96c5a5aceb0a138e019b56086cb2187cbe5687c28f5b50dd538a79b568bc0f0d7a4a9e37ed053fd057f65bbcfadd7e82d8f255bceff2589a8f99a5e63bfe343a150f3cd933ad10ab33a90446c80a2e70886d50a9d9a53dee48bd84897a33ec96d65c02ba4b2a6b846273ddf9b0c89a491971fa3fdf8ff4858668eba4e6ece45e2de912b90ee5cf3c4f7d7aafdf1bf4441f55cb371aea1c09572e856c5a64070d3466d271ff0b0775b00b940168b81cf1726187e96e35f4a5fa227b61fcaf77e9a08ecf1931efb60753356b136eeab1bc07ee7e9fc87cb99d01c5329b5454490aa2e481b3f82e7fccd80d1bddb4e3fdd2693fcdf1125b8953768ebe222dd9aa51e81f267a3dd9ec60047390d0eff08617c308fb514878c4ec1018d9382eaea4095b2615e7e8e1fccaa4aad53f24cb70fcbaf4351ff0c085958c6459ab4c70edbe16c93d47eefea9506019152519d7cf1db7f3435997d46cdf21d8d4be7fd493a3c2ccecb943b96c18a3988341ed9b0c400f75b5f6329893ea244338a4dae12e07b119cecffe753b94faeca1d137f5cda3cd472afefba829144ff4afb42845a7876f15822e7f632db5fe6c2e0f0d8828c4553690e289e8ebeb30265e804527edbf27fa2da7dd96b6754b5b12bc410c26fec908eb8d65c2f2dfe2eaad299efe3d78558c85beb97a1c36e8d8e67eb318af2ab38249ef4846113e19812748f63248c1e04eeacb8f5a3343b9a30dc98c2bdd1b6369ef1a97cd07a554263beb18289ec09824c98dd2aecc4267c313d7e740b3c06254bb0424508fe5f668cb8a51a302006ffb3d4605330551d8c39ba03b5b2acc5f53f155275a3a53ca239b258b202765e36da03e63bb527e7a77e141608841520a4a9f7c14a496bf931d4debfdec98769aadbd930b7278ebe080003372597406fa06d6bec2571fcb2ea0d2edcf7c2fd2b2fa105e9c0c536cbd543b67ce46c62fe4cfbf5bd3bd41766372e59842fa1f0f1067f0ec1ce56d4e5f0e101f58df70f731122a0d27d22c3cde36fff9a9356a44e7dbc1fa7324ff324d6d8a7c4593424cce10b390a8c58363557e3530d2ba25e39195f448ea5fcbc149bd828ff11323bb336838590173f02d7635150a6904157daa2273110a5dd45adacf399ac5c9d496af16c491fa8c4bce17aa6e683c305b56b4f408a332a41d67f30246807e5f856b302dfc5fa19e868be086f5c979e5ad02eb85ce2f2f13ba3ec76b048b260137fa6edecef8b73897729753b00fe01481ac781032886e017f4b5a785c72a77ee9437adfbdae63910805503a2b4cb460178ac0375eb5ad6bb78fd443c5ecc59e89e7d5f653a83308eb75458202bb3c51ea88fcd17903153fd5e50ee6b4c3334f4a2e84d66e2384a0df919197a2fb0086d72210ffe2287253671729801837ef66e9278c02dabda2ac394f26ed21b2c1ed1ab162504f3303c68b81df737d42b90b7e7b1a32788e21d63afbf7a83dd7a7eed25bb5510015ffb7f94b8888e166069002de8685bfe8e3fd2dc73587e8d898f3323a2334c57e1c16c33496fe291170db5b0ee90ee350f943d236e91a5b4cb2b71165ba2af97ba9d4e2303eee5081f55701107cca9055ec36b91e5503461ca3b4d1d02f386c9197737b0f45ab2b9750a3e4f3f1331466d8edf765b425f2ae25a97f494ea825c2d178e2d0c8ebea6697df3c66deb18c860fd7bf71b36f69410cecf46d558634c753958755fd26d373337da3f4c38c4d9db7bbef79025cd2b2afcbc5d4cc326969960d9cc01191db2554748dd138e7bea48f921e85b7fc6dd7a41f499c21ac6166b9f618f6936244eff9981d0f7111ac12f0454ceef4b51bc03cc80a9ee31b1e85739f2499fa17b796a718d6037def5e37e81bf4c77288729aab70d4eaba5880331dd32f6b34c0043e6bdb40005ae6d56e439f8a18a2dc2f0bdb96befca4dd47ddb0b5151be47b9a5c6fe67244cdf283faff9a02587553e8b9860ad4ab32ffdb9aa3c08193dd9eae1bd6885b70e6e3ca672de34182b9a41357c7abfa99f809e6570ae645ea780aa670fdab14af773af7c76167f4c367ceb5545c44e217ec9cd0bb99ca1686dcb7ea9f5244d7634c147eebfffb082ea9bd36c387c51a2c04f604ab9f26f749e15ecf8a21991f30a489e0dcfaae02ed0a4cde8f856bff4e0897ad6c103711e2c98dd923662df72f928544a47f957b5e88a61d8131e41109d0fa24c152d62a5bd5b9885f1f76f69f65413e93365320b631ad12c81d8e4ae6f36017d08b5f331e479ab06201949860fd850622df571256585672d73b769ca2509a19d934cf11599c201ee8075a11d92f2d6b79a3eba10cb42243423b32323795de0873a2e8e59ad166b9ff4988e95b30f2d8bf97d187c72bb667370f18b27eb5ac61d67de117d880d2b5843322bad398db6adf9aed2d3f04d34759281f00deda60b6a19c43a833b1b840aabb6d656ed28cf2cce252d86b8a22c49e542414f69ba8b6166f7b0a4dc9c54497676cc91b5f196ced99969cab7fe40ce53390d26de8ca5cb245ed8ecbd8e4b3766eb1d2de0f952dbd33cfa8c55232dee6106a9b4ca5c74ca839f6fb78855c1950fee5d8e4861e87dc7d324f3ca8b87c282ad54bb2c1deaad4a0c31342480cc2773c9b5f83deb2149762a9d4fb1ab56254715b20ca0d6efbc028f84db5b8ad367c6e28860dc40cbd1a1e81be160eb7e04bb011e8f4e44db2df08c885ab247bb8ea6b1135b016e405f08fa7b0681353f165602e73a3a3b135e692b73cbc972ff4d3124f190d558b1aa575f809caa4afee812ae21f6fb0e0a91b94a00911aaaf2fa73faa53dec15e6bb64bae9c1d879a71d6b58008a85ebe27a68d73f6a60a283eab16afa4fbea660fe3f9a10dc3f1ed2d1c335206b125356067c3df8114b616550a90484049a8e081be2a3aa0f69a8e490fcb50c9cf7ad040c7774a46857d4cc2212ae7cdd76114a33ca33215a525bc1fa1161911edea9aca2703748c308b7832adb13a15f04ca2ab9582a3a01d9f269c47d33be9682b8c1e24ce749cae78f3d8d882787ac34f52036b55a446c65bd62e78608f225707e8de0fe048dd93df87070fb2a6a15e4622e0e922397ec7484733d668b5f839102eb4914fb2b5f7f2d3b602fa089f7138b9e4154db51d95130a060059aef179a77f545f649741a5eac397e5db4ccb4e8d1c6a5d0745bcbd33ede16ae971d1f9bcc9c21e9f21397d744189cb6f9edb499b377dbf78154b126c616f3db3d92e5aa84c4c8dd511898e96a761504efe359f8c80150b44f10e85e7fd7f8d19a1172aba6f822e01c27e52bedb28f47d20bfac5c6dad331a5fb5d0b831db16554fee5980173b12a7bd8fef7a7a43770ddf347107477853bd902ffc14986d764e93a7fecaa964e173116f790242ad0b09b609e90d493951f47739eee147e9e9432dc5208a8c0a3d62511ccc1275271d6e4963b8758fb54b423f75864c5bbf21d50e69732ce10781ac357bc6c41abe7061c839d6eb34b6173b24add0ad6538375e2ac2acd0247a0d0d8b6ac63249866438dfbcb576649972d122bd506ddb0f4807c441bf8c3ffb73159ce0e138fcc85c7c1f21f8ddb2ba51b64f895cc175b6f9f9d3328efad12e1076b4d1d2425134718cdce683e5c2f1c285dedc3e3e85389c426e5df680359bb9ab4e02b92517a4af277d7fd8791615cddc9dd005fd30a1de7475c91e6a74042ab710f5bff8e6dce1c60a3bd8cf9ffb24b3a57171cc979686d9149059b667af4c334ea4d6126992fdbe9eed40df5c578f2c240809f74b52785bd38574b94e00b09c3afca73ba37904d1010526453dc8ad7f77f6428832164d3680275e434fb6c8cfde6000fe8ef9706beb0ea615d8868a254c530afd605291ac4b306552f959849bd7d326d4864dbaafd8ee11fed39fdfa14451c6ac50c1f6f36b36c49e447489cbaeb68ce7626d191dac945439287cc331027448421792540a046c478c208778a0f299446b38eee66bc58449e4ec48619e207e469e034a126659d784c6f1c66b13d91daceb12ea82a2ff680b469716728e2109673ca24b24b4ff161b5457870c017d5fbf6445d8238c4ff2336221582490bae464e4250c2dc0463d3418293df7d5851ea42cd9db72f43d41c49cd381e6ac9ed5b9a7a0518a6951aa86c6d5204fcfa91b7fd1e256812b00521ba4e906b9de54cf6a954d7040606b0f5760bcdbb9242c6af12e95cb937468efda74996bf5481413e9c94f8aba099b94c5655d9a7b6c57a6243dae8c5b4dfbc5b6b47ebe6f80e874f9789df910f220ce10743bc36e30306713bc54539fc6b94134f2e8a696bfc0582c4f78e9eec553285b2843e6ed34f94c4b3376ddb99f2eb24cf4e158bec6dbc536249fa2fbe3f7205a7c3e72bc9a6ded33ccf29cccf3890727e2a1f10e72d81acd291b0e5da83fe04944336f62fe9d52f244ff6c9cdb047862dcca0e70f5e4bfeeba3563e8aa3111d475c365d9a16d91684ab716dea3af226b629d61ca3a43d305346275852e423ffaf9a488311e1a1ebe32bdc62f56f731a073f7870ec4456229ea45f681483c0612049bc5f87fe890982a2538a50415dc8123f843528238bcb4b7964507d6b30dc5ecee2c69a3d6f154c925a719e62da39eccb0b002c73fdd2aed8baf4ce788f87ce257f7c34081ed9b4eb656a6806a1700a8a64200a4b057b566fc0b1c6fa529422371e21702aadefe4217ff740411b6334888a678898029a1ae3cd052456701d9117b2f136e9fc9d734f82f72ad3848e6f6cd0069a00594a1d", @ANYBLOB="d7b7bd9609daaaa610a2cf478a4260b22676a102dd13afc047194354c072f1078d349de0a1c8ed6a2b85ea4d086ad998168a220519fe4594127f9b843a944f39485239af40c5385d2a7cb0ece725687822e921c308bd2cb51a4eb232e4efc703ac592b3b7a6db8274fa48459b82c77b8b8be0243e610367a7b5c5480a8c4"], 0x1c}}, 0x1) sendmsg$NL80211_CMD_GET_SURVEY(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1e5a70fae9757eaa}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0400400070002724fc8f7f621edb025e9fee1eb890fffddbdfe9c830036245f29dc7e3a763456a1c6b253200000096f86dc8fa3944cf307bbd52ae5c7b7b418747f1ae23a579b22ff974238bd7a64bc198fcba182438e4598ca8276610e717c886cdc7ee"], 0x14}, 0x1, 0x0, 0x0, 0x200048d0}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@bridge_getlink={0x28, 0x12, 0x4, 0x0, 0x25dfdbfc, {0x7, 0x0, 0x0, 0x0, 0x8}, [@IFLA_EXT_MASK={0x8, 0x1d, 0x8000}]}, 0x28}, 0x1, 0x0, 0x0, 0x240448d4}, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendfile(r7, r6, 0x0, 0x800000017fc) [ 1358.670275][T28668] loop1: detected capacity change from 0 to 131072 [ 1358.683925][T28668] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:47 executing program 5: sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter, 0x86) 16:18:47 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f68fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:47 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x141582, 0x0) write$cgroup_pressure(r0, &(0x7f0000000000)={'some'}, 0x2f) 16:18:47 executing program 5: syz_clone(0x1600, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="0b80d9e8149eb7c728f2410cf0ca6a97ea5ba869d0a8a84acab7ad817e1a80c7beb1a395c874b4554f112762cb80e3f33f283ec2590fa64944700b13be32e767442b4c57df5a03b687594cd4278bf69b5ed2b2d13234b80e53782cb9a8c234df257ef3af5a77") 16:18:47 executing program 0: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x24, 0x0) [ 1358.827615][T28688] loop1: detected capacity change from 0 to 131072 [ 1358.859908][T28688] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1358.872668][ T27] audit: type=1804 audit(1667233127.668:1261): pid=28683 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir442240506/syzkaller.GyyQ3L/2696/cgroup.controllers" dev="sda1" ino=1176 res=1 errno=0 [ 1358.925204][T15805] usb 4-1: new high-speed USB device number 55 using dummy_hcd [ 1359.165239][T15805] usb 4-1: Using ep0 maxpacket: 8 [ 1359.287441][T15805] usb 4-1: config 1 has an invalid interface number: 193 but max is 0 [ 1359.298931][T15805] usb 4-1: config 1 has no interface number 0 [ 1359.307778][T15805] usb 4-1: config 1 interface 193 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1359.476284][T15805] usb 4-1: New USB device found, idVendor=05ac, idProduct=024d, bcdDevice= 0.40 [ 1359.486011][T15805] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1359.494875][T15805] usb 4-1: Product: syz [ 1359.499884][T15805] usb 4-1: Manufacturer: syz [ 1359.504515][T15805] usb 4-1: SerialNumber: syz [ 1359.547247][T15805] usbhid 4-1:1.193: couldn't find an input interrupt endpoint [ 1359.748977][T15805] usb 4-1: USB disconnect, device number 55 16:18:49 executing program 3: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0}) 16:18:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x4, 0x4) 16:18:49 executing program 5: select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0x4}, 0x0) 16:18:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f69fb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) 16:18:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x27, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000006000000000008000080000020000000721f1f63721f1f630100ffff53ef010001000000721f1f63000000000000000001000000000000000b0000000001000008000000d2420100128300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3330313431313932383700"/192, 0xc0, 0x400}, {&(0x7f00000100c0)="0000000000000000000000008881bc59a13b4885a2a41f292163543f010040000c00000000000000721f1f6300"/64, 0x40, 0x4e0}, {&(0x7f0000010140)="0300000004000000010000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010160)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000010180)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000721f1f63721f1f63721f1f6300"/8224, 0x2020, 0x2000}, {&(0x7f00000121a0)="ed41000000100000721f1f63721f1f63721f1f6300000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4100}, {&(0x7f00000121e0)="20000000b82159cab82159ca00000000721f1f6300"/32, 0x20, 0x4180}, {&(0x7f0000012200)="8081000000180000721f1f63721f1f63721f1f6300000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4200}, {&(0x7f0000012240)="20000000000000000000000000000000721f1f6400"/32, 0x20, 0x4280}, {&(0x7f0000012260)="8081000000180000721f1f63721f1f63721f1f6300000000000001008000004010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4300}, {&(0x7f00000122a0)="20000000000000000000000000000000721f1f6300"/32, 0x20, 0x4380}, {&(0x7f00000122c0)="c041000000400000721f1f63721f1f63721f1f6300000000000002008000000000000800000000000af301000400000000000000000000000400000020000000", 0x40, 0x4a00}, {&(0x7f0000012300)="20000000000000000000000000000000721f1f6300000041a1133e0000000000", 0x20, 0x4a80}, {&(0x7f0000012320)="ed41000000100000721f1f63721f1f63721f1f6300000000000002008000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000356c659400000000000000000000000000000000000000000000000020000000b82159cab82159cab82159ca721f1f63b82106ca0000000000000000", 0xa0, 0x4b00}, {&(0x7f00000123c0)="ed8100001a040000721f1f63721f1f63721f1f6300000000000001008000000000000800010000000af301000400000000000000000000000100000060000000000000000000000000000000000000000000000000000000000000000000000000000000c920eefd00000000000000000000000000000000000000000000000020000000b82159cab82159cab82159ca721f1f63b82159ca0000000000000000", 0xa0, 0x4c00}, {&(0x7f0000012460)="ffa1000027000000721f1f63721f1f63721f1f6300000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e333031343131393238372f66696c65302f66696c653000000000000000000000000000000000000000000070c0aa3600000000000000000000000000000000000000000000000020000000b82159cab82159cab82159ca721f1f63b82159ca0000000000000000", 0xa0, 0x4d00}, {&(0x7f0000012500)="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", 0x1a0, 0x4e00}, {&(0x7f00000126a0)="ed81000064000000721f1f63721f1f63721f1f6300000000000001008000000000000800010000000af30100040000000000000000000000010000009000000000000000000000000000000000000000000000000000000000000000000000000000000049bfe1c100000000000000000000000000000000000000000000000020000000b82159cab82159cab82159ca721f1f63b82159ca0000000000000000", 0xa0, 0x5000}, {&(0x7f00000005c0)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000005000050166696c65336fd8e474a7f7065d2250a25800000011000000940f090166696c652e636f6c64000000", 0x8c, 0x10000}, {&(0x7f00000127c0)="0b0000000c0001022e00000002000000f40f02022e2e00"/32, 0x20, 0x20000}, {&(0x7f00000127e0)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000012800)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000012820)="00000000001000"/32, 0x20, 0x23000}, {&(0x7f0000012840)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x30000}, {&(0x7f0000000840)="0200"/32, 0x20, 0x30400}, {&(0x7f0000012880)="0300"/32, 0x20, 0x30800}, {&(0x7f00000128a0)="0400"/32, 0x20, 0x30c00}, {&(0x7f00000128c0)="0500"/32, 0x20, 0x31000}, {&(0x7f00000128e0)="0000000000000000010000000000000000000000000000000000759f218900000000000000000000000000000000000700"/70, 0x46, 0x31400}, {&(0x7f0000012940)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000012960)="0200"/32, 0x20, 0x40400}, {&(0x7f0000012980)="0300"/32, 0x20, 0x40800}, {&(0x7f00000129a0)="0400"/32, 0x20, 0x40c00}, {&(0x7f00000129c0)="0500"/32, 0x20, 0x41000}, {&(0x7f00000129e0)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000700"/96, 0x60, 0x41400}, {&(0x7f0000012a40)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d80f050766696c653100"/64, 0x40, 0x50000}, {&(0x7f0000012a80)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x60000}, {&(0x7f0000012ea0)='syzkallers\x00'/32, 0x20, 0x70000}, {&(0x7f0000012ec0)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x90000}], 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="6e6f6c6f61642c757365725f78617474722c6772706a71756f74613d2c6e6f6175746f5f64615f616c6c6f632c646174615f6572723d61626f72742c6e6f6c617a7974696d652c6a71666d743d76667376312c6e6f64656c616c6c6f632c64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303038302c00c3ddb0ed1f7bad40547cef501b02a73b557e0d6c369e6476d8df0e54f8620b2de59e5288b827efd5d4983db460c7ba675b26bbfcfd83e303f86e21b60ddba0339396c32477962a495d76109403eedc"], 0x1) getuid() keyctl$setperm(0x5, 0x0, 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file2\x00') 16:18:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) timerfd_gettime(r0, 0x0) 16:18:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="20000000120001"], 0x20}}, 0x0) 16:18:49 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5ac, 0x24d, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x2, 0x3, 0x1, 0x0, 0x0, {0x9}, {{{0x9, 0x5, 0x81, 0x5}}}}}]}}]}}, 0x0) [ 1360.273392][T28703] loop1: detected capacity change from 0 to 131072 [ 1360.291958][T28702] loop0: detected capacity change from 0 to 4096 [ 1360.310863][T28702] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled 16:18:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, 0x0, &(0x7f0000000200)) 16:18:49 executing program 4: socketpair(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) 16:18:49 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x4, &(0x7f0000000480)=[{&(0x7f0000000340)="7d3dd44d543c", 0x6}, {&(0x7f0000000280)="e4ee87cd4df9e993cf33f98f6182799e81c8f51752f39629bd6a6813a2b6c9d3d0ba1d0028da6c47dd928ff91152f090cd7041531fc2f09abc0e8e4570e36698af6b056471488b589191c02ba522ea1cebe5e04e4bfd40d6cac38dd8a1991cc45d46a3b1cf47327126d97a4f94754b0f197bbdb4d1205f0eaee9", 0x7a, 0x6}, {&(0x7f0000000200)="2ee591b0f8003cd3ccc57b1ddddb3cdfbc9aca4fa6f5bd1197e7a4886e093b9a44716bae1d6401e346fd937ceea0146c27e650ca6f64a47937f5c9bdcae450f2aa70815de85488b6d74f9ea28e4b4f6bfb7a15217dc87d74b4318ed1c537b049", 0x60, 0x80}, {&(0x7f00000003c0)="73d24059f222f16fd47f916f4fe0aedcb07b73d3cebd6ce6fd8b735d637ced8254982828c8ce8896a5aff641e0d8c8f74babaf9889daeda58559fdfcf4686fc5fb0514ffe091565e0a9fe81ed18471f65de370dccc23372f205d31f97c35bee22f9172088dd7558cd0908ec362b0672c574e930ea03493eb111ed81e35508f1fdb4be2e48a318377b33e5651ca3a0f60f93bbe906e4d0a732d1e", 0x9a, 0x7ff}], 0x0, &(0x7f0000000500)={[{@barrier_flush}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4}, {@usrquota}], [{@fowner_eq}]}, 0x1) [ 1360.322415][T28703] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 1360.357300][T28702] EXT4-fs mount: 2 callbacks suppressed [ 1360.357318][T28702] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 1360.397292][T28702] ------------[ cut here ]------------ [ 1360.404790][T28719] loop1: detected capacity change from 0 to 131072 [ 1360.411620][T28702] WARNING: CPU: 0 PID: 28702 at fs/ext4/xattr.c:2069 ext4_xattr_block_set+0x30a1/0x3860 [ 1360.422358][T28702] Modules linked in: [ 1360.423890][T28719] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" 16:18:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) [ 1360.439922][T28702] CPU: 1 PID: 28702 Comm: syz-executor.0 Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 [ 1360.461295][T28702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 1360.472179][T28702] RIP: 0010:ext4_xattr_block_set+0x30a1/0x3860 [ 1360.487576][T28702] Code: 5a 3f ff 48 8b 7c 24 58 4c 89 ee e8 29 57 c1 ff 45 31 ed e9 88 f4 ff ff e8 dc 5a 3f ff 45 31 ed e9 7b f4 ff ff e8 cf 5a 3f ff <0f> 0b e9 87 f1 ff ff e8 c3 5a 3f ff 0f 0b e9 ea df ff ff 44 89 f1 [ 1360.510028][T28702] RSP: 0018:ffffc90005d870e0 EFLAGS: 00010283 [ 1360.516668][T28702] RAX: ffffffff824a4b41 RBX: ffff88809ab0d2f0 RCX: 0000000000040000 [ 1360.524808][T28702] RDX: ffffc90004ab1000 RSI: 0000000000002450 RDI: 0000000000002451 [ 1360.533597][T28702] RBP: ffffc90005d87310 R08: ffffffff820f5879 R09: ffffed100ecac323 [ 1360.542057][T28702] R10: ffffed100ecac323 R11: 1ffff1100ecac322 R12: dffffc0000000000 [ 1360.550213][T28702] R13: 0000000000000000 R14: 0000000000000000 R15: 1ffff1100455fb45 [ 1360.558426][T28702] FS: 00007fafef462700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1360.568030][T28702] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1360.574806][T28702] CR2: 000000c034b6a100 CR3: 00000000ab608000 CR4: 00000000003506e0 [ 1360.584711][T28702] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1360.593424][T12838] usb 4-1: new high-speed USB device number 56 using dummy_hcd [ 1360.595052][T28702] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1360.609303][ T4351] usb 3-1: new high-speed USB device number 48 using dummy_hcd [ 1360.611189][T28702] Call Trace: [ 1360.620536][T28702] [ 1360.623730][T28702] ? ext4_get_inode_loc+0x190/0x190 [ 1360.629513][T28702] ? ext4_xattr_block_find+0x570/0x570 [ 1360.636147][T28702] ? ext4_xattr_block_find+0x102/0x570 [ 1360.641776][T28702] ext4_expand_extra_isize_ea+0x1591/0x1f30 [ 1360.647866][T28702] ? trace_lock_acquire+0x98/0x260 [ 1360.653120][T28702] ? ext4_xattr_set+0x3e0/0x3e0 [ 1360.658186][T28702] ? down_write_trylock+0x1fe/0x3c0 [ 1360.663499][T28702] ? __ext4_mark_inode_dirty+0x4b1/0x6a0 [ 1360.669657][T28702] __ext4_expand_extra_isize+0x2bd/0x3e0 [ 1360.675468][T28702] __ext4_mark_inode_dirty+0x54b/0x6a0 [ 1360.681051][T28702] ? ext4_blocks_for_truncate+0x270/0x270 [ 1360.687262][T28702] ? current_time+0x1c4/0x310 [ 1360.692074][T28702] ? ext4_setent+0x2a4/0x450 [ 1360.696874][T28702] ? atime_needs_update+0x7a0/0x7a0 [ 1360.702217][T28702] ? ext4_setent+0x360/0x450 [ 1360.706972][T28702] ext4_rename2+0x29f1/0x47b0 [ 1360.711745][T28702] ? ext4_mknod+0x5a0/0x5a0 [ 1360.716590][T28702] ? rcu_read_lock_sched_held+0x5f/0x130 [ 1360.722347][T28702] ? smk_access+0x490/0x490 [ 1360.726984][T28702] ? smack_log+0x11f/0x530 [ 1360.731522][T28702] ? lock_acquire+0xa5/0x400 [ 1360.736237][T28702] ? vfs_rename+0x81e/0x1150 [ 1360.740953][T28702] ? read_lock_is_recursive+0x10/0x10 [ 1360.746729][T28702] ? __might_sleep+0xc0/0xc0 [ 1360.751414][T28702] ? __might_sleep+0xc0/0xc0 [ 1360.756268][T28702] ? lock_release+0x81/0x870 [ 1360.761242][T28702] ? read_lock_is_recursive+0x10/0x10 [ 1360.766962][T28702] ? down_write_nested+0x1ab/0x280 [ 1360.772528][T28702] ? down_read_non_owner+0xa0/0xa0 [ 1360.777995][T28702] ? do_raw_spin_unlock+0x134/0x8a0 [ 1360.783374][T28702] ? memcpy+0x3c/0x60 [ 1360.787641][T28702] vfs_rename+0xd67/0x1150 [ 1360.792238][T28702] ? __ia32_sys_link+0x90/0x90 [ 1360.797307][T28702] ? security_path_rename+0x1ab/0x230 [ 1360.802865][T28702] do_renameat2+0xba9/0x1400 [ 1360.807805][T28702] ? fsnotify_move+0x4e0/0x4e0 [ 1360.812832][T28702] ? check_heap_object+0x244/0x810 [ 1360.818192][T28702] ? __phys_addr_symbol+0x2b/0x70 [ 1360.823542][T28702] ? 0xffffffff81000000 [ 1360.828110][T28702] ? getname_flags+0x1ea/0x4e0 [ 1360.833091][T28702] __x64_sys_rename+0x82/0x90 [ 1360.837991][T12838] usb 4-1: Using ep0 maxpacket: 32 [ 1360.838236][T28702] do_syscall_64+0x2b/0x70 [ 1360.847851][T28702] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1360.853886][T28702] RIP: 0033:0x7fafee68b5a9 [ 1360.858509][ T4351] usb 3-1: Using ep0 maxpacket: 8 [ 1360.858667][T28702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1360.883827][T28702] RSP: 002b:00007fafef462168 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1360.892324][T28702] RAX: ffffffffffffffda RBX: 00007fafee7abf80 RCX: 00007fafee68b5a9 [ 1360.900508][T28702] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000080 [ 1360.908738][T28702] RBP: 00007fafee6e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 1360.917047][T28702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1360.925087][T28702] R13: 00007ffd4d27b6ef R14: 00007fafef462300 R15: 0000000000022000 [ 1360.933091][T28702] [ 1360.936575][T28702] Kernel panic - not syncing: panic_on_warn set ... [ 1360.943182][T28702] CPU: 0 PID: 28702 Comm: syz-executor.0 Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 [ 1360.953581][T28702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 1360.963723][T28702] Call Trace: [ 1360.967101][T28702] [ 1360.970026][T28702] dump_stack_lvl+0x1e3/0x2cb [ 1360.974719][T28702] ? nf_tcp_handle_invalid+0x62e/0x62e [ 1360.975181][ T4351] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1360.975213][ T4351] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1361.003749][T28702] ? panic+0x766/0x766 [ 1361.007832][T28702] ? vscnprintf+0x59/0x80 [ 1361.012158][T28702] ? ext4_xattr_block_set+0x3060/0x3860 [ 1361.017701][T28702] panic+0x316/0x766 [ 1361.021594][T28702] ? __warn+0x131/0x220 [ 1361.025832][T28702] ? memcpy_page_flushcache+0xfc/0xfc [ 1361.031223][T28702] ? ext4_xattr_block_set+0x30a1/0x3860 [ 1361.036765][T28702] __warn+0x1fa/0x220 [ 1361.040750][T28702] ? ext4_xattr_block_set+0x30a1/0x3860 [ 1361.046318][T28702] report_bug+0x1b3/0x2d0 [ 1361.050723][T28702] handle_bug+0x3d/0x70 [ 1361.054877][T28702] exc_invalid_op+0x16/0x40 [ 1361.059384][T28702] asm_exc_invalid_op+0x16/0x20 [ 1361.064244][T28702] RIP: 0010:ext4_xattr_block_set+0x30a1/0x3860 [ 1361.070411][T28702] Code: 5a 3f ff 48 8b 7c 24 58 4c 89 ee e8 29 57 c1 ff 45 31 ed e9 88 f4 ff ff e8 dc 5a 3f ff 45 31 ed e9 7b f4 ff ff e8 cf 5a 3f ff <0f> 0b e9 87 f1 ff ff e8 c3 5a 3f ff 0f 0b e9 ea df ff ff 44 89 f1 [ 1361.090032][T28702] RSP: 0018:ffffc90005d870e0 EFLAGS: 00010283 [ 1361.096194][T28702] RAX: ffffffff824a4b41 RBX: ffff88809ab0d2f0 RCX: 0000000000040000 [ 1361.104165][T28702] RDX: ffffc90004ab1000 RSI: 0000000000002450 RDI: 0000000000002451 [ 1361.112137][T28702] RBP: ffffc90005d87310 R08: ffffffff820f5879 R09: ffffed100ecac323 [ 1361.120109][T28702] R10: ffffed100ecac323 R11: 1ffff1100ecac322 R12: dffffc0000000000 [ 1361.128081][T28702] R13: 0000000000000000 R14: 0000000000000000 R15: 1ffff1100455fb45 [ 1361.136229][T28702] ? dquot_initialize_needed+0x169/0x310 [ 1361.141940][T28702] ? ext4_xattr_block_set+0x30a1/0x3860 [ 1361.147504][T28702] ? ext4_get_inode_loc+0x190/0x190 [ 1361.152715][T28702] ? ext4_xattr_block_find+0x570/0x570 [ 1361.158184][T28702] ? ext4_xattr_block_find+0x102/0x570 [ 1361.163655][T28702] ext4_expand_extra_isize_ea+0x1591/0x1f30 [ 1361.169561][T28702] ? trace_lock_acquire+0x98/0x260 [ 1361.174688][T28702] ? ext4_xattr_set+0x3e0/0x3e0 [ 1361.179552][T28702] ? down_write_trylock+0x1fe/0x3c0 [ 1361.184753][T28702] ? __ext4_mark_inode_dirty+0x4b1/0x6a0 [ 1361.190399][T28702] __ext4_expand_extra_isize+0x2bd/0x3e0 [ 1361.196041][T28702] __ext4_mark_inode_dirty+0x54b/0x6a0 [ 1361.201519][T28702] ? ext4_blocks_for_truncate+0x270/0x270 [ 1361.207251][T28702] ? current_time+0x1c4/0x310 [ 1361.211937][T28702] ? ext4_setent+0x2a4/0x450 [ 1361.216535][T28702] ? atime_needs_update+0x7a0/0x7a0 [ 1361.221738][T28702] ? ext4_setent+0x360/0x450 [ 1361.226332][T28702] ext4_rename2+0x29f1/0x47b0 [ 1361.231024][T28702] ? ext4_mknod+0x5a0/0x5a0 [ 1361.235530][T28702] ? rcu_read_lock_sched_held+0x5f/0x130 [ 1361.241177][T28702] ? smk_access+0x490/0x490 [ 1361.245688][T28702] ? smack_log+0x11f/0x530 [ 1361.250204][T28702] ? lock_acquire+0xa5/0x400 [ 1361.254802][T28702] ? vfs_rename+0x81e/0x1150 [ 1361.259401][T28702] ? read_lock_is_recursive+0x10/0x10 [ 1361.264787][T28702] ? __might_sleep+0xc0/0xc0 [ 1361.269380][T28702] ? __might_sleep+0xc0/0xc0 [ 1361.273975][T28702] ? lock_release+0x81/0x870 [ 1361.278568][T28702] ? read_lock_is_recursive+0x10/0x10 [ 1361.283946][T28702] ? down_write_nested+0x1ab/0x280 [ 1361.289059][T28702] ? down_read_non_owner+0xa0/0xa0 [ 1361.294170][T28702] ? do_raw_spin_unlock+0x134/0x8a0 [ 1361.299376][T28702] ? memcpy+0x3c/0x60 [ 1361.303362][T28702] vfs_rename+0xd67/0x1150 [ 1361.307786][T28702] ? __ia32_sys_link+0x90/0x90 [ 1361.312572][T28702] ? security_path_rename+0x1ab/0x230 [ 1361.317951][T28702] do_renameat2+0xba9/0x1400 [ 1361.322554][T28702] ? fsnotify_move+0x4e0/0x4e0 [ 1361.327323][T28702] ? check_heap_object+0x244/0x810 [ 1361.332439][T28702] ? __phys_addr_symbol+0x2b/0x70 [ 1361.337463][T28702] ? 0xffffffff81000000 [ 1361.341629][T28702] ? getname_flags+0x1ea/0x4e0 [ 1361.346399][T28702] __x64_sys_rename+0x82/0x90 [ 1361.351099][T28702] do_syscall_64+0x2b/0x70 [ 1361.355533][T28702] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1361.361432][T28702] RIP: 0033:0x7fafee68b5a9 [ 1361.365846][T28702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1361.385516][T28702] RSP: 002b:00007fafef462168 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1361.393938][T28702] RAX: ffffffffffffffda RBX: 00007fafee7abf80 RCX: 00007fafee68b5a9 [ 1361.401916][T28702] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000080 [ 1361.409890][T28702] RBP: 00007fafee6e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 1361.417863][T28702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1361.425836][T28702] R13: 00007ffd4d27b6ef R14: 00007fafef462300 R15: 0000000000022000 [ 1361.433818][T28702] [ 1361.436997][T28702] Kernel Offset: disabled [ 1361.441397][T28702] Rebooting in 86400 seconds..